CN110417723A - A kind of application login method, device, terminal and storage medium - Google Patents
A kind of application login method, device, terminal and storage medium Download PDFInfo
- Publication number
- CN110417723A CN110417723A CN201910252704.0A CN201910252704A CN110417723A CN 110417723 A CN110417723 A CN 110417723A CN 201910252704 A CN201910252704 A CN 201910252704A CN 110417723 A CN110417723 A CN 110417723A
- Authority
- CN
- China
- Prior art keywords
- user
- user information
- application
- authorization
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a kind of application login method, device, terminal and storage mediums;The embodiment of the present invention can receive the authorization logging request that the first application is initiated;According to authorization logging request triggering the second application display user information list, the user information list includes multiple for logging in the user information of the first application, wherein, multiple user informations include user in the non-genuine user information of real user information and user in the second application in the second application;Selection is for logging in target user's information of the first application from the user information list;When detecting license confirmation instruction, based on the first application described in target user's information registration.The program can promote the safety of user information.
Description
Technical field
The present invention relates to communication technique fields, and in particular to a kind of application login method, device, terminal and storage medium.
Background technique
Authorization log in, refer to user using one in application, using another application authorization user information log in
The application.It is to be logged in using accordingly, it is possible to will appear use due to needing to license to user information in login process
The illegal situation such as family information leakage, theft, causes the safety of user information poor.
Summary of the invention
The embodiment of the present invention provides a kind of application login method, device, terminal and storage medium, can be with the peace of user information
Quan Xing.
The embodiment of the present invention provides a kind of using login method, comprising:
Receive the authorization logging request that the first application is initiated;
According to authorization logging request triggering the second application display user information list, the user information list includes
Multiple user informations for being used to log in the first application, wherein multiple user informations include true use of the user in the second application
The non-genuine user information of family information and user in the second application;
Selection is for logging in target user's information of the first application from the user information list;
When detecting license confirmation instruction, based on the first application described in target user's information registration.
Correspondingly, the embodiment of the present invention also provide it is a kind of using entering device, comprising:
Receiving unit, the authorization logging request initiated for receiving the first application;
Display unit, for according to authorization logging request triggering the second application display user information list, the use
Family information list includes multiple for logging in the user information of the first application, wherein multiple user informations include user second
The non-genuine user information of real user information and user in the second application in;
Selecting unit, for selecting target user's information for logging in the first application from the user information list;
Unit is logged in, for being based on first described in target user's information registration when detecting license confirmation instruction
Using.
A kind of terminal provided in an embodiment of the present invention, including processor and memory, the memory are stored with a plurality of finger
It enables, the processor loads described instruction, to execute any step using in login method provided in an embodiment of the present invention.
In addition, the embodiment of the present invention also provides a kind of storage medium, the storage medium is stored with a plurality of instruction, the finger
It enables and being loaded suitable for processor, to execute the step in any login method provided in an embodiment of the present invention.
The embodiment of the present invention can receive the authorization logging request that the first application is initiated;It is touched according to the authorization logging request
Hair the second application display user information list, the user information list include multiple for logging in user's letter of the first application
Breath, wherein multiple user informations include user in the second application real user information and user in the second application
Non-genuine user information;Selection is for logging in target user's information of the first application from the user information list;Work as detection
To when license confirmation instruction, applied based on described in target user's information registration first.The program can use non-real practical
Family authorizing information logs in application, occurs the illegal situation such as leak, steal accordingly it is possible to prevent there is real user information, be promoted
The safety of user information.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 a is the schematic diagram of a scenario provided in an embodiment of the present invention using login method;
Fig. 1 b is the flow chart provided in an embodiment of the present invention using login method;
Fig. 1 c is login page schematic diagram provided in an embodiment of the present invention;
Fig. 1 d is authorization login page schematic diagram provided in an embodiment of the present invention;
Fig. 1 e is another schematic diagram of authorization login page provided in an embodiment of the present invention;
Fig. 1 f is another schematic diagram of authorization login page provided in an embodiment of the present invention;
Fig. 2 a is the UI interaction schematic diagram that application authorization provided in an embodiment of the present invention logs in;
Fig. 2 b is another UI interaction schematic diagram that application authorization provided in an embodiment of the present invention logs in;
Fig. 2 c is another UI interaction schematic diagram that application authorization provided in an embodiment of the present invention logs in;
Fig. 3 a is another flow diagram that application provided in an embodiment of the present invention logs in;
Fig. 3 b is the flow diagram that user provided in an embodiment of the present invention is logged in using authorization;
Fig. 3 c is that the technology that application authorization provided in an embodiment of the present invention logs in realizes schematic diagram;
Fig. 4 a is the structural schematic diagram provided in an embodiment of the present invention using entering device;
Fig. 4 b is another structural schematic diagram provided in an embodiment of the present invention using entering device;
Fig. 4 c is another structural schematic diagram provided in an embodiment of the present invention using entering device;
Fig. 4 d is another structural schematic diagram provided in an embodiment of the present invention using entering device;
Fig. 5 is the structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of application login method, device, terminal and storage medium.Wherein, the application apparatus
It can integrate in terminal, which can be the equipment such as mobile phone, tablet computer, laptop.
It include terminal and server the embodiment of the invention provides application login system with reference to Fig. 1 a;The terminal and service
Device is by network connection, for example, passing through wired or wireless network connection etc..
Wherein, the first application program (referred to as first application) and the second application program (referred to as the is installed in terminal
Two applications);Server can be the server of the second application.First application can be different applications from the second application, i.e., different
Structure application, in one embodiment, the first application can also be the son application operated in the second application, for example, in the second application
Small routine etc..
Small routine refers to that a kind of developed based on certain programmed language is completed, without downloading and installation, so that it may the shifting used
Moved end application program, may operate in cross-platform mobile client or application is upper.The maximum feature of small routine be it is easy to use,
User, which sweeps, sweeps or searches for i.e. openable application, without manually installing in the operating system of mobile terminal.
When terminal needs to log in first in application, terminal receives the authorization logging request that the first application is initiated;According to authorization
Logging request triggering the second application display user information list, user information list include multiple for logging in the use of the first application
Family information, wherein multiple user informations include real user information and user of the user in the second application in the second application
In non-genuine user information;Selection is for logging in target user's information of the first application from user information list;Work as detection
To when license confirmation instruction, applied based on target user's information registration first.
Specifically, when detecting license confirmation instruction, terminal can the message identification based on target user's information from clothes
Then device acquisition target user's information of being engaged in is applied based on target user's information registration first.For example, terminal can use target
The identity of the message identification of family information, the application identities of the second application and user in the second application encodes, and obtains
To authorization code;Target user's information in the second application is obtained from the server of the second application based on authorization code, then, terminal can
To be applied based on target user's information registration first.
It is described in detail separately below.It should be noted that the following description sequence is not as excellent to embodiment
The restriction of choosing sequence.
The present embodiment will be described from the angle of application entering device, this specifically can integrate using entering device at end
The equipment such as end;Wherein, which may include mobile phone, tablet computer, laptop and individual calculus (PC, Personal
The equipment such as Computer).
Provided in an embodiment of the present invention a kind of using login method, this method can be executed by the processor of terminal, such as be schemed
Shown in 1b, this can be such that using the detailed process of login method
101, the authorization logging request that the first application is initiated is received.
In the embodiment of the present invention, the first application can be different applications, i.e. heterogeneous applications from the second application.Implement one
Example in, first application from second application can be two different independent utilities, for example, first application can for game application,
Second application can be instant messaging application etc..
In one embodiment, the first application can also be the son application such as small routine operated in some application, for example,
The son operated in the second application applies such as small routine.For example, the second application can be instant messaging application, first application
Can such as do shopping small routine, game small routine, servlet for the small routine in instant messaging application.
In one embodiment, the first application can also be the business service account in some application, in the second application
Business service account, for example instant messaging application in public platform.
In addition, the application can also can be webpage with first, such as game webpage, shopping webpage in some embodiments
Deng.
That is, the first application can be the shapes such as application program (APP), webpage, public platform, small routine in the embodiment of the present invention
Formula.
Wherein, there are many modes of the first application initiation authorization logging request, for example, in one embodiment, can show
The login page of first application, user can trigger the first application by login page and initiate authorization logging request, at this point, using
Entering device will receive the authorization logging request.
For example, step " receiving the authorization logging request that the first application is initiated ", may include: the login for showing the first application
The page;When detecting that user is directed to the authorization register of login page, authorization logging request is initiated in the first application of triggering, is connect
It receives the authorization logging request that the first application is initiated and such as passes through the second application reception authorization logging request.The authorization register can be with
Including the operation such as sliding, clicking.
In one embodiment, it for the ease of user login operation, is promoted and logs in efficiency, it can also be in the login of the first application
Interface setting authorization logs in control, and user, which can log in control to authorization and be operated (such as slide, click operate), triggers the
Authorization logging request is initiated in one application, at this point, can receive to the authorization logging request using entering device.Wherein, it awards
The performance that power logs in control show can there are many, for example, can be input frame, icon, button etc..
For example, terminal can show the login page of the first application, the log in page after the application of operation first with reference to Fig. 1 c
Face includes that authorization login button is " the second application logs in ";When the user clicks should " second application log in " button can trigger the
Authorization logging request is initiated in one application, at this point, terminal will receive the request.
Wherein, authorization logging request can carry the application of the application identities of the first application, authorization application such as the second application
The information such as mark.
102, according to authorization logging request triggering the second application display user information list, user information list includes multiple
For logging in the user information of the first application, wherein multiple user informations include real user letter of the user in the second application
The non-genuine user information of breath and user in the second application.
Wherein, user information list may include multiple for logging in the user information of the first application, user information column
At least two be may include in table for logging in the user information of the first application, the quantity of user information can be according to the actual situation
Setting.
Wherein, user information may include at least one of information such as head portrait, the pet name, position, gender, for example, can be with
Head portrait, the pet name including user.
Wherein, the real user information user information that may include user currently used in the second application, for example, with the
Two applications are for instant messaging is applied, and real user information currently can carry out message using instant messaging application for user
Used user information when interaction.In practical application, real user information can be newest preservation in the system of the second application
User user information, such as newest preservation with user indicate binding user information.For example, the real user of user A is believed
Breath can be the user information of the user A of newest preservation in message exchange system.
It will be appreciated that real user information is not intended to the true identity information one with user in the embodiment of the present invention
It causes, real user information could be known as.For example, if user currently used pet name, head portrait in the second application, true with user
When the name of reality, personal head portrait are inconsistent, the currently used pet name, head portrait are real user information.
Wherein, non-genuine user information is defined relative to real user information, the non-genuine user information be with
The user information that real user information distinguishes;The two is different user information.For example, by taking head portrait, the pet name as an example, really
User information includes user's head portrait currently used in the second application, the pet name;Non-genuine user information includes being different from user
Currently used head portrait, the pet name in the second application.
Wherein, real user information and the difference of non-genuine user information both may include: it is entirely different, for example, head portrait,
The pet name is all different, and also may include that part is identical, for example, head portrait is identical, the pet name is not identical etc..
It will be appreciated that non-genuine user information is not intended to use in the second application in the embodiment of the present invention, it can
It is used with only being logged in for authorization.
In one embodiment, can be after receiving authorization logging request, terminal obtains the according to authorization logging request
The redirected link information of two applications;The second application is opened based on redirected link information, while triggering second application display user's letter
Cease list.
In one embodiment, it is logged in for the ease of application, can also show user information list by the page, specifically show
The mode of showing may include following several:
(1), the display of the existing non-genuine user information of user information list
Step " shows user information list according to the second application of triggering of authorization logging request ", may include:
According to authorization logging request triggering the second application display authorization login page, authorization login page includes user information
List, user information list include user in the second application real user information and user it is non-in the second application
Real user information.
For example, terminal can authorize logging request directly to trigger the second application display authorization login page, the authorization page
It may include real user information and non-genuine user information, in the case, user in the list including user information list
Information list has existed non-genuine user information, which can edit or use for historical time user
Non-genuine user information, for example, historical time is edited when authorizing and logging in or the user information that uses.
Authorization login page can also include other information, such as prompting message etc. in one embodiment, can for example mention
Awake user can choose different user informations and log in application, or the application message for reminding user to authorize logging request application
(Apply Names, icon that the application message such as first of the such as first application is applied), or can also include reminding user's letter
The type of breath, such as remind user to log in first and apply the required type of user information used such as head portrait, the pet name, position type.
Wherein, in the user information list in the embodiment of the present invention form of expression of user information may include it is a variety of, than
Such as, user information can be shown in the form of control is such as selection control.For example, user information list may include that user information is corresponding
Selection control, such as the corresponding selection control of non-real real user, the corresponding selection control of real user.User can be intuitive in this way
The corresponding user information of selection control is seen on ground, and can be by being operated to selection control to select to need mesh to be used
Mark user information.For example, user can be corresponding to user information in authorization login page when selecting control is to choose class control
Control of choosing operated, selected in a manner of choosing for log in application user information.
In one embodiment, user information list can also include information protection control;User can be to information protection control
Part is operated to select the authorization login mode for not providing user information, authorizes the information of the first application only under this login mode
User Identity including user in the second application, and be based only upon User Identity and log in the first application;It is logging in
In the process, user information such as User Identity binding or associated user information in applying without using user second are (such as
Head portrait, pet name etc.).
For example, by first application for using a, second application be using b for, terminal receive using a initiate authorization
After logging request, it can be opened according to authorization logging request and apply b, while triggered and showing authorization login page using b, such as Fig. 1 d
Shown, which includes user information list, which includes real information of the user in application b
Such as true head portrait such as " head portrait 1 " and the pet name " teenager ", which can also include non-genuine user information of the user in application b
Such as non-genuine head portrait such as " head portrait 2 " and the pet name " quick-witted such as me ".The non-genuine head portrait and the pet name can apply b in advance for user
User's authorization login other application of middle editor uses head portrait and the pet name, for example can authorize and step on for historical time such as the last time
The head portrait and the pet name edited or used when recording other application.
Wherein, the user information in the user information list in Fig. 1 d can be shown in the form of selecting control, such as Fig. 1 d
In, real user information, non-genuine information can be shown in selection control;User can be by selection control selection for stepping on
Target user's information of the first application of record.
Wherein, as shown in Figure 1 d, which further includes that " XX user is not in information protection control namely Fig. 1 d
There is provided the information such as head portrait and the pet name ".In practical application, user can be operated such as to " XX user does not provide information protection control
The information such as head portrait and the pet name " option carries out selection operation, does not provide the authorization login side of the user informations such as head portrait, the pet name with selection
Formula authorizes the information of the first application under this login mode, only includes User Identity of the user in the second application,
And it is based only upon User Identity and logs in the first application;In login process, it will not authorize or using user in the second application
In user information for example User Identity binding or associated user information (such as head portrait, the pet name).
In addition, as shown in Figure 1 d, which can also include authorization requests application i.e. using the information of b, such as
The information such as title, application icon and the prompting message for reminding user that different user informations is selected to log in.
(2), user increases the display of non-genuine user information to list newly
In one embodiment, in order to promote the flexibility of user information safety and user's operation, user can also edit non-
Real user information uses to authorize to log in.For example, the case where showing user information list by authorization login page
Under, it can set user information in the page and increase control, user can carry out the control non-genuine needed for operation editor
User information.
For example, step " according to authorization logging request triggering the second application display user information list ", may include:
According to authorization logging request triggering the second application display authorization login page, authorization login page includes user information
Increase control and user information list, user information list includes real user information of the user in the second application;
The operation for increasing control for user information based on user, shows user information edit page;
Obtain the non-genuine user information that user passes through user information edit page editor;
The non-genuine user information of editor is added to the user information list of authorization login page;
Authorization login page after triggering the second application display addition.
That is, terminal can first show an initial authorization login page according to authorization logging request, which can be with
Increase control and user information list including user information, user can increase new non-real of control editor by the user information
Real user's information is logged in authorize.
Wherein, user information increases there are many position of the control in the page, for example, can in user information list,
Can be except user information list, for another example, it can also be in positions such as page bottom, tops.
It wherein, may include user the according to user information list in the authorization login page that shows of authorization logging request
Real user information in two applications, for example, user information list can only include real user of the user in the second application
Information.Wherein, the display mode of user information can refer to above-mentioned introduction, such as be shown in a manner of control.
For example, by first application for using a, second application be using b for, terminal receive using a initiate authorization
After logging request, it can be opened according to authorization logging request and apply b, while triggered and showing authorization login page using b, such as Fig. 1 e
Shown, which includes that user information increases control i.e. " the newly-built head portrait pet name " button and user information list, should
For example true head portrait pet name (such as " head portrait 1 " and " teenager ") of real information that user information list only includes user in application b, with
And information protection control is " XX user does not provide the information such as head portrait and the pet name ".
In one embodiment, which can also include non-real real user letter of the user in the second application
Breath.That is, in the scene of newly-increased or newly-built user information, user information list in the authorization login page that initial trigger is shown
It may include user in the non-genuine user information of real user information, user in the second application in the second application.This is non-
Real user information can be the non-genuine user information that historical time user edits or uses, for example, historical time is being awarded
The user information edited or used when power logs in.
For example, by first application for using a, second application be using b for, terminal receive using a initiate authorization
After logging request, it can be opened according to authorization logging request and apply b, while triggered and showing authorization login page using b, such as Fig. 1 d
Shown, which includes that user information increases control i.e. " the newly-built head portrait pet name " button and user information list, should
User information list includes real information for example true head portrait of the user in application b such as " head portrait 1 " and the pet name " teenager ", the list
It can also include non-genuine user information for example non-genuine head portrait of the user in application b such as " head portrait 2 " and the pet name " quick-witted such as me ".
The user that the non-genuine head portrait and the pet name can edit in application b in advance for user authorize log in other application with head portrait and
The pet name, such as the head portrait and the pet name that can edit or use when such as the last time authorization logs in other application for historical time.
In addition, user information list can also include some other information, above-mentioned introduction can be specifically referred to, for example, packet
Include information protection control;Authorizing login page can also include other information, such as the application message of prompting message, the first application
Etc..
Wherein, user information edit page is the page for user's Edit Profile, and user can carry out on the page
Operation such as input operation is to edit required user information.When editing completion, terminal is available to pass through the page to user
The non-genuine user information of face editor.
In one embodiment, user information edit page may include head portrait edit control and pet name edit control;Head portrait
There are many forms of expression of edit control and pet name edit control, for example, the performance of head portrait edit control show can for icon,
The forms such as button, pet name edit control can be the forms such as input frame.
In the case where user information edit page is equipped with head portrait, pet name edit control, user can be for the two controls
Part is operated to edit head portrait, nickname information.For example, step " obtains user and passes through the non-of user information edit page editor
Real user information " may include:
It is directed to the edit operation of head portrait edit control based on user, obtains the head portrait that user edits;
It is directed to the edit operation of pet name edit control based on user, obtains the pet name that user edits.
Wherein, there are many modes of the operation acquisition head portrait based on head portrait edit control, for example, can be according to for head portrait
The operation of edit control carries out anamorphose processing (such as personage, background deformation or blurring) to the true head portrait of user, obtains
To non-genuine head portrait;For another example, camera can also be called directly to be shot, obtains head portrait.
It for another example, in one embodiment, can also be in user to head portrait edit control for the flexibility of poppet editor
A variety of head portrait edit modes are provided when operation, for selection by the user.Specifically, step " is directed to head portrait edit control based on user
Edit operation, obtain the head portrait edited of user ", may include:
When detecting trigger action of the user for the operation of head portrait edit control, shows and clap in user information edit page
Control is selected according to control and photograph album;
When detecting that user is directed to the trigger action for control of taking pictures, camera is called to be shot, the image based on shooting
Obtain the head portrait of user;
When detecting trigger action of the user for photograph album selection control, the image selected from photograph album based on user is obtained
Take the head portrait at family.
For example, user's user information in authorization login page shown in Fig. 1 e increases control " newly-built head with reference to Fig. 2 a
It, can be with triggering terminal or application b display user information edit page after the picture pet name " push-botton operation (such as click, slide operation)
Such as " newly-built personal information " page in Fig. 2 a.Being somebody's turn to do " newly-built personal information " page may include head portrait edit control " head portrait " choosing
Item and pet name edit control " pet name " option.
User can carry out operation triggering terminal in " newly-built personal information " page to head portrait edit control " head portrait " option
It is middle display take pictures control " take pictures " option and photograph album selection control i.e. " from photograph album selection ".Pass through at this point, user can choose
Shooting style constructs head portrait, or selection selects picture construction head portrait from photograph album.
For example, user " can take pictures " to control of taking pictures, option is operated, at this point, terminal will be based on the operation tune
Shot with camera, after shooting obtains image, can based on the image of shooting building user head portrait, for example, according to
Size as defined in head portrait is adjusted the size of shooting image.
For another example, it is that " selecting from photograph album " operates that user, which can also select photograph album control, at this point, terminal will base
In the non-genuine head portrait for the picture construction user that user selects from photograph album, for example, the image to selection provides ruler according to head portrait
It is very little to be adjusted.
With reference to Fig. 2 a, user can also input the pet name in " pet name " input frame, at this point, the available user's input of terminal
Non-genuine nickname information.For example, after user has edited head portrait " head portrait X " through the above way, it can be in user information
The pet name is inputted in " pet name " input frame in edit page i.e. " newly-built personal information " page, such as inputs " quick-witted little Lai ".
In one embodiment, in order to promote user information editorial efficiency, user can also be generated at random in the second application
Non-genuine user information.For example, random generation control can be arranged in user information edit page, such user can be by right
The random generation control is operated to trigger and generate non-genuine user information at random.
Such as, wherein user information edit page may include random generation control, and step " obtains user and passes through user
The non-genuine user information of information editing's page editing " may include: to work as to detect user for the random triggering for generating control
When operation, the random non-genuine user information for generating user in the second application.
Wherein, there are many modes for generating non-genuine user information at random, for example, can download user at random from network side
The non-genuine user information of information such as head portrait, the pet name as user in the second application.For another example, terminal can local with
Machine generates non-genuine user information such as head portrait, the pet name etc..
For example, in one embodiment, several images can be selected to synthesize head portrait in local photograph album, avoided non-real practical
Family information such as head portrait and real user information such as head portrait occur consistent.Specifically, step is " random to generate user in the second application
Non-genuine user information ", may include:
Several images are randomly choosed from local photograph album;
To being split in every image, the cut zone of every image is obtained;
Image synthesis is carried out to the cut zone of every image, obtains non-genuine head portrait.
For example, user information edit page is that " newly-built personal information " page is additionally provided with user information with reference to Fig. 2 a
The random control that generates is " random head portrait and the pet name ";When user is that " random head portrait and the pet name " is grasped to the random generation control
After triggering, terminal or application b generate the information such as non-genuine head portrait and the pet name of the user in application b at random.
In one embodiment, in order to promote operating accuracy, when can edit completion with user, by the user information of editor
It is added to user information list;It can generally think that editor completes when user needs the information for saving editor.Therefore, Ke Yiyong
One information preservation control such as button of family information editing's page setup, user can operate the information preservation control, and triggering is eventually
End saves the information of editor and the information of editor is added to user information list.For example, user information edit page also wraps
Information preservation control is included, the non-genuine user information of editor " is added to the user information list for authorizing login page " by step,
May include:
When detecting preservation operation of the user for information preservation control, the non-genuine user information of editor is saved, with
And the non-genuine user information of editor is added to the user information list of authorization login page.
For example, the non-genuine user information of editor can be stored in local by terminal, it can also be by the non-real practical of editor
Family information preservation is in server.It, can be by the non-real practical of editor in view of the limitation obtained across application message in practical application
For family information preservation in server, application to be logged in so i.e. the first application can obtain non-real real user's letter from server
Breath, utilizes the information registration.
For example, with reference to Fig. 2 a, " newly-built personal information " page can also include information preservation control " preservation " button, when with
Family can click the button when having edited head portrait and the pet name, at this point, terminal saves the head portrait and the pet name of editor, for example, can be with
It is sent to the server using b, which can be stored in the non-genuine user information of editor in independent storage, such as protect
There are interfaces to call in the corresponding storage of voucher accesstoken for example tokenkv etc..Terminal can return to display authorization simultaneously
Login page, the page include the user information column for the head portrait and pet name (" head portrait X ", " quick-witted little Lai ") for having added editor
Table.Specifically, the head portrait of editor and the pet name can be added in user information list by terminal, after triggering is using b display addition
Authorization login page.
(3), user's operation generates the display that non-genuine user information is added to user list at random;
For example, in one embodiment, after display authorization login page, user can be triggered non-by the authorization login page
Real user information generates, and terminal can generate non-genuine user information at random, and be added in user information list and show.Than
Such as, step " according to authorization logging request triggering the second application display user information list " may include:
According to authorization logging request triggering the second application display authorization login page, authorization login page includes user information
Increase control and user information list, user information list includes that real user information of the user in the second application is (real one
It applies in example, user information list can also include real user information of the user in the second application);
It is random to generate user in the second application when detecting that user increases the trigger action of control for information at random
Non-genuine user information;
The non-genuine user information generated at random is added in the user information list of authorization login page and is shown.
With reference to Fig. 2 b, to be using for b using a, the second application, terminal receives awarding using a initiation for the first application
After weighing logging request, it can be opened according to authorization logging request and apply b, while triggered and showing authorization login page using b, this is awarded
Power login page includes that information increases control " random to generate the head portrait pet name " at random, user information increases control i.e. " newly-built head portrait
The pet name " button and user information list, the user information list include that user is applying for example true head portrait of real information in b such as
" head portrait 1 " and the pet name " teenager ".
It is that " the newly-built head portrait pet name " button triggers customized head portrait and the pet name that user can increase control by user information
Process, specific customized process can be with reference to associated descriptions such as above-mentioned Fig. 2 a.
It is given birth at random in addition, user can also carry out operation triggering terminal to random increase control " random to generate the head portrait pet name "
It is added in user information list at non-real real user and shows, as shown in Figure 2 b, generate the head portrait pet name at random when the user clicks "
When, terminal can add " the random head portrait 1 " that generates at random and the pet name " XX user 3 " in user information list.
(4), the automated randomized display for generating non-genuine user information and being added to user list:
In one embodiment, it after receiving authorization logging request, can detecte in user information list with the presence or absence of non-
Real user information generates non-genuine user information at random and is added in list and show if not having, so that user can select
It selects, promotes the efficiency that authorization logs in.
For example, step " according to authorization logging request triggering the second application display user information list ", may include:
User information list is obtained according to authorization logging request, user information list includes the use for logging in the first application
Family information;
When detecting user information list there is no when non-genuine user information, random generation user is in the second application
Non-genuine user information;
The non-genuine user information generated at random is added in user information list, and triggers the second application display user
Information list.
For example, by first application for using a, second application be using b for, terminal receive using a initiate authorization
After logging request, user information list of the user in application b can be obtained according to authorization logging request;Detect user information column
It whether there is non-genuine user information in table, and if it exists, then display includes the authorization login page of user information list, with reference to figure
The page shown in 1d;If it does not exist, non-genuine user information such as head portrait, close of the user in application b can be generated at random
Claim, and be added in user information list, terminal, which can be triggered, to be shown using b comprising being added to the non-real real user generated at random
The information list of information, as shown in Figure 1 f, the pet name " XX@" and corresponding random head portrait are the pet name generated at random and head in figure
Picture.
That is, in embodiments of the present invention, already present non-genuine user information in user information list may include using
Family also may include generating at random in current grant login process in historical time editor or the non-genuine user information used
Non-genuine user information.
By above step, display includes the user information list of real user information and non-genuine user information.
103, selection is used to log in the first target user's information applied from user information list.
After showing user information list, terminal can select user to log in the first target user applied from list
Information.Wherein, target user's information refers to that logging in first applies currently used user information.
Wherein, target user's information can be real user information, or non-genuine user information.
For example, step " selection is for logging in target user's information of the first application from user information list ", can wrap
It includes: using the non-genuine user information selected from user information list as the target user's information for being used to log in the first application.
In one embodiment, in the case where showing user information list using authorization login page, step " is believed from user
Selection is for logging in target user's information of the first application in breath list ", it may include: based on user for authorization login page
Selection operation, from user information list selection for logs in first apply target user's information.
For example, user can carry out selection operation selection target user letter on the page in initial authorization login page
Breath for another example completes the authorization login page of display in editor, user can also carry out selection operation selection target on the page
User information.
It in some embodiments, can be using the non-genuine user information of default choice as target user's information, for example, in user
In the scene for creating non-genuine user information, such as user oneself is newly-built or generates the scene of non-genuine user information at random
In, newly-built non-genuine user information can be selected for target user's information from list, such as newly-built non-real of default choice
Real user's information is target user's information.
It for example, can after user triggers head portrait pet name editing process by " the newly-built head portrait pet name " button with reference to Fig. 2 a
To return to the authorization login page that display increases the newly-built head portrait pet name, at this point, the head portrait that terminal can be created with default choice
The pet name applies the target head portrait pet name of a as logging in.As can be seen that the newly-built head portrait pet name is (" head portrait X ", " quick-witted from Fig. 2 a
Little Lai ") in by selection state.
In another example when the user clicks when " random to generate the head portrait pet name ", terminal can be in user information list with reference to Fig. 2 b
It is middle to add " random head portrait 1 " and the pet name " XX user 3 " generated at random, display authorization login page is returned to, the page is newly-increased
The random head portrait pet name " random head portrait 1 " and the pet name " XX user 3 ", at this point, the random head portrait pet name is in by selection state, Ye Jimo
Recognizing the head portrait pet name newly-built at random is the target head portrait pet name for login user a.
In one embodiment, in creating non-genuine user information scene, when user information list includes multiple non-genuine
User information, target user's information of selection can not be newly-increased or newly-built non-genuine user information, or in list
Already present non-genuine user information.For example, terminal can be selected from list based on user for the selection operation of list
Existing non-genuine user information is as target user's information.
For example, with reference to Fig. 2 c, for the page shown in Fig. 1 d, which includes that user information increases control
That is " the newly-built head portrait pet name " button and user information list, the user information list include real information of the user in application b
Such as true head portrait (" head portrait 1 " " teenager "), which can also include that non-genuine user information of the user in application b is for example non-real
Real head portrait such as " head portrait 2 " and the pet name " quick-witted such as me ".
After user increases control " the newly-built head portrait pet name " push-botton operation (such as click, slide) to user information in the page,
" newly-built personal information " page in user information edit page such as Fig. 2 c can be shown with triggering terminal or application b.It should be " newly-built
People's information " page may include head portrait edit control " head portrait " option and pet name edit control " pet name " option.
User can be by " head portrait " option and pet name edit control " pet name " option editor head portrait and the pet name, or passes through
" the random head portrait pet name " button generates head portrait and the pet name at random.For example, user is close by head portrait that is customized or generating at random
Referred to as " head portrait 4 " " clever XX ";Specifically editing process can refer to information editing's process of above-mentioned Fig. 2 a.It is edited in user
Terminal returns to display authorization login page when completion, which includes the true head portrait pet name " head portrait 1 " " teenager ", has been deposited before
The non-genuine head portrait pet name " head portrait 2 " " quick-witted as me ", and the newly-built head portrait pet name " head portrait 4 " " clever XX ".At this point,
The newly-built head portrait pet name of terminal default choice;But user can carry out selection operation change to the page, for example, user selects
The already existing non-genuine head portrait pet name " head portrait 2 " " quick-witted such as me " is used as the target head portrait pet name, applies a for logging in.
In one embodiment, it when the existing non-genuine user information of user information list, can directly select existing
Non-genuine user information as target user's information, without creating non-genuine user information.
For example, authorizing the user information list of login includes that real information of the user in application b is for example true with reference to Fig. 1 d
Head portrait such as " head portrait 1 " and the pet name " teenager ", the list can also include that non-genuine user information of the user in application b is for example non-real
Real head portrait such as " head portrait 2 " and the pet name " quick-witted such as me ".At this point, user can directly select already present non-genuine head portrait " head
Picture 2 " and the pet name " quick-witted such as me " are used as the target head portrait pet name, create without carrying out the head portrait pet name.Or terminal default choice is
Existing non-genuine user information is target user's information.Fig. 1 d is such as referred to, after display authorizes login page, the head portrait pet name
" head portrait 2 " " quick-witted such as me " is in by selection state, namely defaulting the random already present non-genuine head portrait pet name is for logging in
The target head portrait pet name of user a.
In one embodiment, real user information can also be selected as target user's information from user information list,
For example, user can choose real user information after creating non-genuine user information, for example, with reference to Fig. 2 a, in newly-built head
As after the pet name, user is also an option that the true head portrait pet name " head portrait 1 " " teenager " as close using the final head portrait of a for logging in
Claim.
Alternatively, in not newly-built user information and in the case where having existed non-genuine user information and real user information,
Real user information can be directly selected, without carrying out newly-built process.
104, it when detecting license confirmation instruction, is applied based on target user's information registration first.
For example, when detecting license confirmation instruction, can by the second application to the message identification of target user's information,
Identity of the application identities and user of second application in the second application encodes, authorized code (code);Touching
The first application of hair obtains interface from the server of the second application based on authorization code and calls voucher (such as accesstoken);Triggering the
One application calls voucher to obtain the second target user's information applied from server based on interface;The first application of triggering is based on target
User information carries out register.
In one embodiment, terminal can trigger the first application and send acquisition of credentials request to the server of the second application,
The request can carry authorization code, the application identities (appid) of the first application and using key (appsecret);Server
After the requests have been received, it can be verified to application identities and using key, if verification passes through, server is to authorization
Code is decoded operation, obtains decoded information, decoded information include: the message identification of target user's information, second apply answer
With the identity of mark and user in the second application.Server can distribute corresponding interface based on decoded information and call
Voucher, and it is sent to terminal.The first application of terminal triggering is called voucher to obtain message identification from server and is corresponded to based on interface
Target user's information, then, based on target user's information registration first apply.
Wherein, the triggering mode of license confirmation instruction can be a variety of, for example, showing user's letter by authorization login page
In the case where ceasing list, user can be by carrying out operation triggering license confirmation instruction to authorization login page, at this point it is possible to examine
Measure license confirmation instruction.
In one embodiment, license confirmation control can be set in authorization login page, when user is to license confirmation control
License confirmation instruction is triggered when operation.For example, being provided with license confirmation control in authorization login page with reference to Fig. 1 d, Fig. 1 e, Fig. 1 f
Part such as " agreement " button and refusal authorization controls such as " refusal " button;When user is in authorization login page selection target user letter
Breath triggers license confirmation instruction as that after the head portrait pet name, can be operated such as clicking operation to " agreement " button, at this point,
Terminal can detecte the register of license confirmation instruction triggers application b.It, can be right when user needs to refuse authorization to log in
Refusal authorization controls such as " refusal " button is operated as clicked triggering refusal authorized order, at this point, terminal will be refused to award
Power logs in.
For another example, with reference to Fig. 2 a, when having edited head portrait pet name return display authorization login page, the authorization login page
It is provided with license confirmation control such as " agreement " button and refusal authorization controls such as " refusal " button;When user is in authorization log in page
It, can be right after face selection target user information such as the head portrait pet name (the head portrait pet name that can such as default editor is the target head portrait pet name)
" agreement " button is operated such as clicking operation to trigger license confirmation instruction, at this point, terminal can detecte authorization really
Recognize the register of instruction triggers application b.It, can be to refusal authorization controls such as " refusal " when user needs to refuse authorization to log in
Button, which is operated, such as clicks triggering refusal authorized order, logs at this point, terminal will refuse authorization.
Equally, user's operation is generated at random under the scene of the automated randomized generation of system, and authorization login page can be set
It is equipped with license confirmation control such as " agreement " button and refusal authorization controls such as " refusal " button, so that user triggers license confirmation
Instruction or refusal authorized order etc..
From the foregoing, it will be observed that the embodiment of the present invention can receive the authorization logging request that the first application is initiated;It is logged according to authorization
Request triggering the second application display user information list, user information list include multiple for logging in user's letter of the first application
Breath, wherein multiple user informations include user in the second application real user information and user in the second application
Non-genuine user information;Selection is for logging in target user's information of the first application from user information list;It is awarded when detecting
When power confirmation instruction, applied based on target user's information registration first.The program can provide non-real in authorization login process
Real user can promote the safety of user information to log in third-party application.
The program can also provide a variety of user informations such as real user information, non-genuine user information to log in third
Using, under the premise of promoting safety, also improve authorization log in diversity, flexibility.
In addition, the program can also allow for user to edit the non-genuine user information to log in third-party application, user
It can edit according to actual needs, can satisfy the demand of user individual and promote the interactivity that authorization logs in.
Citing, is described in further detail by the method according to described in above example below.
The embodiment of the present invention will introduce present invention method so that application entering device is integrated at the terminal as an example.
As shown in Figure 3a, a kind of to apply login method, detailed process is as follows:
301, the first application of terminal triggering initiates authorization logging request to the second application.
For example, terminal shows the login page of the first application, touched based on user for the authorization register of login page
The first application of hair initiates authorization logging request to the second application.
302, terminal is according to authorization logging request triggering the second application display authorization login page, the authorization log in page bread
It includes user information and increases control and user information list.
Wherein, user information list may include multiple for logging in the user information of the first application;For example, user information
List can only include real user information of the user in the second application, for example, authorizing login page with reference to shown in Fig. 2 a.In
In one embodiment, user information list may include real user information and non-genuine user information of the user in the second application,
For example, with reference to Fig. 1 d etc..The authorization page may include the true head portrait pet name, the non-genuine head portrait pet name.
For example, being instant messaging application, the third party that the first application is instant messaging application with the second application with reference to Fig. 3 b
For, after third-party application initiates authorization login, terminal can show authorization log in page with pull-up instant communication client
Face;The login page of the authorization may include user information list, which may include user in instant communication client
Real user information, also may include non-genuine user information.User can select real user to believe in the list of the page
Breath executes step 306, or the existing non-genuine user information of selection, executes step 307.
303, terminal increases the operation of control based on user for user information, shows user information edit page.
For example, increasing control " the newly-built head portrait pet name " button to the user information in authorization login page with reference to Fig. 2 a
After operation (such as click, slide), it can be shown with triggering terminal or application b " newly-built in user information edit page such as Fig. 2 a
Personal information " the page.Being somebody's turn to do " newly-built personal information " page may include head portrait edit control " head portrait " option and pet name editor control
Part " pet name " option.
304, terminal obtains the non-genuine user information that user passes through user information edit page editor.
For example, user can have by head portrait edit control, pet name edit control editor head portrait and the pet name with reference to Fig. 2 a
The editing process of body can refer to the description of above-described embodiment.
For another example, with reference to Fig. 2 a, user information edit page is that " newly-built personal information " page is additionally provided with user information
Random generation control be " random head portrait and the pet name ";When user is that " random head portrait and the pet name " carries out to the random generation control
Operation triggering terminal generates the information such as non-genuine head portrait and the pet name of the user in application b using b at random.
Further, it is also possible to which other random modes for generating the head portrait pet name can specifically refer to the description of above-described embodiment.
305, when detecting for the preservation operation of information preservation control in user information edit page, save editor's
Non-genuine user information, and the non-genuine user information of editor is added to the user information list for authorizing login page, and
Authorization login page after display addition.
For example, with reference to Fig. 2 a, " newly-built personal information " page can also include information preservation control " preservation " button, when with
Family can click the button when having edited head portrait and the pet name, at this point, terminal saves the head portrait and the pet name of editor, for example, can be with
It is sent to the server using b, which can be stored in the non-genuine user information of editor in independent storage, such as connect
Mouthful call in the corresponding storage of voucher accesstoken for example tokenkv etc..Terminal can return to display authorization log in page simultaneously
Face, the page include the head portrait for having added editor and the user information list of the pet name (" head portrait X ", " quick-witted little Lai ").Specifically
The head portrait of editor and the pet name can be added in user information list by ground, terminal, and triggering is stepped on using the authorization after b display addition
Record the page.
With reference to Fig. 3 b, when user can not select existing non-genuine user information, oneself editor newly-built one non-genuine
User information edits head portrait, the pet name such as to log in third-party application;User can protect the information of editor after having edited
It deposits.
For example, user can not select the existing true head portrait pet name and non-genuine head portrait close with reference to Fig. 1 d or Fig. 1 e
Claim, select the newly-built head portrait pet name, user can click newly-built head portrait pet name button and enter head portrait pet name editing process, detailed process
It can and above-mentioned related content shown with reference to Fig. 2 a.When editor completes, user can click " preservation " button to the head portrait of editor
The pet name saves, and shows at this point, the head portrait pet name of editor can be added in the list of authorization login page by terminal.
306, terminal selects real user information to use as the target for logging in the first application from user information list
Family information, goes to step 308.
For example, with reference to Fig. 3 b, when, there are when real user information, user can directly select really in user information list
User information is as target user's information for logging in the first application;For example, with reference to Fig. 1 d or Fig. 1 e, user be can choose very
The real head portrait pet name " head portrait 1 " " teenager " is to log in third-party application.Or Fig. 2 a is referred to, user can directly select existing
The true head portrait pet name as the target head portrait pet name log in third-party application.
307, terminal selects already present non-real real user as logging in the first application from user information list
Target user's information, goes to step 308.
For example, with reference to Fig. 3 b, when, there are when real user information and non-genuine user information, being used in user information list
Family can not select real user information, and already present non-genuine user information is as the first application of login in selective listing
Target user's information.
When user does not select real user information, selects existing non-genuine user information, user can be in lists
Selection needs non-genuine user information to be used;When user agrees to authorize, user clicks license confirmation control in authorization login page
When part such as " agreement ", terminal can log in third-party application based on the non-genuine user information of selection.For example, being used with reference to Fig. 1 d
Family can choose the existing non-genuine head portrait pet name such as " head portrait 2 " " quick-witted such as me " and log in third-party application.
308, when detecting user for the confirmation operation of license confirmation control in authorization login page, terminal is based on using
Target user's information registration first that family is selected from user information list is applied.
In newly-built head portrait pet name scene, with reference to Fig. 3 b, after the head portrait pet name for saving editor, user can pass through operation
Agree to authorization, after agreeing to authorization, third-party application can be logged in based on the head portrait pet name currently selected.
For example, Fig. 2 b, after having edited the head portrait pet name, terminal can return to display authorization login page with reference to Fig. 2 a, this
When, terminal can default the head portrait pet name of newly-built editor for the target head portrait pet name for logging in the first application;When the user clicks
When " agreement " button in the page, terminal can log in the first application based on the target head portrait pet name of default.
In one embodiment, after having edited head portrait pet name display authorization login page, user can not select to default
The head portrait pet name log in, other head portrait pet names can also be selected to be logged in the page operation.For example, being compiled with reference to Fig. 2 a
After having collected display authorization login page, user can choose the true head portrait pet name " head portrait 1 " " teenager " to log in third party
Using.
In the scene for selecting the existing true head portrait pet name or the non-genuine head portrait pet name, with reference to Fig. 1 d or Fig. 1 d, use
Family can after selecting the head portrait pet name, click the page in " agreement " button, at this point, terminal can the head portrait based on selection it is close
Claim to log in third-party application.
With reference to Fig. 3 c, specifically, when terminal detects the operation of user's license confirmation, i.e., when user agrees to authorization, immediately
The message identification of the available target user's information of the application of communication applications i.e. second, the application identities of instant messaging application are (some
In embodiment can be third-party application mark) and user second application in identity, then, to these information
It carries out encoding authorized code (code).Authorization code, and pull-up third-party application or redirection third are sent to third-party application
Fang Yingyong.The background server that third-party application is applied to instant messaging sends Voucher Code acquisition request, which carries authorization
Code third-party should identify appid) and apply key (appsecret);Background server can be asked based on Voucher Code acquisition
It asks and returns to corresponding interface calling voucher (such as accesstoken) to third-party application.Third-party application can be based on interface tune
User information interface (such as userinfo, i.e., in login process for calling background server to provide with voucher (such as accesstoken)
Obtain the interface of user information) to obtain the information such as the target user's information such as head portrait pet name from background server, then, based on obtaining
The target user's information registration got.
Wherein, background server can (such as KV be deposited with the corresponding storage of query interface calling voucher (such as accesstoken)
Storage), call voucher (such as accesstoken) corresponding target user's information to return to third-party application interface.
Scheme provided in an embodiment of the present invention can support user to log in third-party application without using true head portrait, the pet name,
The non-genuine information that login same application is selected before user can be stored simultaneously, resets without user, reduces user's
Privacy of user data are also ensured while using threshold.
In order to better implement above method, correspondingly, the embodiment of the present invention also provides a kind of using entering device, this is answered
It specifically can integrate in terminal with entering device, which can be with equipment such as mobile phone, tablet computer, laptops.
For example, as shown in fig. 4 a, this may include receiving unit 401, display unit 402, selection list using entering device
Member 403 and login unit 404, as follows:
Receiving unit 401, the authorization logging request initiated for receiving the first application;
Display unit 402, it is described for showing user information list according to the second application of authorization logging request triggering
User information list includes multiple for logging in the first user information applied, wherein multiple user informations include user the
The non-genuine user information of real user information and user in the second application in two applications;
Selecting unit 403 is believed for the target user that selection is used to log in the first application from the user information list
Breath;
Unit 404 is logged in, for when detecting license confirmation instruction, based on described in target user's information registration the
One application.
In one embodiment, display unit 402 can be specifically used for: be answered according to authorization logging request triggering second
Login page is authorized with display, the authorization login page includes user information list, and the user information list includes user
In the non-genuine user information of real user information and user in the second application in the second application;
The selecting unit 403 can be specifically used for the selection operation based on user for the authorization login page, from
Selection is for logging in target user's information of the first application in the user information list.
In one embodiment, with reference to Fig. 4 b, display unit 402 may include:
First display subelement 4021, for according to authorization logging request triggering the second application display authorization log in page
Face, the authorization login page include that user information increases control and user information list, and the user information list includes using
Real user information of the family in the second application;
Subelement 4022 is edited, for increasing the operation of control, display user's letter for the user information based on user
Cease edit page;
Subelement 4023 is obtained, is believed for obtaining user by the non-real real user of the user information edit page editor
Breath;
Subelement 4024 is added, for the non-genuine user information of editor to be added to the user of the authorization login page
Information list;
Second display subelement 4025, for triggering the authorization login page after the second application display is added.
In one embodiment, the user information edit page further includes information preservation control;Subelement 4024 is added, is used
In: when detecting preservation operation of the user for information preservation control, the non-genuine user information of editor is saved, and will compile
The non-genuine user information collected is added to the user information list of the authorization login page.
In one embodiment, selecting unit 403 can be specifically used for the choosing based on user for the authorization login page
Operation is selected, selection is for logging in target user's information of the first application from the user information list.
In one embodiment, the user information edit page includes head portrait edit control and pet name edit control;It is described
Non-genuine user information includes non-genuine head portrait and the pet name;
The acquisition subelement 4023, can be specifically used for:
It is directed to the edit operation of head portrait edit control based on user, obtains the head portrait that user edits;
It is directed to the edit operation of pet name edit control based on user, obtains the pet name that user edits.
In one embodiment, subelement 4023 is obtained, can be specifically used for:
It is aobvious in the user information edit page when detecting trigger action of the user for the operation of head portrait edit control
Show take pictures control and photograph album selection control;
When detecting that user is directed to the trigger action for control of taking pictures, camera is called to be shot, the image based on shooting
Obtain the head portrait of user;
When detecting trigger action of the user for photograph album selection control, the image selected from photograph album based on user is obtained
Take the head portrait at family.
In one embodiment, the user information edit page includes random generation control;The acquisition subelement 4023,
It can be specifically used for:
It is random to generate user in the second application when detecting user for the random trigger action for generating control
Non-genuine user information.
In one embodiment, the non-genuine user information includes non-genuine head portrait, the acquisition subelement 4023, can
To be specifically used for:
Several images are randomly choosed from local photograph album;
To being split in every image, the cut zone of every image is obtained;
Image synthesis is carried out to the cut zone of every image, obtains non-genuine head portrait.
In one embodiment, with reference to Fig. 4 c, display unit 402 may include:
The page shows subelement 4026, for according to authorization logging request triggering the second application display authorization log in page
Face, the authorization login page include that information increases control and user information list at random, and the user information list includes using
Real user information of the family in the second application;
It is random to generate subelement 4027, for when detecting that user increases the trigger action of control for information at random,
The random non-genuine user information for generating user in the second application;
Addition display subelement 4028, for the non-genuine user information generated at random to be added to the authorization log in page
It is shown in the user information list in face.
In one embodiment, display unit 402 can be specifically used for:
User information list is obtained according to the authorization logging request, the user information list includes for logging in first
The user information of application;
When detecting the user information list there is no when non-genuine user information, random generation user is in the second application
In non-genuine user information;
The non-genuine user information generated at random is added in the user information list, and triggers the second application display
User information list.
In one embodiment, with reference to Fig. 4 d, unit 404 is logged in, may include:
Coded sub-units 4041, for the message identification by the second application to target user's information, the second application
Application identities and user second application in identity encode, authorized code;
First triggering subelement 4042 is obtained based on the authorization code from the server of the second application for triggering the first application
Interface is taken to call voucher;
Second triggering subelement 4043 calls voucher to obtain from the server for triggering the first application based on the interface
Take target user's information of the second application;
Third triggers subelement 4044, carries out login behaviour based on target user's information for triggering first application
Make.
In one embodiment, selecting unit 403 can be specifically used for: non-by what is selected from the user information list
Real user information is as target user's information for logging in the first application.
When it is implemented, above each unit can be used as independent entity to realize, any combination can also be carried out, is made
It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not
It repeats again.
From the foregoing, it will be observed that the application entering device of the present embodiment can be initiated by receiving unit 401 in the application of reception first
Authorization logging request;User information list is shown according to the second application of authorization logging request triggering by display unit 402,
The user information list includes multiple for logging in the user information of the first application, wherein multiple user informations include user
In the non-genuine user information of real user information and user in the second application in the second application;By selecting unit 403
Selection is for logging in target user's information of the first application from the user information list;Worked as by login unit 404 and is detected
When license confirmation instructs, based on the first application described in target user's information registration.The program can use non-real real user
Information can prevent real user information from occurring the illegal situation such as leak, steal, and improve the safety of user information.
In addition, the embodiment of the present invention also provides a kind of terminal, as shown in figure 5, it illustrates involved by the embodiment of the present invention
Terminal structural schematic diagram, specifically:
The terminal may include one or processor 501, one or more calculating of more than one processing core
The components such as memory 502, power supply 503 and the input unit 504 of machine readable storage medium storing program for executing.It will be understood by those skilled in the art that
The restriction of the not structure paired terminal of terminal structure shown in Fig. 5 may include than illustrating more or fewer components or group
Close certain components or different component layouts.Wherein:
Processor 501 is the control centre of the terminal, using the various pieces of various interfaces and the entire terminal of connection,
By running or execute the software program and/or module that are stored in memory 502, and calls and be stored in memory 502
Data, execute terminal various functions and processing data, thus to terminal carry out integral monitoring.Optionally, processor 501 can
Including one or more processing cores;Preferably, processor 501 can integrate application processor and modem processor, wherein
The main processing operation system of application processor, user interface and application program etc., modem processor mainly handles channel radio
Letter.It is understood that above-mentioned modem processor can not also be integrated into processor 501.
Memory 502 can be used for storing software program and module, and processor 501 is stored in memory 502 by operation
Software program and module, thereby executing various function application and data processing.Memory 502 can mainly include storage journey
Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created data according to terminal
Deng.In addition, memory 502 may include high-speed random access memory, it can also include nonvolatile memory, for example, at least
One disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 502 can also include
Memory Controller, to provide access of the processor 501 to memory 502.
Terminal further includes the power supply 503 powered to all parts, it is preferred that power supply 503 can pass through power-supply management system
It is logically contiguous with processor 501, to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
Power supply 503 can also include one or more direct current or AC power source, recharging system, power failure detection circuit,
The random components such as power adapter or inverter, power supply status indicator.
The terminal may also include input unit 504, which can be used for receiving the number or character letter of input
Breath, and generation keyboard related with user setting and function control, mouse, operating stick, optics or trackball signal are defeated
Enter.
Although being not shown, terminal can also be including display unit etc., and details are not described herein.Specifically in the present embodiment, eventually
Processor 501 in end can be corresponding executable by the process of one or more application program according to following instruction
File is loaded into memory 502, and the application program being stored in memory 502 is run by processor 501, to realize
Various functions are as follows:
Receive the authorization logging request that the first application is initiated;It is used according to authorization logging request triggering the second application display
Family information list, the user information list include multiple for logging in the user information of the first application, wherein multiple user's letters
Breath includes user in the non-genuine user information of real user information and user in the second application in the second application;From
Selection is for logging in target user's information of the first application in the user information list;When detecting license confirmation instruction,
Based on the first application described in target user's information registration.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
From the foregoing, it will be observed that the terminal of the present embodiment can receive the authorization logging request that the first application is initiated;It is awarded according to described
Weigh logging request triggering the second application display user information list, the user information list includes multiple first answering for logging in
User information, wherein real user information that multiple user informations include user in the second application and user are the
Non-genuine user information in two applications;Selection is for logging in target user's letter of the first application from the user information list
Breath;When detecting license confirmation instruction, based on the first application described in target user's information registration.The program can use
Non-genuine user information can prevent real user information from occurring the illegal situation such as leak, steal, and improve the peace of user information
Quan Xing.
It will appreciated by the skilled person that all or part of the steps in the various methods of above-described embodiment can be with
It is completed by instructing, or relevant hardware is controlled by instruction to complete, which can store computer-readable deposits in one
In storage media, and is loaded and executed by processor.
For this purpose, the embodiment of the present invention also provides a kind of storage medium, wherein being stored with a plurality of instruction, which can be located
Reason device is loaded, to execute any step using in login method provided by the embodiment of the present invention.For example, the instruction
Following steps can be executed:
Receive the authorization logging request that the first application is initiated;It is used according to authorization logging request triggering the second application display
Family information list, the user information list include multiple for logging in the user information of the first application, wherein multiple user's letters
Breath includes user in the non-genuine user information of real user information and user in the second application in the second application;From
Selection is for logging in target user's information of the first application in the user information list;When detecting license confirmation instruction,
Based on the first application described in target user's information registration.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
Wherein, which may include: read-only memory (ROM, Read Only Memory), random access memory
Body (RAM, Random Access Memory), disk or CD etc..
By the instruction stored in the storage medium, any application provided by the embodiment of the present invention can be executed and stepped on
Step in recording method, it is thereby achieved that any using achieved by login method provided by the embodiment of the present invention
Beneficial effect is detailed in the embodiment of front, and details are not described herein.
It is provided for the embodiments of the invention a kind of application login method, device and storage medium above and has carried out detailed Jie
It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only
It is to be used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, according to the present invention
Thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not be construed as
Limitation of the present invention.
Claims (15)
1. a kind of apply login method characterized by comprising
Receive the authorization logging request that the first application is initiated;
According to authorization logging request triggering the second application display user information list, the user information list includes multiple
For logging in the user information of the first application, wherein multiple user informations include real user letter of the user in the second application
The non-genuine user information of breath and user in the second application;
Selection is for logging in target user's information of the first application from the user information list;
When detecting license confirmation instruction, based on the first application described in target user's information registration.
2. applying login method as described in claim 1, which is characterized in that answered according to authorization logging request triggering second
With display user information list, comprising:
According to authorization logging request triggering the second application display authorization login page, the authorization login page includes user
Information list, the user information list include that real user information and user of the user in the second application are answered second
Non-genuine user information in;
Selection is for logging in target user's information of the first application from the user information list, comprising: is directed to based on user
The selection operation of the authorization login page, selection is for logging in the target user of the first application from the user information list
Information.
3. applying login method as described in claim 1, which is characterized in that answered according to authorization logging request triggering second
With display user information list, comprising:
According to authorization logging request triggering the second application display authorization login page, the authorization login page includes user
Information increases control and user information list, and the user information list includes real user letter of the user in the second application
Breath;
The operation for increasing control for the user information based on user, shows user information edit page;
Obtain non-genuine user information of the user by the user information edit page editor;
The non-genuine user information of editor is added to the user information list of the authorization login page;
Authorization login page after triggering the second application display addition.
4. applying login method as claimed in claim 3, which is characterized in that the user information edit page includes that head portrait is compiled
Collect control and pet name edit control;The non-genuine user information includes non-genuine head portrait and the pet name;
Obtain non-genuine user information of the user by the user information edit page editor, comprising:
It is directed to the edit operation of head portrait edit control based on user, obtains the head portrait that user edits;
It is directed to the edit operation of pet name edit control based on user, obtains the pet name that user edits.
5. applying login method as claimed in claim 4, which is characterized in that be directed to the editor of head portrait edit control based on user
Operation obtains the head portrait that user edits, comprising:
When detecting trigger action of the user for the operation of head portrait edit control, shows and clap in the user information edit page
Control is selected according to control and photograph album;
When detecting that user is directed to the trigger action for control of taking pictures, camera is called to be shot, the image based on shooting obtains
The head portrait of user;
When detecting trigger action of the user for photograph album selection control, the image selected from photograph album based on user obtains use
The head portrait at family.
6. applying login method as claimed in claim 3, which is characterized in that the user information edit page includes random raw
At control;
Obtain non-genuine user information of the user by the user information edit page editor, comprising:
When detecting user for the random trigger action for generating control, random generation user is non-in the second application
Real user information.
7. applying login method as claimed in claim 6, which is characterized in that the non-genuine user information includes non-genuine
Head portrait;
The random non-genuine user information for generating user in the second application, comprising:
Several images are randomly choosed from local photograph album;
To being split in every image, the cut zone of every image is obtained;
Image synthesis is carried out to the cut zone of every image, obtains non-genuine head portrait.
8. applying login method as described in claim 1, which is characterized in that answered according to authorization logging request triggering second
With display user information list, comprising:
According to authorization logging request triggering the second application display authorization login page, the authorization login page includes information
Random to increase control and user information list, the user information list includes real user letter of the user in the second application
Breath;
When detecting that user increases the trigger action of control for information at random, random generation user is non-in the second application
Real user information;
The non-genuine user information generated at random is added in the user information list of the authorization login page and is shown.
9. applying login method as described in claim 1, which is characterized in that answered according to authorization logging request triggering second
With display user information list, comprising:
User information list is obtained according to the authorization logging request, the user information list includes for logging in the first application
User information;
When detecting the user information list there is no when non-genuine user information, random generation user is in the second application
Non-genuine user information;
The non-genuine user information generated at random is added in the user information list, and triggers the second application display user
Information list.
10. applying login method as claimed in claim 3, which is characterized in that the user information edit page further includes letter
Breath saves control;
The non-genuine user information of editor is added to the user information list of the authorization login page, comprising:
When detecting preservation operation of the user for information preservation control, the non-genuine user information of editor is saved, and will
The non-genuine user information of editor is added to the user information list of the authorization login page.
11. applying login method as described in claim 1, which is characterized in that based on described in target user's information registration
First application, comprising:
By the second application to the message identification of target user's information, the application identities of the second application and user second
Identity in is encoded, authorized code;
The first application of triggering obtains interface from the server of the second application based on the authorization code and calls voucher;
The first application of triggering calls voucher to obtain the second target user's information applied from the server based on the interface;
It triggers first application and register is carried out based on target user's information.
12. applying login method as described in claim 1, which is characterized in that select to be used for from the user information list
Log in target user's information of the first application, comprising:
Using the non-genuine user information selected from the user information list as the target user for being used to log in the first application
Information.
13. a kind of apply entering device characterized by comprising
Receiving unit, the authorization logging request initiated for receiving the first application;
Display unit, for according to authorization logging request triggering the second application display user information list, user's letter
Breath list includes multiple for logging in the user information of the first application, wherein multiple user informations include user in the second application
In real user information and user second application in non-genuine user information;
Selecting unit, for selecting target user's information for logging in the first application from the user information list;
Unit is logged in, for being applied based on described in target user's information registration first when detecting license confirmation instruction.
14. a kind of terminal, including processor and memory, the memory is stored with a plurality of instruction, and the processor loads institute
Instruction is stated, 1 to 12 described in any item steps using in login method are required with perform claim.
15. a kind of storage medium, which is characterized in that the storage medium is stored with a plurality of instruction, and described instruction is suitable for processor
It is loaded, 1 to 12 described in any item steps using in login method is required with perform claim.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910252704.0A CN110417723B (en) | 2019-03-29 | 2019-03-29 | Application login method, device, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910252704.0A CN110417723B (en) | 2019-03-29 | 2019-03-29 | Application login method, device, terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110417723A true CN110417723A (en) | 2019-11-05 |
CN110417723B CN110417723B (en) | 2022-05-06 |
Family
ID=68357546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910252704.0A Active CN110417723B (en) | 2019-03-29 | 2019-03-29 | Application login method, device, terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110417723B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110958234A (en) * | 2019-11-22 | 2020-04-03 | 腾讯科技(深圳)有限公司 | Application login control method and device and storage medium |
CN111405016A (en) * | 2020-03-09 | 2020-07-10 | 广州华多网络科技有限公司 | User information acquisition method and related equipment |
CN111970298A (en) * | 2020-08-26 | 2020-11-20 | 腾讯科技(深圳)有限公司 | Application access method and device, storage medium and computer equipment |
CN113536402A (en) * | 2021-07-19 | 2021-10-22 | 军事科学院系统工程研究院网络信息研究所 | Peep-proof display method based on front camera shooting target identification |
US20220100824A1 (en) * | 2020-09-30 | 2022-03-31 | Ricoh Company, Ltd. | Service providing system, information processing system, control method, and medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105812398A (en) * | 2016-06-06 | 2016-07-27 | 百度在线网络技术(北京)有限公司 | Remote login authorization method and remote login authorization device |
CN107438071A (en) * | 2017-07-28 | 2017-12-05 | 北京信安世纪科技有限公司 | cloud storage security gateway and access method |
CN107623690A (en) * | 2017-09-27 | 2018-01-23 | 上海掌门科技有限公司 | Login method, equipment and storage medium |
US20180295124A1 (en) * | 2016-07-07 | 2018-10-11 | Tencent Technology (Shenzhen) Company Limited | Account login connection method and apparatus, and storage medium |
-
2019
- 2019-03-29 CN CN201910252704.0A patent/CN110417723B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105812398A (en) * | 2016-06-06 | 2016-07-27 | 百度在线网络技术(北京)有限公司 | Remote login authorization method and remote login authorization device |
US20180295124A1 (en) * | 2016-07-07 | 2018-10-11 | Tencent Technology (Shenzhen) Company Limited | Account login connection method and apparatus, and storage medium |
CN107438071A (en) * | 2017-07-28 | 2017-12-05 | 北京信安世纪科技有限公司 | cloud storage security gateway and access method |
CN107623690A (en) * | 2017-09-27 | 2018-01-23 | 上海掌门科技有限公司 | Login method, equipment and storage medium |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110958234A (en) * | 2019-11-22 | 2020-04-03 | 腾讯科技(深圳)有限公司 | Application login control method and device and storage medium |
CN111405016A (en) * | 2020-03-09 | 2020-07-10 | 广州华多网络科技有限公司 | User information acquisition method and related equipment |
CN111405016B (en) * | 2020-03-09 | 2023-02-17 | 广州方硅信息技术有限公司 | User information acquisition method and related equipment |
CN111970298A (en) * | 2020-08-26 | 2020-11-20 | 腾讯科技(深圳)有限公司 | Application access method and device, storage medium and computer equipment |
CN111970298B (en) * | 2020-08-26 | 2024-01-05 | 腾讯科技(深圳)有限公司 | Application access method and device, storage medium and computer equipment |
US20220100824A1 (en) * | 2020-09-30 | 2022-03-31 | Ricoh Company, Ltd. | Service providing system, information processing system, control method, and medium |
US11886553B2 (en) * | 2020-09-30 | 2024-01-30 | Ricoh Company, Ltd. | Service providing system, information processing system, control method, and medium |
CN113536402A (en) * | 2021-07-19 | 2021-10-22 | 军事科学院系统工程研究院网络信息研究所 | Peep-proof display method based on front camera shooting target identification |
Also Published As
Publication number | Publication date |
---|---|
CN110417723B (en) | 2022-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110417723A (en) | A kind of application login method, device, terminal and storage medium | |
WO2015070732A1 (en) | Access control system, authorization method and device thereof, and storage medium | |
WO2017084290A1 (en) | Public account two-dimensional code generation method and server, and public account following method, server and terminal | |
CN109587044A (en) | Group creating, method for message interaction and device | |
CN109918030B (en) | File printing method and device | |
JP2005312056A (en) | Communication network system and its control method, mobile object, server, mobile object control program, server control program, and recording medium with the program recorded thereon | |
EP2521333A2 (en) | Methods, Systems, and Apparatus for Content Licensing | |
CN110348236A (en) | A kind of operating right setting method, device and the storage medium of file | |
CN110945863B (en) | Photographing method and terminal equipment | |
CN107864144A (en) | Obtain method and device, computer installation and the storage medium of dynamic password | |
JP2008047022A (en) | Information sharing system by portable terminal device | |
CN109190369A (en) | A kind of camera control method, terminal and computer storage medium | |
CN109889473A (en) | Realize the method and third party's client of information push | |
CN105554064B (en) | The method and device of head portrait is set | |
CN105656627A (en) | Identity verification method, device and system | |
CN104914806B (en) | Via mobile messaging transmission secret/security intermediary system connection people and things | |
CN110457890A (en) | Right management method and device, electronic equipment and storage medium based on multisystem | |
CN107506423A (en) | Photo chooses method, apparatus and storage medium | |
CN111857498B (en) | Data interaction method and device and electronic equipment | |
CN111338971B (en) | Application testing method and device, electronic equipment and storage medium | |
CN104184652A (en) | Method and system for information interaction between terminals | |
CN107305608A (en) | The management method and device of terminal device | |
CN113221195A (en) | Method, device and storage medium for storing business data | |
CN110990821A (en) | Identity type verification method, device and storage medium | |
CN106354365A (en) | Interface selection method and mobile device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |