CN110753347B - Control method and control device for silence authorization - Google Patents

Control method and control device for silence authorization Download PDF

Info

Publication number
CN110753347B
CN110753347B CN201910860228.0A CN201910860228A CN110753347B CN 110753347 B CN110753347 B CN 110753347B CN 201910860228 A CN201910860228 A CN 201910860228A CN 110753347 B CN110753347 B CN 110753347B
Authority
CN
China
Prior art keywords
authorization request
authorization
request
preset condition
judging whether
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910860228.0A
Other languages
Chinese (zh)
Other versions
CN110753347A (en
Inventor
刘鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai 2345 Network Technology Co ltd
Original Assignee
Shanghai 2345 Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai 2345 Network Technology Co ltd filed Critical Shanghai 2345 Network Technology Co ltd
Priority to CN201910860228.0A priority Critical patent/CN110753347B/en
Publication of CN110753347A publication Critical patent/CN110753347A/en
Application granted granted Critical
Publication of CN110753347B publication Critical patent/CN110753347B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a control method of silence authorization, which comprises the following steps: a. judging whether the first authorization request and the second authorization request accord with preset conditions or not; b. and if the preset condition is met, automatically processing the second authorization request based on the first authorization request, and c, recording the processing result of the second authorization request. The method is simple to use, convenient to operate, capable of realizing silence authorization more effectively and safely, and has extremely high commercial value.

Description

Control method and control device for silence authorization
Technical Field
The invention belongs to the technical field of mobile internet, and particularly relates to a control method and a control device for silence authorization.
Background
The authorization function should be the most frequently called function of the public platform, which can acquire user information, determine whether to pay attention to public account, and is also the most important for the developer: it can take you' unique mark on public platform: openid, but many users do not know that authorized logins fall into two categories: the method comprises the steps of silence authorization and webpage authorization, wherein the silence authorization does not need user confirmation, only needs a user to access a certain webpage, belongs to an authorization form nested in a common webpage, but only can obtain a unique mark openid of the user, and cannot obtain personal information of the user.
The user accesses the third-party webpage in the client, the public account can acquire the user basic information through a webpage authorization mechanism, so that business logic is realized, authorized login is very widely applied in daily application, more and more platforms support the user to perform authorized third-party login, one open platform is a plurality of public accounts, a plurality of service interfaces are opened for the service account, and the public account can provide more individual and better-quality product services for the user.
After the attention person and the public account generate message interaction, the public account can acquire the open id of the attention person, and the same user corresponds to different open id identifications under different public accounts or mobile applications; unit id: the same user has the same unionID under different public account numbers or mobile applications; if a plurality of public account numbers and mobile application accounts are needed to be communicated to obtain a unique identity identification unit id, the public account numbers or the mobile application are needed to be bound on an open platform, and then the unique identity identification unit id can be obtained only by people; therefore, if a certain application or service has joint login and even multi-account intercommunication of a plurality of public applications, the user identification and combination of an account system can be carried out by adopting a unit id; that is, the platform can perform account system intercommunication and identification combination based on a plurality of public numbers through the unit id.
How to better realize the silence authorization becomes the technical problem to be solved at present, and in the prior art, there is no technical solution capable of solving the technical problem, and in particular, a control method and a control device for the silence authorization are lacking.
Disclosure of Invention
Aiming at the technical defects existing in the prior art, the invention aims to provide a control method for silent authorization, which comprises the following steps:
a. judging whether the first authorization request and the second authorization request accord with preset conditions or not;
b. and if the preset condition is met, automatically processing the second authorization request based on the first authorization request.
Preferably, the step a includes the steps of:
a1. determining whether a second authorization request exists after processing the first authorization request;
a2. if the second authorization request exists, judging whether the first authorization request and the second authorization request accord with a preset condition or not.
Preferably, the step a includes the steps of:
a1'. Judging whether a first authorization request exists when processing a second authorization request;
a2'. If the first authorization request exists, judging whether the first authorization request and the second authorization request accord with preset conditions.
Preferably, in the step a, it is determined whether the preset condition is met by:
-the first authorization is visible to the user and is effected by the user actively clicking an authorization button;
-said second authorization and said first authorization are to authorize the same principal, requesting the same rights;
-after completion of said first authorization, setting a flag bit, when initiating a second authorization, determining if said flag bit is present, if so, determining to be two consecutive authorizations;
-determining whether the first and second grant requests are consecutively requested.
Preferably, the continuous request is any one of the following:
-the first authorization request and the second authorization request are requested within a first threshold time;
-the first authorization request is requested in the same process as the second authorization request;
-the first authorization request is requested in the same web page address as the second authorization request; or alternatively
-there is no instruction issued by the user between the first authorization request and the second authorization request.
Preferably, the step of determining whether the first authorization request and the second authorization request meet a preset condition is performed in the step a by:
i. it is determined whether the first authorization request and the second authorization request are consecutively requested in the same container.
Preferably, in the step b, the second authorization request is automatically authorized based on information corresponding to the first authorization request.
Preferably, the method further comprises the following steps:
c. recording the processing result of the second authorization request.
According to another aspect of the present invention, there is provided a control apparatus for silence authorization, including:
first judgment means: judging whether the first authorization request and the second authorization request accord with preset conditions or not;
first processing means: and if the preset condition is met, automatically processing the second authorization request based on the first authorization request.
Preferably, the first judging device includes:
first determining means: determining whether a second authorization request exists after processing the first authorization request;
and a second judgment device: if the second authorization request exists, judging whether the first authorization request and the second authorization request accord with a preset condition or not.
Preferably, the first judging device includes:
third judgment means: judging whether the first authorization request exists or not when the second authorization request is processed;
fourth judgment means: if the first authorization request exists, judging whether the first authorization request and the second authorization request accord with preset conditions or not.
Preferably, the method further comprises:
and a second processing device: recording the processing result of the second authorization request.
The invention discloses a control method for silence authorization, which comprises the following steps: judging whether the first authorization request and the second authorization request accord with preset conditions or not; and if the preset condition is met, automatically processing the second authorization request based on the first authorization request. The method is simple to use, convenient to operate, capable of realizing silence authorization more effectively and safely, and has extremely high commercial value.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments, given with reference to the accompanying drawings in which:
fig. 1 is a schematic flow diagram of a control method for silent grant according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a specific process for determining whether a first authorization request and a second authorization request meet a preset condition according to a first embodiment of the present invention;
fig. 3 is a schematic flowchart of a specific process for determining whether a first authorization request and a second authorization request meet a preset condition according to a second embodiment of the present invention; and
fig. 4 shows a schematic diagram of module connection of a control device for silent grant according to another embodiment of the present invention.
Detailed Description
In order to better and clearly show the technical scheme of the invention, the invention is further described below with reference to the accompanying drawings.
It is understood by those skilled in the art that, in order to overcome the shortcomings of the prior art, the present invention discloses a method for controlling silence authorization, and fig. 1 shows a specific flow diagram of a method for controlling silence authorization according to a specific embodiment of the present invention, specifically, the method includes the following steps:
firstly, step S101 is entered, whether the first authorization request and the second authorization request meet a preset condition is determined, and those skilled in the art understand that the first authorization request and the second authorization request are request information based on user requirements and further allow a user to meet and process the user requirements based on authorization request information. In other embodiments, the authorization means described in the present invention includes, but is not limited to, two, three, four or more, which do not affect the specific embodiments of the present invention, and are not described herein.
Further, in the step S101, whether the preset condition is met may be determined in a plurality of ways, and the ways may be taken as a single determination form, or any plurality of ways may be combined into a composite determination form, as a preferred embodiment, the first authorization is visible to the user and is implemented by the user actively clicking the authorization button, in such an embodiment, the first authorization is known and obvious to the user, and the system actively informs the user through a pop window, a floating window or an interface, etc., and the user further performs active authorization through clicking, as a preset condition, and the later-described embodiment may take this preset condition as a sufficient necessary condition.
As another preset condition, the second authorization and the first authorization are to authorize the same entity, and the requested authorities are the same, in such preset condition, the same entity is an authorized entity, such as panning, weChat, etc.
As another preset condition, after the first authorization is completed, a flag bit is set, when a second authorization is initiated, it is determined whether the flag bit exists, if the flag bit exists, it is determined that two consecutive authorizations are performed, in such an embodiment, the flag bit is a flag, when the first authorization is completed, it is marked, and when the second authorization is performed, if the flag exists, it is determined that the two authorizations are continuous.
As another preset condition, it is determined whether the first and second grant requests are continuously requested, and in such preset condition, the continuous requests may be that the first and second grant requests are requested within a first threshold time, that is, the first and second grant requests are requested within a first threshold time, which may be 1s, 5s, 10s or more.
Further, the continuous request may be that the first authorization request and the second authorization request are requested in the same process, and if the first authorization request and the second authorization request are in the same process, the first authorization request and the second authorization request may be considered to be continuous requests.
Further, the continuous request may be that the first authorization request and the second authorization request are requested in the same web address, and if the first authorization request and the second authorization request have the same web address, the continuous request may also be considered as a continuous request.
Further, the continuous request may also be that no instruction issued by the user exists between the first authorization request and the second authorization request, both the two authorizations should be actively triggered by the client, no other operation is performed between the two requests, and no other operation is performed between the two requests by the user.
Further, in the step S101, the step of determining whether the first authorization request and the second authorization request meet a preset condition is performed by determining whether the first authorization request and the second authorization request are continuously requested in the same container, if they are not in the same container, that is, it means that they are not authorization requests initiated by the same client, in which case, no processing is generally performed.
Then, step S102 is entered, and if the preset condition is met, the second authorization request is automatically processed based on the first authorization request, in step S102, that is, in order to implement silent authorization, the second authorization request is automatically authorized based on the information corresponding to the first authorization request, for example, the panning authorization and the WeChat authorization, where the preset condition is the preset condition in the specific embodiment in step S101, and in such an embodiment, any one of the preset conditions may be also any multiple of the preset conditions.
Finally, step S103 is performed to record the processing result of the second authorization request. Specifically, since the second authorization request is authorized, the result of the second authorization request needs to be saved, and a file is reserved, specifically, after the second authorization is successful, the user is prompted that the authorization is successful through a tool.
Fig. 2 is a schematic flowchart of a specific process for determining whether the first authorization request and the second authorization request meet the preset conditions according to the first embodiment of the present invention, and it is understood by those skilled in the art that fig. 2 is a preferred embodiment of step S101 of the present invention, specifically, the method includes the following steps:
first, step S1011 is performed, where after the first authorization request is processed, it is determined whether a second authorization request exists, that is, after the user passively receives a command sent by the system and requiring processing of the first authorization request, the first authorization request is authorized, and further it is determined whether a second authorization request exists after the first authorization request, if so, step S1012 is performed, and if not, no processing is performed.
Then, step S1012 is performed, if the second authorization request exists, then it is determined whether the first authorization request and the second authorization request meet the preset condition, and the determination of whether the first authorization request and the second authorization request meet the preset condition may refer to the foregoing embodiments, which are not repeated herein.
Fig. 3 is a schematic flowchart of a second embodiment of the present invention for determining whether the first authorization request and the second authorization request meet the preset condition, and as another preferred embodiment, fig. 2 and fig. 3 are parallel relations, which are specific embodiments for implementing step S101, specifically:
first, step S1013 is performed to determine whether or not a first authorization request exists when processing a second authorization request, and similar to step S1011, continuity between the first authorization request and the second authorization request is determined, but unlike step S1011, determination is performed when processing a second authorization request.
Then, step S1014 is performed, if the first authorization request exists, then it is determined whether the first authorization request and the second authorization request meet the preset condition, and the determination of whether the first authorization request and the second authorization request meet the preset condition may refer to the foregoing embodiments, which are not repeated herein.
Those skilled in the art understand that, in the present invention, two authorizations of the preset condition are actively initiated by the client, the two authorizations are aimed at the same right, the two authorizations are authorized to the same main body, the server cloud control switch is opened, the client is allowed to perform silent authorization, the first authorization must be visible to the user, and the user actively clicks the authorization, the authorization is successful, the second authorization is to open an H5 page for authorization, and no other operation exists between the two authorizations, namely: after the first authorization is successful, the client immediately pulls up the second authorization without other operations in the middle.
Further, in a specific embodiment of the continuous request, in a preferred embodiment, when the user clicks the coupon, the user pulls up sdk authorization, and immediately after the user's authorization is successful, the authorization page may be an H5 page, the authorization content is consistent with the authorization of the user, and the two authorizations are both authorized to the panning device and are the same authorization, but are different services, and therefore, the user must perform two steps and cannot directly remove the authorization, in this scenario, the client directly quiesces to help the user complete the second authorization when judging that the user just performed the first authorization, and the user does not need to see the H5 page of the second authorization.
Further, the technical scheme is as follows: the continuous request means that after the user opens a first authorization page and the authorization is successful, a second authorization request is initiated in a callback method of the successful authorization, when the first authorization is successful, a flag bit is set at the client, the flag bit is judged when the second authorization request is initiated, if the flag bit exists, the two continuous authorizations are defined, the two authorizations are actively triggered by the client, no other operation is performed between the two requests, and the user cannot perform other operations between the two requests.
Furthermore, the whole technical scheme of the invention is as follows: firstly, when a user starts an APP, a switch data is requested to acquire whether a silent authorization switch is opened or not, then, user operation triggers authorization, a first authorization page is opened first, the user actively clicks to authorize, then, after the first authorization succeeds, a flag bit is set in a successful callback method, the user actively clicks to authorize, a first authorization is carried out by a flag, a second authorization request is initiated at the same time, then, whether the silent operation is allowed to carry out the second authorization is judged through the state of a cloud control switch and the flag bit which are issued before, only the cloud control switch is opened and the flag bit exists, the silent operation is allowed to carry out the second authorization, if the silent operation is allowed to carry out the second authorization, a loading animation is displayed, the silent operation helps the user to carry out the authorization, after the authorization succeeds, if the silent operation is not allowed to carry out, an H5 page is opened, the user actively clicks to authorize, further, the two authorization requests are actively initiated by a client, no other operation is carried out between the two times of authorization, and the user is not allowed to carry out other operations.
Fig. 4 is a schematic block diagram of a control device for silence authorization according to another embodiment of the present invention, where according to another aspect of the present invention, there is provided a control device for silence authorization, including a first determining device: the specific operation principle of the first determining device may refer to the specific implementation manner in the step S101, and will not be described herein.
Further, the control device further includes a first processing device, if the preset condition is met, the second authorization request is automatically processed based on the first authorization request, and the specific working principle of the first processing device may refer to the specific implementation in the foregoing step S102, which is not repeated herein.
Further, the first judging means includes first determining means: after processing the first authorization request, it is determined whether the second authorization request exists, and the specific working principle of the first determining device may refer to the specific implementation in step S1011, which is not described herein.
Further, the first judging means includes second judging means: if the second authorization request exists, it is determined whether the first authorization request and the second authorization request meet a preset condition, and the specific working principle of the second determining device may refer to the specific implementation manner in the step S1012, which is not described herein.
Further, the first judging means includes third judging means: the specific operation principle of the third determining device may refer to the specific implementation manner in step S1013, and will not be described herein.
Further, the first judging means includes fourth judging means: if the first authorization request exists, it is determined whether the first authorization request and the second authorization request meet a preset condition, and the specific working principle of the fourth determining device may refer to the specific implementation in the step S1014, which is not described herein.
Further, the control device further comprises a second processing device: the specific working principle of the second processing device may refer to the specific implementation manner in step S103, which is not described herein.
The foregoing describes specific embodiments of the present invention. It is to be understood that the invention is not limited to the particular embodiments described above, and that various changes and modifications may be made by one skilled in the art within the scope of the claims without affecting the spirit of the invention.

Claims (10)

1. A method for controlling silence authorization, comprising the steps of:
a. judging whether the first authorization request and the second authorization request accord with preset conditions or not;
b. if the preset condition is met, automatically authorizing the second authorization request based on the information corresponding to the first authorization request;
wherein, the step a comprises the following steps:
a1'. Judging whether a first authorization request exists when processing a second authorization request;
a2'. If the first authorization request exists, judging whether the first authorization request and the second authorization request are continuously requested;
a3'. If the first authorization request and the second authorization request are continuously requested, further judging whether the first authorization request and the second authorization request meet a preset condition;
the preset conditions at least comprise the following conditions that the second authorization and the first authorization are the same main body for authorization, and the requested rights are the same.
2. The control method according to claim 1, wherein the step a includes the steps of:
a1. determining whether a second authorization request exists after processing the first authorization request;
a2. if the second authorization request exists, judging whether the first authorization request and the second authorization request accord with a preset condition or not.
3. The control method according to claim 1 or 2, characterized in that in step a, it is further determined whether a preset condition is met by:
-the first authorization is visible to the user and is effected by the user actively clicking an authorization button;
-after completion of said first authorization, setting a flag bit, when initiating a second authorization, determining if said flag bit is present, if it is present, determining to be two consecutive authorizations.
4. A control method according to claim 3, characterized in that the continuous request is any one of the following cases:
-the first authorization request and the second authorization request are requested within a first threshold time;
-the first authorization request is requested in the same process as the second authorization request;
-the first authorization request is requested in the same web page address as the second authorization request; or alternatively
-there is no instruction issued by the user between the first authorization request and the second authorization request.
5. The control method according to claim 4, wherein the step of judging whether the first and second authorization requests meet a preset condition is performed in the step a by:
i. it is determined whether the first authorization request and the second authorization request are consecutively requested in the same container.
6. The control method according to claim 1 or 2 or 4 or 5, characterized by further comprising the steps of:
c. recording the processing result of the second authorization request.
7. A control apparatus for silence grant employing the control method according to any one of claims 1 to 6, characterized by comprising:
first judgment means (1): judging whether the first authorization request and the second authorization request accord with preset conditions or not;
first processing means (2): and if the preset condition is met, automatically processing the second authorization request based on the first authorization request.
8. The control device according to claim 7, wherein the first judging device (1) includes:
first determining means (11): determining whether a second authorization request exists after processing the first authorization request;
second judgment means (12): if the second authorization request exists, judging whether the first authorization request and the second authorization request accord with a preset condition or not.
9. The control device according to claim 7, wherein the first judging device (1) includes:
third judgment means (13): judging whether the first authorization request exists or not when the second authorization request is processed;
fourth judgment means (14): if the first authorization request exists, judging whether the first authorization request and the second authorization request accord with preset conditions or not.
10. The control device according to claim 7, characterized by further comprising:
second processing means (3): recording the processing result of the second authorization request.
CN201910860228.0A 2019-09-11 2019-09-11 Control method and control device for silence authorization Active CN110753347B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910860228.0A CN110753347B (en) 2019-09-11 2019-09-11 Control method and control device for silence authorization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910860228.0A CN110753347B (en) 2019-09-11 2019-09-11 Control method and control device for silence authorization

Publications (2)

Publication Number Publication Date
CN110753347A CN110753347A (en) 2020-02-04
CN110753347B true CN110753347B (en) 2024-01-12

Family

ID=69276387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910860228.0A Active CN110753347B (en) 2019-09-11 2019-09-11 Control method and control device for silence authorization

Country Status (1)

Country Link
CN (1) CN110753347B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7120933B2 (en) * 2001-11-23 2006-10-10 Protegrity Corporation Method for intrusion detection in a database system
US7502760B1 (en) * 2004-07-19 2009-03-10 Amazon Technologies, Inc. Providing payments automatically in accordance with predefined instructions
US7797740B2 (en) * 2006-01-06 2010-09-14 Nokia Corporation System and method for managing captured content
CN102739708B (en) * 2011-04-07 2015-02-04 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
CN105373723A (en) * 2014-08-27 2016-03-02 阿里巴巴集团控股有限公司 Automatic authorization method and device of equipment
CN106788749A (en) * 2017-02-09 2017-05-31 上海斐讯数据通信技术有限公司 A kind of method and system for automatically configuring and reclaiming of FTTH terminals vlan information
CN106953831A (en) * 2016-01-06 2017-07-14 阿里巴巴集团控股有限公司 A kind of authorization method of user resources, apparatus and system
CN106973108A (en) * 2017-03-30 2017-07-21 上海曜致投资中心(有限合伙) The method and system of general across public number unification user account number in wechat public platform
CN107277067A (en) * 2017-08-11 2017-10-20 四川长虹电器股份有限公司 Third party system docking calculation based on unitized overall development person's account
CN107483509A (en) * 2017-10-09 2017-12-15 武汉斗鱼网络科技有限公司 A kind of auth method, server and readable storage medium storing program for executing
CN108733991A (en) * 2017-04-19 2018-11-02 腾讯科技(深圳)有限公司 Web application access method and device, storage medium
CN109032617A (en) * 2018-06-21 2018-12-18 上海二三四五网络科技有限公司 A kind of control method being automatically deleted installation kit and control device
CN109525561A (en) * 2018-10-26 2019-03-26 深圳点猫科技有限公司 It is a kind of for educating the authorization login method and device of operating system
CN109995755A (en) * 2019-02-20 2019-07-09 深圳点猫科技有限公司 A kind of control method and device of the logging state based on small routine framework

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119500A1 (en) * 2007-11-02 2009-05-07 Microsoft Corporation Managing software configuration using mapping and repeatable processes
US20170019409A1 (en) * 2014-04-02 2017-01-19 Open Garden Inc. System and method for access control via social networking
US20190122219A1 (en) * 2017-10-24 2019-04-25 Ca, Inc. System and method for registering and authorizing secondary computing devices for conducting transactions

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7120933B2 (en) * 2001-11-23 2006-10-10 Protegrity Corporation Method for intrusion detection in a database system
US7502760B1 (en) * 2004-07-19 2009-03-10 Amazon Technologies, Inc. Providing payments automatically in accordance with predefined instructions
US7797740B2 (en) * 2006-01-06 2010-09-14 Nokia Corporation System and method for managing captured content
CN102739708B (en) * 2011-04-07 2015-02-04 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
CN105373723A (en) * 2014-08-27 2016-03-02 阿里巴巴集团控股有限公司 Automatic authorization method and device of equipment
CN106953831A (en) * 2016-01-06 2017-07-14 阿里巴巴集团控股有限公司 A kind of authorization method of user resources, apparatus and system
CN106788749A (en) * 2017-02-09 2017-05-31 上海斐讯数据通信技术有限公司 A kind of method and system for automatically configuring and reclaiming of FTTH terminals vlan information
CN106973108A (en) * 2017-03-30 2017-07-21 上海曜致投资中心(有限合伙) The method and system of general across public number unification user account number in wechat public platform
CN108733991A (en) * 2017-04-19 2018-11-02 腾讯科技(深圳)有限公司 Web application access method and device, storage medium
CN107277067A (en) * 2017-08-11 2017-10-20 四川长虹电器股份有限公司 Third party system docking calculation based on unitized overall development person's account
CN107483509A (en) * 2017-10-09 2017-12-15 武汉斗鱼网络科技有限公司 A kind of auth method, server and readable storage medium storing program for executing
CN109032617A (en) * 2018-06-21 2018-12-18 上海二三四五网络科技有限公司 A kind of control method being automatically deleted installation kit and control device
CN109525561A (en) * 2018-10-26 2019-03-26 深圳点猫科技有限公司 It is a kind of for educating the authorization login method and device of operating system
CN109995755A (en) * 2019-02-20 2019-07-09 深圳点猫科技有限公司 A kind of control method and device of the logging state based on small routine framework

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Construction of University Campus Public Information System of Service Design;Aiqin Shi ect.;《2017 9th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)》;全文 *
基于微信公众平台Oauth 2.0授权管理技术开发高校综合性学业引导与服务平台的初探;马玉波;陈萌;;知识文库(第21期);全文 *
基于微信公众平台的分销系统的分析与设计;邢如意;《现代信息科技》;20190425(第08期);全文 *
微信网页授权模式下图书馆信息服务的设计与实现;黄雨生;;图书馆学刊(第05期);全文 *

Also Published As

Publication number Publication date
CN110753347A (en) 2020-02-04

Similar Documents

Publication Publication Date Title
US10904183B2 (en) Point in time expression of emotion data gathered from a chat session
US12001933B2 (en) Virtual assistant in a communication session
JP7381434B2 (en) User interface for devices requesting remote authorization
CN107948131B (en) Method, system and equipment for logging user in browser
CN102104607B (en) Method, device and system for controlling safety of service access
US9852283B2 (en) Confirming the identity of integrator applications
US20090204622A1 (en) Visual and non-visual cues for conveying state of information cards, electronic wallets, and keyrings
JP2023529687A (en) User interface for managing secure operations
CN107924449A (en) A kind of notification message processing method, device and terminal
EP3970325B1 (en) Methods and systems for providing rich interactive communication services on an electronic device
US20210056521A1 (en) Systems and methods for interactive video presentation of transactional information
US20240348590A1 (en) Delayed user authentication
CN107391020A (en) The method, apparatus and terminal of virtual objects bag are got in triggering
CN110753347B (en) Control method and control device for silence authorization
US10068236B2 (en) Methods and arrangements for third party charging authorization for mobile service providers
JP6542672B2 (en) Control account of online trading platform
WO2022160789A1 (en) Information processing method and apparatus
CN106133720A (en) Continue little bookmark mandate
CN110309213A (en) A kind of Access and control strategy of database method, apparatus, system, medium and equipment
JP4866026B2 (en) Transfer agency management system, transfer agency management method, transfer agency management program, and computer-readable recording medium recording the transfer agency management program
CN111125211A (en) Contract establishing method and device, computer readable medium and electronic equipment
CN109614255B (en) Transaction request processing method, device, medium and electronic equipment
CN114448923B (en) Method, device, equipment and medium for processing content interaction account status
US20210397740A1 (en) Systems and methods for data security with modular website integration
CN106572182B (en) Content share method and device based on PC application software

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant