CN110753347A - Control method and control device for silent authorization - Google Patents

Control method and control device for silent authorization Download PDF

Info

Publication number
CN110753347A
CN110753347A CN201910860228.0A CN201910860228A CN110753347A CN 110753347 A CN110753347 A CN 110753347A CN 201910860228 A CN201910860228 A CN 201910860228A CN 110753347 A CN110753347 A CN 110753347A
Authority
CN
China
Prior art keywords
authorization request
authorization
request
control method
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910860228.0A
Other languages
Chinese (zh)
Other versions
CN110753347B (en
Inventor
刘鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI 2345 NETWORK TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI 2345 NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI 2345 NETWORK TECHNOLOGY Co Ltd filed Critical SHANGHAI 2345 NETWORK TECHNOLOGY Co Ltd
Priority to CN201910860228.0A priority Critical patent/CN110753347B/en
Publication of CN110753347A publication Critical patent/CN110753347A/en
Application granted granted Critical
Publication of CN110753347B publication Critical patent/CN110753347B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a control method of silent authorization, which comprises the following steps: a. judging whether the first authorization request and the second authorization request meet preset conditions or not; b. if the preset condition is met, automatically processing the second authorization request based on the first authorization request, and c, recording the processing result of the second authorization request. The invention has simple use, convenient operation, more effective and safe realization of silent authorization and extremely high commercial value.

Description

Control method and control device for silent authorization
Technical Field
The invention belongs to the technical field of mobile internet, and particularly relates to a control method and a control device for silent authorization.
Background
The authorization function should be the most called function of the public platform every day, which can acquire user information, determine whether to pay attention to the public account, and is also most important for developers: it can take you' only mark on public platform: openid, but many users do not know that authorized login is divided into two categories: the method comprises silent authorization and webpage authorization, wherein the silent authorization does not need user confirmation, only needs a certain webpage accessed by a user, belongs to an authorization form nested in a common webpage, but only can acquire the unique identifier openid of the user, and cannot acquire personal information of the user.
The user accesses a third-party webpage in the client, the public account can acquire basic information of the user through a webpage authorization mechanism, further business logic is achieved, authorized login is very widely applied in daily application, more and more platforms support the user to perform authorized third-party login, one open platform provides a plurality of service interfaces for a plurality of public accounts and service accounts, and the public accounts can provide more personalized and better product service for the user.
The open id is used for the public account to obtain the open id of the attendee after the attendee generates message interaction with the public account, and the same user correspondingly has different open id identifications under different public accounts or mobile applications; a unit id: the unionIDs of the same user under different public accounts or mobile applications are the same; the method has the advantages that if a plurality of public accounts and mobile application accounts need to be communicated to obtain the unique identity unit id, the plurality of public accounts or the mobile application need to be bound on an open platform, and then the unit id can be taken; therefore, if a certain application or service has joint login or even multi-account intercommunication of a plurality of public applications, the user identification and combination of an account system can be carried out by adopting the union id; namely, the platform can perform intercommunication and identification combination based on an account system among a plurality of public numbers through the unit id.
How to better implement the silent authorization becomes a technical problem to be solved urgently at present, and currently, in the prior art, there is no technical scheme capable of solving the above technical problem, and specifically, a control method and a control device for the silent authorization are lacking.
Disclosure of Invention
Aiming at the technical defects in the prior art, the invention aims to provide a silent authorization control method, which comprises the following steps:
a. judging whether the first authorization request and the second authorization request meet preset conditions or not;
b. and if the preset condition is met, automatically processing the second authorization request based on the first authorization request.
Preferably, the step a comprises the steps of:
a1. determining whether a second authorization request exists after processing the first authorization request;
a2. and if the second authorization request exists, judging whether the first authorization request and the second authorization request accord with a preset condition.
Preferably, the step a comprises the steps of:
a1' determining whether there is a first authorization request when processing a second authorization request;
a2', if the first authorization request exists, judging whether the first authorization request and the second authorization request meet preset conditions.
Preferably, in the step a, whether a preset condition is met is judged by:
-the first authorization is visible to the user and is achieved by the user actively clicking an authorization button;
-the second authorization and the first authorization are authorizations for the same principal, requesting the same rights;
-after said first authorization is completed, setting a flag, when a second authorization is initiated, determining whether said flag is present, and if so, determining two successive authorizations;
-determining whether the first authorization request and the second authorization request are requested consecutively.
Preferably, the continuous request is any one of the following cases:
-the first authorization request and the second authorization request are requested within a first threshold time;
-the first authorization request is requested in the same process as the second authorization request;
-the first authorization request is requested in the same web address as the second authorization request; or
-there is no user-issued instruction between the first authorization request and the second authorization request.
Preferably, in the step a, the step of judging whether the first authorization request and the second authorization request meet preset conditions is performed by:
i. and judging whether the first authorization request and the second authorization request are continuously requested in the same container.
Preferably, in the step b, the second authorization request is automatically authorized based on the information corresponding to the first authorization request.
Preferably, the method further comprises the following steps:
c. and recording the processing result of the second authorization request.
According to another aspect of the present invention, there is provided a silence granted control apparatus, including:
the first judging device: judging whether the first authorization request and the second authorization request meet preset conditions or not;
a first processing device: and if the preset condition is met, automatically processing the second authorization request based on the first authorization request.
Preferably, the first judgment means includes:
the first determination means: determining whether a second authorization request exists after processing the first authorization request;
second judging means: and if the second authorization request exists, judging whether the first authorization request and the second authorization request accord with a preset condition.
Preferably, the first judgment means includes:
a third judging device: judging whether a first authorization request exists or not when the second authorization request is processed;
a fourth judging device: if the first authorization request exists, whether the first authorization request and the second authorization request meet preset conditions is judged.
Preferably, the method further comprises the following steps:
a second processing device: and recording the processing result of the second authorization request.
The invention discloses a control method of silent authorization, which comprises the following steps: judging whether the first authorization request and the second authorization request meet preset conditions or not; and if the preset condition is met, automatically processing the second authorization request based on the first authorization request. The invention has simple use, convenient operation, more effective and safe realization of silent authorization and extremely high commercial value.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
fig. 1 is a schematic flowchart illustrating a control method of a silent grant according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a specific process for determining whether the first authorization request and the second authorization request meet a preset condition according to the first embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a specific process of determining whether the first authorization request and the second authorization request meet a preset condition according to a second embodiment of the present invention; and
fig. 4 is a block diagram of a control device with silent authorization according to another embodiment of the present invention.
Detailed Description
In order to better and clearly show the technical scheme of the invention, the invention is further described with reference to the attached drawings.
The skilled person understands that, in view of the deficiencies of the prior art, the present invention discloses a method for controlling a silent authorization, and fig. 1 shows a specific flow diagram of a method for controlling a silent authorization according to an embodiment of the present invention, specifically, the method includes the following steps:
firstly, step S101 is entered, and whether a first authorization request and a second authorization request meet a preset condition is determined, and a person skilled in the art understands that the first authorization request and the second authorization request are request information which is based on a user requirement and further allows a user to fulfill and process the user requirement based on authorization request information. In other embodiments, the authorization manners described in the present invention include, but are not limited to, two, and three, four, or more authorization manners, which do not affect the specific implementation of the present invention, and are not described herein again.
Further, in the step S101, whether the preset condition is met may be determined in many ways, and the following ways may be used alone as a determination form, or any number of ways may be combined to form a composite determination form, as a preferred embodiment, the first authorization is visible to the user and is implemented by the user actively clicking an authorization button, in such an embodiment, the first authorization is known and obvious to the user, and the system actively informs the user through a pop-up window, a floating window or an interface, and the user further performs active authorization through clicking as a preset condition, and the later-described embodiment may use the preset condition as a sufficient necessary condition.
As another preset condition, the second authorization and the first authorization are to authorize the same subject, and the requested rights are the same, in such a preset condition, the same subject is the authorized subject, such as panning, wechat, and the like.
As another preset condition, after the first authorization is completed, a flag is set, when the second authorization is initiated, whether the flag exists is determined, if the flag exists, two successive authorizations are determined, in such an embodiment, the flag is a flag, and when the first authorization is completed, the flag is marked, and when the second authorization exists, the two authorizations are determined to be successive.
As another preset condition, it is determined whether the first authorization request and the second authorization request are continuously requested, and in such a preset condition, the continuous requests may be that the first authorization request and the second authorization request are requested within a first threshold time, that is, the first authorization request and the second authorization request are requested within a first threshold time, and then are determined as continuous requests, where the first threshold time may be 1s, 5s, 10s, or more.
Further, the continuous request may also be that the first authorization request and the second authorization request are requested in the same process, and if the first authorization request and the second authorization request are in the same process, the first authorization request and the second authorization request may be considered to be continuous requests.
Further, the continuous request may also be that the first authorization request and the second authorization request are requested in the same web address, and if the first authorization request and the second authorization request have the same web address, the continuous request may also be regarded as a continuous request.
Further, the continuous request may also be an instruction that is not issued by the user between the first authorization request and the second authorization request, both of the two authorizations should be actively triggered by the client, and no other operation is performed between the two requests, and the user cannot perform other operations between the two requests.
Further, in the step S101, the step of determining whether the first authorization request and the second authorization request meet the preset condition is performed by determining whether the first authorization request and the second authorization request are continuously requested in the same container, and if not, it means that the first authorization request and the second authorization request are not authorization requests initiated by the same client.
Then, step S102 is performed, if the preset conditions are met, the second authorization request is automatically processed based on the first authorization request, in step S102, that is, in order to implement silent authorization, the second authorization request is automatically authorized based on information corresponding to the first authorization request, for example, panning authorization and wechat authorization, where the preset conditions are preset conditions in the specific embodiment in step S101, and in such an embodiment, the preset conditions may be any one of the preset conditions, or any plurality of the preset conditions.
Finally, step S103 is entered, and the processing result of the second authorization request is recorded. Specifically, since the second authorization request is authorized, the result of the second authorization request needs to be saved and saved, and specifically, after the second authorization is successful, the user is prompted to be authorized successfully through the toast.
Fig. 2 shows a specific flowchart illustrating a first embodiment of the present invention for determining whether a first authorization request and a second authorization request meet a preset condition, and those skilled in the art understand that fig. 2 is a preferred embodiment of step S101 of the present invention, and specifically includes the following steps:
first, step S1011 is proceeded to determine whether there is a second authorization request after processing the first authorization request, that is, after the user passively receives a command sent by the system and needing to process the first authorization request, the user authorizes the first authorization request, and further determines whether there is a second authorization request after the first authorization request, if yes, step S1012 is executed, and if not, no processing is executed.
Then, step S1012 is performed, and if the second authorization request exists, it is determined whether the first authorization request and the second authorization request meet a preset condition, and reference may be made to the foregoing embodiment for determining whether the first authorization request and the second authorization request meet the preset condition, which is not described herein again.
Fig. 3 shows a schematic flowchart of a second embodiment of the present invention, which is a specific flowchart for determining whether the first authorization request and the second authorization request meet the preset condition, as another preferred embodiment, fig. 2 and fig. 3 are parallel relations, which are specific embodiments for implementing step S101, specifically:
first, the process proceeds to step S1013, and whether or not a first authorization request exists is determined when a second authorization request is processed, and continuity between the first authorization request and the second authorization request is determined similarly to step S1011, but determination is made when a second authorization request is processed, unlike step S1011.
Then, step S1014 is executed, if the first authorization request exists, whether the first authorization request and the second authorization request meet a preset condition is determined, and reference may be made to the foregoing embodiment for determining whether the first authorization request and the second authorization request meet the preset condition, which is not described herein again.
Those skilled in the art understand that, the two authorizations of the preset condition shown in the present invention are both initiated by the client actively, the two authorizations are authorized to the same subject for the same authority, the server cloud control switch is turned on, the client is allowed to perform silent authorization, the first authorization must be visible to the user, and the user actively clicks the authorization, the authorization is successful, the second authorization is to open an H5 page for authorization, and there is no other operation between the two authorizations, that is: and after the first authorization is successful, the client immediately pulls up the second authorization, and the user does not perform other operations in the middle.
Further, in the embodiment of continuous request, in a preferred embodiment, when the user clicks the coupon, the authorization of sdk is pulled up, and after the user authorization succeeds, the authorization of XX is pulled up immediately, the authorization page may be an H5 page, the authorization content is consistent with the authorization of XX, both of the two authorizations are authorized to give the treasure, and are authorized for the same authority, but because of different services, the two authorizations must be performed twice, and cannot be removed directly, in this scenario, when the client determines that the user has just performed the first authorization, the client may directly silence to help the user to complete the second authorization, and the user does not need to see the H5 page of the second authorization.
Furthermore, the technical scheme is as follows: the continuous request means that a user opens a first authorization page, and after the authorization is successful, a second authorization request is initiated in a callback method of the successful authorization, when the first authorization is successful, a flag bit is set at a client, when the second authorization request is initiated, the flag bit is judged, if the flag bit exists, two continuous authorizations are defined, the two authorizations are actively triggered by the client, other operations are not performed between the two requests, and the user cannot perform other operations between the two requests.
Furthermore, the overall technical scheme of the invention is as follows: firstly, when a user starts an APP, a switch data is requested, whether a silent authorization switch is opened or not is acquired, then, the user operates and triggers authorization, a first authorization page is opened, the user actively clicks to authorize, next, after the first authorization is successful, a flag bit is set in a successful callback method, the flag bit marks the first authorization, and simultaneously initiates a second authorization request, then, whether the silent authorization is allowed or not is judged according to the state and the flag bit of the cloud control switch issued before, the silent authorization is allowed to be performed for the second time, only when the cloud control switch is opened and the flag bit exists, the silent authorization is allowed to be performed for the second time, if the silent authorization is allowed to be performed for the second time, a loading animation is displayed, the silent user is helped to authorize, the user is prompted to be successfully authorized after the authorization is successful, and if the silent authorization is not allowed, an H5 page is opened, the user actively clicks the authorization, furthermore, the two authorization requests are actively initiated by the client, and the client does not perform other operations between the two authorizations and does not allow the user to perform other operations.
Fig. 4 is a schematic block connection diagram of a control device for silent authorization according to another embodiment of the present invention, and according to another aspect of the present invention, there is provided a control device for silent authorization, including a first determining device: whether the first authorization request and the second authorization request meet the preset condition is determined, and the specific working principle of the first determining device may refer to the specific implementation manner in the step S101, which is not described herein again.
Further, the control device further includes a first processing device, and if the preset condition is met, the second authorization request is automatically processed based on the first authorization request, and a specific working principle of the first processing device may refer to the specific implementation manner in step S102, which is not described herein again.
Further, the first judgment means includes first determination means for: after the first authorization request is processed, it is determined whether a second authorization request exists, and the specific operation principle of the first determining device may refer to the specific implementation manner in the foregoing step S1011, which is not described herein again.
Further, the first judgment means includes second judgment means: if the second authorization request exists, it is determined whether the first authorization request and the second authorization request meet a preset condition, and the specific working principle of the second determining device may refer to the specific implementation manner in step S1012, which is not described herein again.
Further, the first judgment means includes third judgment means: the specific working principle of the third determining device may refer to the specific implementation manner in the foregoing step S1013, and details thereof are not repeated herein.
Further, the first judgment means includes fourth judgment means: if the first authorization request exists, it is determined whether the first authorization request and the second authorization request meet a preset condition, and the specific working principle of the fourth determining device may refer to the specific implementation manner in step S1014, which is not described herein again.
Further, the control device further includes a second processing device: the processing result of the second authorization request is recorded, and the specific working principle of the second processing device may refer to the specific implementation manner in step S103, which is not described herein again.
The foregoing description of specific embodiments of the present invention has been presented. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes and modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention.

Claims (12)

1. A method for controlling a silence grant, comprising the steps of:
a. judging whether the first authorization request and the second authorization request meet preset conditions or not;
b. and if the preset condition is met, automatically processing the second authorization request based on the first authorization request.
2. The control method according to claim 1, wherein the step a includes the steps of:
a1. determining whether a second authorization request exists after processing the first authorization request;
a2. and if the second authorization request exists, judging whether the first authorization request and the second authorization request accord with a preset condition.
3. The control method according to claim 1, wherein the step a includes the steps of:
a1' determining whether there is a first authorization request when processing a second authorization request;
a2', if the first authorization request exists, judging whether the first authorization request and the second authorization request meet preset conditions.
4. The control method according to any one of claims 1 to 3, characterized in that whether a preset condition is met is judged in the step a by:
-the first authorization is visible to the user and is achieved by the user actively clicking an authorization button;
-the second authorization and the first authorization are authorizations for the same principal, requesting the same rights;
-after said first authorization is completed, setting a flag, when a second authorization is initiated, determining whether said flag is present, and if so, determining two successive authorizations;
-determining whether the first authorization request and the second authorization request are requested consecutively.
5. The control method according to claim 4, wherein the continuous request is any one of:
-the first authorization request and the second authorization request are requested within a first threshold time;
-the first authorization request is requested in the same process as the second authorization request;
-the first authorization request is requested in the same web address as the second authorization request; or
-there is no user-issued instruction between the first authorization request and the second authorization request.
6. The control method according to claim 4 or 5, wherein the step of determining whether the first authorization request and the second authorization request meet preset conditions is performed in the step a by:
i. and judging whether the first authorization request and the second authorization request are continuously requested in the same container.
7. The control method according to any one of claims 1 to 6, characterized in that in the step b, the second authorization request is automatically authorized based on information corresponding to the first authorization request.
8. The control method according to any one of claims 1 to 7, characterized by further comprising the steps of:
c. and recording the processing result of the second authorization request.
9. A silent grant control apparatus that employs the control method of any one of claims 1 to 8, characterized by comprising:
first determination device (1): judging whether the first authorization request and the second authorization request meet preset conditions or not;
first treatment device (2): and if the preset condition is met, automatically processing the second authorization request based on the first authorization request.
10. The control device according to claim 9, wherein the first judgment device (1) includes:
first determination means (11): determining whether a second authorization request exists after processing the first authorization request;
second determination means (12): and if the second authorization request exists, judging whether the first authorization request and the second authorization request accord with a preset condition.
11. The control device according to claim 9, wherein the first judgment device (1) includes:
third judgment means (13): judging whether a first authorization request exists or not when the second authorization request is processed;
fourth judgment means (14): if the first authorization request exists, whether the first authorization request and the second authorization request meet preset conditions is judged.
12. The control device according to claim 9, characterized by further comprising:
second treatment device (3): and recording the processing result of the second authorization request.
CN201910860228.0A 2019-09-11 2019-09-11 Control method and control device for silence authorization Active CN110753347B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910860228.0A CN110753347B (en) 2019-09-11 2019-09-11 Control method and control device for silence authorization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910860228.0A CN110753347B (en) 2019-09-11 2019-09-11 Control method and control device for silence authorization

Publications (2)

Publication Number Publication Date
CN110753347A true CN110753347A (en) 2020-02-04
CN110753347B CN110753347B (en) 2024-01-12

Family

ID=69276387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910860228.0A Active CN110753347B (en) 2019-09-11 2019-09-11 Control method and control device for silence authorization

Country Status (1)

Country Link
CN (1) CN110753347B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7120933B2 (en) * 2001-11-23 2006-10-10 Protegrity Corporation Method for intrusion detection in a database system
US7502760B1 (en) * 2004-07-19 2009-03-10 Amazon Technologies, Inc. Providing payments automatically in accordance with predefined instructions
US20090119500A1 (en) * 2007-11-02 2009-05-07 Microsoft Corporation Managing software configuration using mapping and repeatable processes
US7797740B2 (en) * 2006-01-06 2010-09-14 Nokia Corporation System and method for managing captured content
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
CN105373723A (en) * 2014-08-27 2016-03-02 阿里巴巴集团控股有限公司 Automatic authorization method and device of equipment
US20170019409A1 (en) * 2014-04-02 2017-01-19 Open Garden Inc. System and method for access control via social networking
CN106788749A (en) * 2017-02-09 2017-05-31 上海斐讯数据通信技术有限公司 A kind of method and system for automatically configuring and reclaiming of FTTH terminals vlan information
CN106953831A (en) * 2016-01-06 2017-07-14 阿里巴巴集团控股有限公司 A kind of authorization method of user resources, apparatus and system
CN106973108A (en) * 2017-03-30 2017-07-21 上海曜致投资中心(有限合伙) The method and system of general across public number unification user account number in wechat public platform
CN107277067A (en) * 2017-08-11 2017-10-20 四川长虹电器股份有限公司 Third party system docking calculation based on unitized overall development person's account
CN107483509A (en) * 2017-10-09 2017-12-15 武汉斗鱼网络科技有限公司 A kind of auth method, server and readable storage medium storing program for executing
CN108733991A (en) * 2017-04-19 2018-11-02 腾讯科技(深圳)有限公司 Web application access method and device, storage medium
CN109032617A (en) * 2018-06-21 2018-12-18 上海二三四五网络科技有限公司 A kind of control method being automatically deleted installation kit and control device
CN109525561A (en) * 2018-10-26 2019-03-26 深圳点猫科技有限公司 It is a kind of for educating the authorization login method and device of operating system
US20190122219A1 (en) * 2017-10-24 2019-04-25 Ca, Inc. System and method for registering and authorizing secondary computing devices for conducting transactions
CN109995755A (en) * 2019-02-20 2019-07-09 深圳点猫科技有限公司 A kind of control method and device of the logging state based on small routine framework

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7120933B2 (en) * 2001-11-23 2006-10-10 Protegrity Corporation Method for intrusion detection in a database system
US7502760B1 (en) * 2004-07-19 2009-03-10 Amazon Technologies, Inc. Providing payments automatically in accordance with predefined instructions
US7797740B2 (en) * 2006-01-06 2010-09-14 Nokia Corporation System and method for managing captured content
US20090119500A1 (en) * 2007-11-02 2009-05-07 Microsoft Corporation Managing software configuration using mapping and repeatable processes
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
US20170019409A1 (en) * 2014-04-02 2017-01-19 Open Garden Inc. System and method for access control via social networking
CN105373723A (en) * 2014-08-27 2016-03-02 阿里巴巴集团控股有限公司 Automatic authorization method and device of equipment
CN106953831A (en) * 2016-01-06 2017-07-14 阿里巴巴集团控股有限公司 A kind of authorization method of user resources, apparatus and system
CN106788749A (en) * 2017-02-09 2017-05-31 上海斐讯数据通信技术有限公司 A kind of method and system for automatically configuring and reclaiming of FTTH terminals vlan information
CN106973108A (en) * 2017-03-30 2017-07-21 上海曜致投资中心(有限合伙) The method and system of general across public number unification user account number in wechat public platform
CN108733991A (en) * 2017-04-19 2018-11-02 腾讯科技(深圳)有限公司 Web application access method and device, storage medium
CN107277067A (en) * 2017-08-11 2017-10-20 四川长虹电器股份有限公司 Third party system docking calculation based on unitized overall development person's account
CN107483509A (en) * 2017-10-09 2017-12-15 武汉斗鱼网络科技有限公司 A kind of auth method, server and readable storage medium storing program for executing
US20190122219A1 (en) * 2017-10-24 2019-04-25 Ca, Inc. System and method for registering and authorizing secondary computing devices for conducting transactions
CN109032617A (en) * 2018-06-21 2018-12-18 上海二三四五网络科技有限公司 A kind of control method being automatically deleted installation kit and control device
CN109525561A (en) * 2018-10-26 2019-03-26 深圳点猫科技有限公司 It is a kind of for educating the authorization login method and device of operating system
CN109995755A (en) * 2019-02-20 2019-07-09 深圳点猫科技有限公司 A kind of control method and device of the logging state based on small routine framework

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
AIQIN SHI ECT.: "Construction of University Campus Public Information System of Service Design", 《2017 9TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA)》 *
邢如意: "基于微信公众平台的分销系统的分析与设计", 《现代信息科技》 *
邢如意: "基于微信公众平台的分销系统的分析与设计", 《现代信息科技》, no. 08, 25 April 2019 (2019-04-25) *
马玉波;陈萌;: "基于微信公众平台Oauth 2.0授权管理技术开发高校综合性学业引导与服务平台的初探", 知识文库, no. 21 *
黄雨生;: "微信网页授权模式下图书馆信息服务的设计与实现", 图书馆学刊, no. 05 *

Also Published As

Publication number Publication date
CN110753347B (en) 2024-01-12

Similar Documents

Publication Publication Date Title
US10904183B2 (en) Point in time expression of emotion data gathered from a chat session
JP7381434B2 (en) User interface for devices requesting remote authorization
CN107948131B (en) Method, system and equipment for logging user in browser
US8468576B2 (en) System and method for application-integrated information card selection
KR101973923B1 (en) Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
TWI575919B (en) Authorizing push notifications for websites
CN102104607B (en) Method, device and system for controlling safety of service access
EP3554034A1 (en) Method and device for authenticating login
CN113691444A (en) Instant messaging system for organizations
JP2019508794A (en) Resource sharing method, resource acquisition method, terminal, and server
CN105874462A (en) Notification of application permissions
CN103546489B (en) Method, server and system for authority control
CN107924449A (en) A kind of notification message processing method, device and terminal
CN108549799A (en) Management method, device, terminal and the computer storage media of Android permission
CN103971051A (en) Document isolation method, device and system
WO2022247503A1 (en) Data content processing method and apparatus, terminal, and storage medium
CN107391020A (en) The method, apparatus and terminal of virtual objects bag are got in triggering
WO2017092228A1 (en) Method and device for performing security operation on file, and terminal
US20180255173A1 (en) Information pushing method and apparatus, and terminal and server
CN114374560A (en) Data processing method, device and storage medium
CN110753347A (en) Control method and control device for silent authorization
US9686212B2 (en) Systems, methods and interfaces for using a messaging program across a multiple applications and communications environment
US20160182933A1 (en) Method and System for Distributing and Playing Media
WO2018213309A1 (en) Method and apparatus for storing and sending a computer location
US10931670B1 (en) Uniform resource locator (URL) transformation and redirection with access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant