CN111859325A - Terminal, computer readable storage medium, cross-user authorization method and system - Google Patents

Terminal, computer readable storage medium, cross-user authorization method and system Download PDF

Info

Publication number
CN111859325A
CN111859325A CN202010702508.1A CN202010702508A CN111859325A CN 111859325 A CN111859325 A CN 111859325A CN 202010702508 A CN202010702508 A CN 202010702508A CN 111859325 A CN111859325 A CN 111859325A
Authority
CN
China
Prior art keywords
authorization
terminal
user
information
target application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010702508.1A
Other languages
Chinese (zh)
Inventor
葛轶菊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pateo Connect Nanjing Co Ltd
Original Assignee
Pateo Connect Nanjing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pateo Connect Nanjing Co Ltd filed Critical Pateo Connect Nanjing Co Ltd
Priority to CN202010702508.1A priority Critical patent/CN111859325A/en
Publication of CN111859325A publication Critical patent/CN111859325A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a terminal, a computer readable storage medium, a cross-user authorization method and a system, wherein the cross-user authorization method is applied to a first terminal, and comprises the following steps: generating authorization information according to the received authorization instruction; after receiving a sending instruction, sending the authorization information to the second terminal corresponding to the sending instruction, so that a target application program in the second terminal automatically switches to log in to an authorization account according to the authorization information. The terminal, the computer readable storage medium, the cross-user authorization method and the cross-user authorization system provided by the invention can authorize others to log in an authorized account, do not need a server, have low cost, and simultaneously improve the security and user experience of user authorization.

Description

Terminal, computer readable storage medium, cross-user authorization method and system
Technical Field
The invention relates to the technical field of computer security, in particular to a terminal, a computer readable storage medium, a cross-user authorization method and a cross-user authorization system.
Background
The login is an important means for verifying the identity of the user, and after the user sends a login request to the server, the server verifies the identity of the user, so that the user can obtain the authority of executing operation through the verified identity. The current common login mode is a mode of inputting a user account and a user password to log in.
When a user wants to use an account on the application program of the user for others, the user is usually required to pass short message authentication, and technically pass tsp service, telephone operators and the like, which causes high operation cost of the background of the company, inconvenience and poor user experience. Or the user directly tells others the account number and the account number password so that others can log in the account number of the user, the mode is not safe enough, when telling others the account number and the account number password, the leakage of the account number and the account number password is caused, the safety is low, unnecessary loss is caused, and the user experience is poor.
In response to the above problems, those skilled in the art have sought solutions.
Disclosure of Invention
In view of this, the invention provides a terminal, a computer-readable storage medium, a cross-user authorization method and a cross-user authorization system, which can authorize others to log in an authorization account, do not need to go through a server, are low in cost, and improve the security of user authorization and user experience.
The invention provides a cross-user authorization method, which is applied to a first terminal and comprises the following steps: generating authorization information according to the received authorization instruction; after receiving a sending instruction, sending the authorization information to the second terminal corresponding to the sending instruction, so that a target application program in the second terminal automatically switches to log in to an authorization account according to the authorization information.
Specifically, the step of generating authorization information according to the received authorization instruction includes: receiving an authorization instruction, wherein the authorization instruction at least comprises an authorization object and an authorization period; and processing the authorization object and the authorization deadline to obtain authorization information corresponding to the authorization object.
Specifically, the step of processing the authorization object and the authorization deadline to obtain authorization information corresponding to the authorization object includes: encrypting the authorization object and the authorization deadline to obtain ciphertext information; and acquiring plaintext information, and processing the plaintext information and the ciphertext information in a superposition mode to obtain authorization information corresponding to the authorization object.
The invention also provides a cross-user authorization method, which is applied to a second terminal and comprises the following steps: receiving authorization information sent by a first terminal, wherein the authorization information is generated by a target application program in the first terminal according to a received authorization instruction; and automatically switching and logging in the target application program in the second terminal to an authorized account according to the authorization information.
Specifically, the step of automatically switching and logging in the target application program in the second terminal to the authorized account according to the authorization information includes: when a non-target application program in the second terminal identifies the authorization information, judging whether the second terminal loads the target application program; when the target application program is loaded on the second terminal, the second terminal automatically skips to the target application program and automatically switches and logs in to an authorization account corresponding to the authorization object; and when the target application program is not loaded on the second terminal, displaying first prompt information.
Specifically, when the second terminal loads the target application program, the step of automatically jumping to the target application program and automatically switching to log in to the authorization account corresponding to the authorization object by the second terminal includes: when the target application program is loaded on the second terminal, judging whether a user account currently logged in by the target application program in the second terminal is consistent with the authorization object; when the user account number logged in by the target application program in the second terminal is consistent with the authorization object, the target application program in the second terminal automatically switches from the currently logged user account number to the authorization account number; and when the user account logged in by the target application program in the second terminal is inconsistent with the authorized object, switching to the authorized account is prohibited.
Specifically, after the step of prohibiting switching to the authorized account, the method further includes: and displaying second prompt information to prompt the user to log in the user account corresponding to the authorization object first.
Specifically, after the step of displaying the first prompt information when the target application is not loaded on the second terminal, the method further includes: and when a downloading instruction is received, automatically loading the target application program according to the downloading instruction.
Specifically, after the step of automatically switching to log in the authorized account according to the authorization information, the target application program in the second terminal further includes: acquiring login duration of a target application program in the second terminal for logging in the authorized account; and when the login duration reaches the preset duration in the authorization duration, automatically quitting the authorization account by the target application program in the second terminal.
Specifically, the step of automatically switching and logging in the target application program in the second terminal to the authorized account according to the authorization information includes: judging whether the authorization information contains protection authority information or not; when the authorization information contains the protection authority information, the target application program in the second terminal hides the protection content in the authorization account number and then automatically switches and logs in the authorization account number; and when the authorization information does not contain the protection authority information, automatically switching and logging in the target application program in the second terminal to an authorization account according to the authorization information.
The invention also provides a cross-user authorization method, which is applied to a first terminal and a second terminal and comprises the following steps: the first terminal generates authorization information according to the received authorization instruction; after receiving a sending instruction, the first terminal sends the authorization information to the second terminal corresponding to the sending instruction; and automatically switching and logging in the target application program in the second terminal to an authorized account according to the authorization information.
The present invention also provides a terminal, including: a memory for storing computer program code; and a processor for executing the computer program code in the memory to implement a cross-user authorization method as described above.
The invention also provides a cross-user authorization system, which comprises a first terminal and a second terminal; the first terminal is used for generating authorization information according to the received authorization instruction; the first terminal is further used for sending the authorization information to the second terminal corresponding to the sending instruction after receiving the sending instruction; and the target application program in the second terminal is used for automatically switching to log in to the authorized account according to the authorization information.
The invention also provides a computer readable storage medium for storing program data which, when executed by a processor, implements a cross-user authorization method as described above.
Specifically, according to the terminal, the computer-readable storage medium, the cross-user authorization method, and the cross-user authorization system provided by this embodiment, the authorization information is generated according to the received authorization instruction, and after the sending instruction is received, the authorization information is sent to the second terminal corresponding to the sending instruction, so that the target application program in the second terminal automatically switches to log in to the authorization account according to the authorization information, and thus, authorization for others to log in to the authorization account can be achieved, a server is not required, the cost is low, and meanwhile, the security of user authorization and user experience are improved.
The foregoing description is only an overview of the technical solutions of the present invention, and in order to make the technical means of the present invention more clearly understood, the present invention may be implemented in accordance with the content of the description, and in order to make the above and other objects, features, and advantages of the present invention more clearly understood, the following preferred embodiments are described in detail with reference to the accompanying drawings.
Drawings
FIG. 1 is a flowchart illustrating a cross-user authorization method according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating a cross-user authorization method according to a second embodiment of the present invention;
FIG. 3 is a flowchart illustrating a cross-user authorization method according to a third embodiment of the present invention;
FIG. 4 is a flowchart illustrating a cross-user authorization method according to a fourth embodiment of the present invention;
FIG. 5 is a flowchart illustrating a cross-user authorization method according to a fifth embodiment of the present invention;
FIG. 6 is a flowchart illustrating a cross-user authorization method according to a sixth embodiment of the present invention;
FIG. 7 is a flowchart illustrating a cross-user authorization method according to a seventh embodiment of the present invention;
FIG. 8 is a flowchart illustrating a cross-user authorization method according to an eighth embodiment of the present invention;
FIG. 9 is a flowchart illustrating a cross-user authorization method according to a ninth embodiment of the present invention;
FIG. 10 is a flowchart illustrating a cross-user authorization method according to a tenth embodiment of the present invention;
FIG. 11 is a flowchart illustrating a cross-user authorization method according to an eleventh embodiment of the present invention;
fig. 12 is a block diagram of a terminal according to a twelfth embodiment of the present invention;
fig. 13 is a block diagram of a cross-user authorization system according to a tenth embodiment of the present invention.
Detailed Description
To further explain the technical means and effects of the present invention adopted to achieve the predetermined objects, the present invention will be described in detail below with reference to the accompanying drawings and preferred embodiments.
Fig. 1 is a flowchart illustrating a cross-user authorization method according to a first embodiment of the present invention. The embodiment is a cross-user authorization method executed by a first terminal, and the cross-user authorization method provided by the embodiment is suitable for generating authorization information in an application program so as to authorize others to log in an authorization account, and does not need a server, so that the cost is reduced, the convenience of user authorization is improved, and the user experience is improved. As shown in fig. 1, the cross-user authorization method of the present embodiment may include the following steps:
step S11: and generating authorization information according to the received authorization instruction.
Specifically, in an embodiment, when the first user clicks a trigger authorization instruction on a user interface of a target application program in the first terminal, the target application program in the first terminal generates authorization information according to the authorization instruction. Specifically, the authorization information may be, but is not limited to, presented in a two-dimensional code and/or a character string manner, so that the first user can share the authorization information to the second terminal, and the second user can log in the authorization account in the target application program in the second terminal. Specifically, in an embodiment, the target application may be, but is not limited to, an engine callback, for example, the target application may also be video software such as a cooling APP and/or an odds APP, schedule management software, in-vehicle system software, and the like.
Step S12: and after receiving the sending instruction, sending the authorization information to a second terminal corresponding to the sending instruction, so that a target application program in the second terminal automatically switches to log in to the authorization account according to the authorization information.
Specifically, in an embodiment, after the first terminal generates the authorization information, the first user may, but is not limited to, share the authorization information to a WeChat or a short message associated with the second user by clicking a share button on a user interface of the target application. Specifically, after receiving the sending instruction, the first terminal sends the authorization information to the second terminal associated with the second user according to the sending instruction, so that the second user can quickly log in the authorization account in the second terminal according to the authorization information without manually inputting account information, password information or verification information and the like by the user, meanwhile, the information of the authorization account can be prevented from being leaked, the account information of the first user is protected, and the user experience is improved. For example, in an embodiment, the first terminal sends the authorization information to a wechat window corresponding to the second user in a wechat window manner, so that the second user can quickly log in to the authorization account through the authorization information, and user experience is improved.
Specifically, in an embodiment, after the second terminal receives the authorization information, the authorization information may be but is not limited to be identified by a target application program loaded on the second terminal, so that the target application program automatically switches to log in to an authorized account according to the authorization information, and a second user can conveniently and quickly log in to a user account of a first user without manually inputting account information, password information, or verification information of the user account, so that the second user can log in to the user account of the first user, meanwhile, leakage of the password information of the user account of the first user is avoided, and security of the user account is improved.
Referring to fig. 2, fig. 2 is a flowchart illustrating a cross-user authorization method according to a second embodiment of the present invention. The embodiment is a cross-user authorization method executed by a first terminal. As shown in fig. 1 and fig. 2, in the cross-user authorization method of this embodiment, the step of generating the authorization information by the first terminal according to the received authorization instruction includes the following steps:
step S21: receiving an authorization instruction, wherein the authorization instruction at least comprises an authorization object and an authorization period.
Specifically, in an embodiment, when the first user clicks the trigger authorization instruction on the user interface of the target application in the first terminal, the target application in the first terminal receives the authorization instruction sent by the user interface. Specifically, in an embodiment, the first user may set at least an authorization object and an authorization deadline, for example, the first user inputs second user account information corresponding to the authorization object in a user interface of the target application program, so that the second user may automatically log in and switch to an authorization account corresponding to the first user according to an authorization instruction, and other users cannot log in the authorization account corresponding to the first user through the authorization instruction, thereby improving user experience, protecting user privacy, and improving authorization security. Specifically, the first user may further set an authorization duration in the authorization instruction, and the first user may set, but not limited to, a preset time duration for logging in the authorization account each time, so that when a login time duration for logging in the authorization account corresponding to the first user by the second user reaches the preset time duration, the target application program in the second terminal automatically logs out of the login of the authorization account. For example, in an embodiment, the first user may also set the authorization duration to the login time period for the second user to login to the authorized account, e.g., the second user may only login to the authorized account within the corresponding time period, or the second user needs to login to the authorized account before the deadline of the authorization time, etc.
Step S22: and processing the authorization object and the authorization deadline to obtain authorization information corresponding to the authorization object.
Specifically, in an embodiment, the target application in the first terminal processes the received authorization object and authorization duration to obtain the authorization information corresponding to the authorization object, for example, the target application in the first terminal may, but is not limited to, encrypt the authorization object and the authorization duration in an encryption manner to obtain the authorization information corresponding to the authorization object. Specifically, when the first user sends the authorization information to the WeChat, the short message or the mail corresponding to the second user, the second user can quickly log in the authorization account corresponding to the first user through the authorization information, so that the user experience is improved, and meanwhile, the security of the authorization account is improved.
Referring to fig. 3, fig. 3 is a flowchart illustrating a cross-user authorization method according to a third embodiment of the present invention. The embodiment is a cross-user authorization method executed by a first terminal. As shown in fig. 1 to fig. 3, in the cross-user authorization method of the embodiment, the step of processing the authorization object and the authorization deadline to obtain the authorization information corresponding to the authorization object includes the following steps:
step S31: and encrypting the authorization object and the authorization deadline to obtain the ciphertext information.
Specifically, in an embodiment, the target application in the first terminal encrypts the authorization object and the authorization deadline to obtain the ciphertext information, and specifically, the target application may but is not limited to encrypt the user account, the user password, the authorization deadline, and the authorization object of the first user to generate the ciphertext information.
Step S32: and acquiring plaintext information, and processing the plaintext information and the plaintext information in a superposition mode to obtain authorization information corresponding to an authorization object.
Specifically, in an embodiment, a target application in a first terminal acquires preset plaintext information, and encrypts the plaintext information and the plaintext information in a random superposition manner to obtain corresponding authorization information. Specifically, the plaintext information may include, but is not limited to, welcome information and download link information, for example, when the target application is a wisdom initiative, the plaintext information may be set to welcome the wisdom initiative, download link xxx, and other information, so that when the second terminal used by the second user does not load the target application, the second user may quickly download the target application through the download link, thereby improving user experience.
Fig. 4 is a flowchart illustrating a cross-user authorization method according to a fourth embodiment of the present invention. The embodiment is a cross-user authorization method executed by a second terminal, and the cross-user authorization method provided by the embodiment is suitable for generating authorization information in an application program so as to authorize others to log in an authorization account, and does not need a server, so that the cost is reduced, the convenience of user authorization is improved, and the user experience is improved. As shown in fig. 4, the cross-user authorization method of the present embodiment may include the following steps:
Step S41: and receiving authorization information sent by the first terminal, wherein the authorization information is generated by a target application program in the first terminal according to the received authorization instruction.
Specifically, in an embodiment, when the first user clicks a trigger authorization instruction on a user interface of a target application program in the first terminal, the target application program in the first terminal generates authorization information according to the authorization instruction. Specifically, the authorization information may be, but is not limited to, presented in a two-dimensional code and/or a character string manner, so that the first user can share the authorization information to the second terminal, and the second user can log in the authorization account in the target application program in the second terminal. Specifically, in an embodiment, the target application may be, but is not limited to, an engine callback, for example, the target application may also be video software such as a cooling APP and/or an odds APP, schedule management software, in-vehicle system software, and the like.
Specifically, in an embodiment, after the first terminal generates the authorization information, the first user may, but is not limited to, share the authorization information to a WeChat or a short message associated with the second user by clicking a share button on a user interface of the target application. Specifically, after receiving the sending instruction, the first terminal sends the authorization information to the second terminal associated with the second user according to the sending instruction, so that the second user can quickly log in the authorization account in the second terminal according to the authorization information without manually inputting account information, password information or verification information and the like by the user, meanwhile, the information of the authorization account can be prevented from being leaked, the account information of the first user is protected, and the user experience is improved. For example, in an embodiment, the first terminal sends the authorization information to a wechat window corresponding to the second user in a wechat window manner, so that the second user can quickly log in to the authorization account through the authorization information, and user experience is improved.
Step S42: and the target application program in the second terminal automatically switches and logs in the authorization account according to the authorization information.
Specifically, in an embodiment, after the second terminal receives the authorization information, the authorization information may be but is not limited to be identified by a target application program loaded on the second terminal, so that the target application program automatically switches to log in to an authorized account according to the authorization information, and a second user can conveniently and quickly log in to a user account of a first user without manually inputting account information, password information, or verification information of the user account, so that the second user can log in to the user account of the first user, meanwhile, leakage of the password information of the user account of the first user is avoided, and security of the user account is improved.
Referring to fig. 5, fig. 5 is a flowchart illustrating a cross-user authorization method according to a fifth embodiment of the present invention. The embodiment is a cross-user authorization method executed by a second terminal. As shown in fig. 4 to 5, in the cross-user authorization method of this embodiment, the step of automatically switching and logging in the target application in the second terminal to the authorization account according to the authorization information includes the following steps:
step S51: and when the non-target application program in the second terminal identifies the authorization information, judging whether the second terminal loads the target application program.
Specifically, in an embodiment, when the second user receives the authorization information shared by the first user through a wechat or short message manner, the second user may copy a character string in the authorization information, then start the target application program to quickly switch and log in to the authorization account, or scan a two-dimensional code in the authorization information through the target application program to realize quick switching and logging in to the authorization account. When the non-target application in the second terminal identifies the authorization information, for example, when the second user scans and identifies the two-dimensional code in the authorization information by using the WeChat, the WeChat application will determine whether the second terminal loads the target application.
Specifically, when the target application is loaded in the second terminal, step S52 is executed: and the second terminal automatically jumps to the target application program and automatically switches and logs in to the authorization account corresponding to the authorization object.
Specifically, in an embodiment, when the second terminal loads the target application program, the second terminal automatically jumps to the target application program from the non-target application program, and the second user does not need to manually operate, so that the application programs can be quickly switched, and the user experience is improved. Meanwhile, the target application program in the second terminal automatically switches the currently logged-in user account to the authorized account corresponding to the authorized object, for example, the target application program in the second terminal automatically logs in to the authorized account corresponding to the first user, the second user does not need to input account information and password information of the first user, login of the authorized account can be quickly achieved, meanwhile, leakage of the account information and password information of the first user is avoided, and account authorization safety is improved.
Specifically, when the second terminal does not load the target application, step S53 is executed: and displaying the first prompt message.
Specifically, in an embodiment, when the second terminal does not load the target application, the second terminal will display the first prompt information, for example, the first prompt information may be, but is not limited to, welcome information and download link information, for example, when the target application is a favorite wisdom duration, the plaintext information may be set to welcome the favorite wisdom duration, download link xxx, and the like, so that when the second terminal used by the second user does not load the target application, the second user may quickly download the target application through the download link, thereby improving user experience.
Referring to fig. 6, fig. 6 is a flowchart illustrating a cross-user authorization method according to a sixth embodiment of the present invention. The embodiment is a cross-user authorization method executed by a second terminal. As shown in fig. 4 to fig. 6, in the cross-user authorization method of this embodiment, when the second terminal loads the target application, the step of automatically jumping to the target application by the second terminal and automatically switching to log in to the authorization account corresponding to the authorization object specifically includes the following steps:
Step S61: and when the target application program is loaded on the second terminal, judging whether the current user account logged by the target application program in the second terminal is consistent with the authorized object.
Specifically, in an embodiment, when the second terminal uploads the target application, the target application in the second terminal determines whether the currently logged user account is consistent with the authorized object, and specifically, the target application parses the authorization information to extract the authorized object. Specifically, the second terminal compares the currently logged-in user account with account information contained in the authorization object to determine whether the currently logged-in user account of the target application program is consistent with the authorization object.
Specifically, when the user account registered by the target application in the second terminal is consistent with the authorized object, step S62 is executed: and the target application program in the second terminal automatically switches from the currently logged user account to the authorized account.
Specifically, in an embodiment, when a user account logged in by a target application program in a second terminal is consistent with an authorized object, for example, when a user account currently logged in by the target application program in the second terminal is consistent with account information in the authorized object, the target application program in the second terminal automatically switches to log in to the authorized account from the currently logged-in user account, and the second user does not need to input account information and password information of a first user, so that the login of the authorized account can be quickly achieved, meanwhile, the leakage of the account information and password information of the first user is avoided, and the security of account authorization is improved.
Specifically. If the user account registered by the target application program in the second terminal is not consistent with the authorized object, then step S63 is executed: switching to an authorized account is prohibited.
Specifically, in an embodiment, when a user account registered by a target application program in the second terminal is inconsistent with an authorized object, for example, when a user account currently registered by the target application program in the second terminal is inconsistent with account information in the authorized object, the target application program in the second terminal prohibits switching to register to the authorized account, for example, pop-up display prompts that the user account currently registered by the second user is not authorized, so that other users can be prevented from registering the authorized account of the first user by using the authorization information, and the security of account authorization is improved.
Referring to fig. 7, fig. 7 is a flowchart illustrating a cross-user authorization method according to a seventh embodiment of the present invention. The embodiment is a cross-user authorization method executed by a second terminal. As shown in fig. 4 to 7, the cross-user authorization method of the embodiment further includes the following steps after the step of prohibiting switching to an authorized account:
step S71: and displaying second prompt information to prompt the user to log in a user account corresponding to the authorization object first.
Specifically, in an embodiment, after the target application program in the second terminal prohibits the switching and logging in to the authorized account, the target application program further displays second prompt information to prompt the user to log in the user account corresponding to the authorized object first. Specifically, the second prompt information may include, but is not limited to, account information of the authorization object, for example, the target application shows that it is requested to log in to the XXX account first, so that it is possible to prevent other users from logging in the authorization account of the first user using the authorization information, and security of account authorization is improved.
Referring to fig. 8, fig. 8 is a flowchart illustrating a cross-user authorization method according to an eighth embodiment of the present invention. The embodiment is a cross-user authorization method executed by a second terminal. As shown in fig. 4 to 8, the cross-user authorization method of this embodiment, when the second terminal does not load the target application, further includes the following steps after the step of displaying the first prompt message:
step S81: and when receiving the downloading instruction, automatically loading the target application program according to the downloading instruction.
Specifically, in an embodiment, after the second terminal displays the first prompt information, when the user triggers the download link character string, the second terminal receives the download instruction, and the download instruction automatically loads the target application program, so that when the second terminal used by the second user does not load the target application program, the second user can quickly download the target application program through the download link, and user experience is improved.
Referring to fig. 9, fig. 9 is a flowchart illustrating a cross-user authorization method according to a ninth embodiment of the present invention. The embodiment is a cross-user authorization method executed by a second terminal. As shown in fig. 4 to fig. 9, in the cross-user authorization method of this embodiment, after the step of automatically switching to log in to the authorization account according to the authorization information, the target application in the second terminal further includes the following steps:
step S91: and acquiring the login duration of the target application program in the second terminal for logging in the authorized account.
Specifically, in an embodiment, the target application program in the second terminal obtains the login duration after the login is switched to the authorized account, so as to determine whether the login duration for the target application program to login to the authorized account reaches a preset duration in the authorization period.
Step S92: and when the login duration reaches the preset duration in the authorization duration, the target application program in the second terminal automatically quits the authorization account.
Specifically, in an embodiment, when the login duration reaches a preset duration in the authorization duration, the target application in the second terminal automatically exits the authorization account. Specifically, in an embodiment, after automatically exiting the authorized account, the target application program in the second terminal is automatically switched to the user account corresponding to the second user, and the user can exit the authorized account and switch to the previously logged-in user account without manually switching, so that the user experience is improved, and meanwhile, the security of the authorized account is also improved.
Referring to fig. 10, fig. 10 is a flowchart illustrating a cross-user authorization method according to a tenth embodiment of the present invention. The embodiment is a cross-user authorization method executed by a second terminal. As shown in fig. 4 to 10, in the cross-user authorization method of this embodiment, the step of automatically switching and logging in the target application in the second terminal to the authorized account according to the authorization information includes the following steps:
step S101: and judging whether the authorization information contains protection authority information.
Specifically, in an embodiment, the target application in the second terminal parses the authorization information into a word string, and rejects plaintext information in the word string to obtain corresponding ciphertext information. The target application program analyzes the ciphertext information to judge whether the authorization information contains the protection authority information, for example, when the first user sets the authorization account, the privacy content of the user account can be set, so that the second user can not browse the privacy content after logging in the authorization account, and the user experience is improved.
Specifically, when the authorization information includes the protection authority information, step S102 is executed: and after hiding the protection content in the authorized account by the target application program in the second terminal, automatically switching and logging in the authorized account.
Specifically, in an embodiment, when the authorization information includes the protection authority information, the target application program in the second terminal hides the protection content in the authorization account, and then automatically switches to log in to the authorization account. For example, when a first user sets privacy protection content for an authorized account, and a second user logs in the authorized account, the target application program automatically hides the privacy protection content in the authorized account, so that privacy protection of the first user is achieved, leakage of important information is avoided, and user experience is improved.
Specifically, when the authorization information does not include the protection authority information, step S103 is executed: and the target application program in the second terminal automatically switches and logs in the authorization account according to the authorization information.
Specifically, in an embodiment, when the authorization information does not include the protection authority information, the target application program in the second terminal automatically switches the currently logged-in user account to the authorization account corresponding to the authorization object, for example, the target application program in the second terminal automatically logs in to the authorization account corresponding to the first user, and the second user does not need to input the account information and the password information of the first user, so that the login of the authorization account can be quickly achieved, meanwhile, the leakage of the account information and the password information of the first user is also avoided, and the security of account authorization is improved.
Fig. 11 is a flowchart illustrating a cross-user authorization method according to an eleventh embodiment of the present invention. The embodiment is a cross-user authorization method executed between a first terminal and a second terminal, and the cross-user authorization method provided by the embodiment is suitable for generating authorization information in an application program so as to authorize others to log in an authorization account, and does not need a server, so that the cost is reduced, the convenience of user authorization is improved, and the user experience is improved. As shown in fig. 11, the cross-user authorization method of the present embodiment may include the following steps:
step S111: and the first terminal generates authorization information according to the received authorization instruction.
Specifically, in an embodiment, when the first user clicks a trigger authorization instruction on a user interface of a target application program in the first terminal, the target application program in the first terminal generates authorization information according to the authorization instruction. Specifically, the authorization information may be, but is not limited to, presented in a two-dimensional code and/or a character string manner, so that the first user can share the authorization information to the second terminal, and the second user can log in the authorization account in the target application program in the second terminal. In particular, in one embodiment, the target application may be, but is not limited to, an Optimus Calendar.
Step S112: and after receiving the sending instruction, the first terminal sends the authorization information to a second terminal corresponding to the sending instruction.
Specifically, in an embodiment, after the first terminal generates the authorization information, the first user may, but is not limited to, share the authorization information to a WeChat or a short message associated with the second user by clicking a share button on a user interface of the target application. Specifically, after receiving the sending instruction, the first terminal sends the authorization information to the second terminal associated with the second user according to the sending instruction, so that the second user can quickly log in the authorization account in the second terminal according to the authorization information without manually inputting account information, password information or verification information and the like by the user, meanwhile, the information of the authorization account can be prevented from being leaked, the account information of the first user is protected, and the user experience is improved. For example, in an embodiment, the first terminal sends the authorization information to a wechat window corresponding to the second user in a wechat window manner, so that the second user can quickly log in to the authorization account through the authorization information, and user experience is improved.
Step S113: and the target application program in the second terminal automatically switches and logs in the authorization account according to the authorization information.
Specifically, in an embodiment, after the second terminal receives the authorization information, the authorization information may be but is not limited to be identified by a target application program loaded on the second terminal, so that the target application program automatically switches to log in to an authorized account according to the authorization information, and a second user can conveniently and quickly log in to a user account of a first user without manually inputting account information, password information, or verification information of the user account, so that the second user can log in to the user account of the first user, meanwhile, leakage of the password information of the user account of the first user is avoided, and security of the user account is improved.
For a specific process of executing each step of the cross-user authorization method between the first terminal and the second terminal in this embodiment, please refer to the specific contents described in the embodiments shown in fig. 1 to fig. 10, which is not described herein again.
Referring to fig. 12, fig. 12 is a block diagram of a terminal 100 according to a twelfth embodiment of the invention. As shown in fig. 12, the terminal provided in the present embodiment includes a memory 110 and a processor 120.
In particular, in one embodiment, the memory 110 is used to store computer program code. The processor 120 is configured to execute the computer program code in the memory to implement the cross-user authorization method as shown in fig. 1-3.
Specifically, in an embodiment, when the terminal 100 is a first terminal, the first terminal performs a specific process of each step of the cross-user authorization method in this embodiment, please refer to the specific contents described in the embodiments shown in fig. 1 to fig. 3, which is not described herein again.
In particular, in one embodiment, the memory 110 is used to store computer program code. The processor 120 is configured to execute the computer program code in the memory to implement the cross-user authorization method as shown in fig. 4-10.
Specifically, in an embodiment, when the terminal 100 is a second terminal, the second terminal performs a specific process of each step of the cross-user authorization method in this embodiment, please refer to the specific contents described in the embodiments shown in fig. 4 to fig. 10, which is not described herein again.
Referring to fig. 13, fig. 13 is a block diagram illustrating a cross-user authorization system 200 according to a thirteenth embodiment of the present invention. As shown in fig. 13, the cross-user authorization system 200 provided in this embodiment includes a first terminal 210 and a second terminal 220.
Specifically, in an embodiment, the first terminal 210 is configured to generate authorization information according to the received authorization instruction. The first terminal 210 is further configured to send the authorization information to the second terminal 220 corresponding to the sending instruction after receiving the sending instruction. And the target application program in the second terminal 220 is used for automatically switching to log in to the authorized account according to the authorization information.
For a specific process of implementing each function of each functional unit of the first terminal 210 and/or the second terminal 220 in this embodiment, please refer to the specific contents described in the embodiments shown in fig. 1 to fig. 10, which is not described herein again.
Specifically, according to the terminal, the cross-user authorization method and the cross-user authorization system provided by the embodiment, the authorization information is generated by the end according to the received authorization instruction, and after the sending instruction is received, the authorization information is sent to the second terminal corresponding to the sending instruction, so that the target application program in the second terminal automatically switches to log in to the authorization account according to the authorization information, and therefore authorization for others to log in to the authorization account can be achieved, a server is not needed, the cost is low, and meanwhile, the security of user authorization and user experience are improved.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, in which computer-executable instructions are stored, where the computer-readable storage medium is, for example, a non-volatile memory such as an optical disc, a hard disc, or a flash memory. In particular, the computer-executable instructions described above are for causing a computer or similar computing device to perform various operations in the cross-user authorization method described above. In particular, in one embodiment, it is used to store program data which, when executed by a processor, implements a cross-user authorization method as in any of the above embodiments.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the terminal class embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for relevant points, reference may be made to part of the description of the method embodiment.

Claims (14)

1. A cross-user authorization method is applied to a first terminal, and comprises the following steps:
generating authorization information according to the received authorization instruction;
after receiving a sending instruction, sending the authorization information to the second terminal corresponding to the sending instruction, so that a target application program in the second terminal automatically switches to log in to an authorization account according to the authorization information.
2. The cross-user authorization method according to claim 1, wherein the step of generating authorization information according to the received authorization instruction comprises:
receiving an authorization instruction, wherein the authorization instruction at least comprises an authorization object and an authorization period;
And processing the authorization object and the authorization deadline to obtain authorization information corresponding to the authorization object.
3. The cross-user authorization method according to claim 2, wherein the step of processing the authorization object and the authorization duration to obtain authorization information corresponding to the authorization object comprises:
encrypting the authorization object and the authorization deadline to obtain ciphertext information;
and acquiring plaintext information, and processing the plaintext information and the ciphertext information in a superposition mode to obtain authorization information corresponding to the authorization object.
4. A cross-user authorization method is applied to a second terminal, and comprises the following steps:
receiving authorization information sent by a first terminal, wherein the authorization information is generated by a target application program in the first terminal according to a received authorization instruction;
and automatically switching and logging in the target application program in the second terminal to an authorized account according to the authorization information.
5. The cross-user authorization method according to claim 4, wherein the step of automatically switching login of the target application program in the second terminal to the authorized account according to the authorization information comprises:
When a non-target application program in the second terminal identifies the authorization information, judging whether the second terminal loads the target application program;
when the target application program is loaded on the second terminal, the second terminal automatically skips to the target application program and automatically switches and logs in to an authorization account corresponding to the authorization object;
and when the target application program is not loaded on the second terminal, displaying first prompt information.
6. The cross-user authorization method according to claim 5, wherein the step of automatically jumping to the target application program and automatically switching to log in to the authorization account corresponding to the authorization object by the second terminal when the target application program is loaded on the second terminal comprises:
when the target application program is loaded on the second terminal, judging whether a user account currently logged in by the target application program in the second terminal is consistent with the authorization object;
when the user account number logged in by the target application program in the second terminal is consistent with the authorization object, the target application program in the second terminal automatically switches from the currently logged user account number to the authorization account number;
And when the user account logged in by the target application program in the second terminal is inconsistent with the authorized object, switching to the authorized account is prohibited.
7. The cross-user authorization method of claim 6, further comprising, after the step of prohibiting switching to the authorized account:
and displaying second prompt information to prompt the user to log in the user account corresponding to the authorization object first.
8. The cross-user authorization method according to claim 5, wherein after the step of presenting the first prompt message when the target application is not loaded on the second terminal, further comprising:
and when a downloading instruction is received, automatically loading the target application program according to the downloading instruction.
9. The cross-user authorization method according to claim 4, wherein the step of automatically switching login of the target application program in the second terminal to an authorized account according to the authorization information further comprises:
acquiring login duration of a target application program in the second terminal for logging in the authorized account;
and when the login duration reaches the preset duration in the authorization duration, automatically quitting the authorization account by the target application program in the second terminal.
10. The cross-user authorization method according to claim 4, wherein the step of automatically switching login of the target application program in the second terminal to the authorized account according to the authorization information comprises:
judging whether the authorization information contains protection authority information or not;
when the authorization information contains the protection authority information, the target application program in the second terminal hides the protection content in the authorization account number and then automatically switches and logs in the authorization account number;
and when the authorization information does not contain the protection authority information, automatically switching and logging in the target application program in the second terminal to an authorization account according to the authorization information.
11. A cross-user authorization method is applied to a first terminal and a second terminal, and comprises the following steps:
the first terminal generates authorization information according to the received authorization instruction;
after receiving a sending instruction, the first terminal sends the authorization information to the second terminal corresponding to the sending instruction;
and automatically switching and logging in the target application program in the second terminal to an authorized account according to the authorization information.
12. A terminal, characterized in that the terminal comprises:
a memory for storing computer program code; and
a processor for executing the computer program code in the memory to implement the cross-user authorization method of any of claims 1 to 10.
13. A cross-user authorization system, comprising a first terminal and the second terminal;
the first terminal is used for generating authorization information according to the received authorization instruction;
the first terminal is further used for sending the authorization information to the second terminal corresponding to the sending instruction after receiving the sending instruction;
and the target application program in the second terminal is used for automatically switching to log in to the authorized account according to the authorization information.
14. A computer-readable storage medium for storing program data which, when executed by a processor, implements a cross-user authorization method as claimed in any of claims 1-10.
CN202010702508.1A 2020-07-18 2020-07-18 Terminal, computer readable storage medium, cross-user authorization method and system Pending CN111859325A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010702508.1A CN111859325A (en) 2020-07-18 2020-07-18 Terminal, computer readable storage medium, cross-user authorization method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010702508.1A CN111859325A (en) 2020-07-18 2020-07-18 Terminal, computer readable storage medium, cross-user authorization method and system

Publications (1)

Publication Number Publication Date
CN111859325A true CN111859325A (en) 2020-10-30

Family

ID=73002214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010702508.1A Pending CN111859325A (en) 2020-07-18 2020-07-18 Terminal, computer readable storage medium, cross-user authorization method and system

Country Status (1)

Country Link
CN (1) CN111859325A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115987636A (en) * 2022-12-22 2023-04-18 北京深盾科技股份有限公司 Method, device and storage medium for realizing information security

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN107885985A (en) * 2017-11-23 2018-04-06 维沃移动通信有限公司 A kind of application program account sharing method and terminal
CN108920917A (en) * 2018-06-27 2018-11-30 努比亚技术有限公司 Log in end switching method, mobile terminal and computer readable storage medium
CN109862078A (en) * 2019-01-08 2019-06-07 腾讯科技(深圳)有限公司 Client login method, device and system, storage medium and electronic device
CN110021086A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 A method of the temporary Authorization opening gate based on openid
CN110224971A (en) * 2018-03-02 2019-09-10 阿里巴巴集团控股有限公司 Authorize method, authorization server, system, equipment and the storage medium logged in
CN110225035A (en) * 2019-06-11 2019-09-10 深圳市微付充科技有限公司 The binding of third party's account and login method, server, terminal and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN107885985A (en) * 2017-11-23 2018-04-06 维沃移动通信有限公司 A kind of application program account sharing method and terminal
CN110224971A (en) * 2018-03-02 2019-09-10 阿里巴巴集团控股有限公司 Authorize method, authorization server, system, equipment and the storage medium logged in
CN108920917A (en) * 2018-06-27 2018-11-30 努比亚技术有限公司 Log in end switching method, mobile terminal and computer readable storage medium
CN110021086A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 A method of the temporary Authorization opening gate based on openid
CN109862078A (en) * 2019-01-08 2019-06-07 腾讯科技(深圳)有限公司 Client login method, device and system, storage medium and electronic device
CN110225035A (en) * 2019-06-11 2019-09-10 深圳市微付充科技有限公司 The binding of third party's account and login method, server, terminal and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115987636A (en) * 2022-12-22 2023-04-18 北京深盾科技股份有限公司 Method, device and storage medium for realizing information security
CN115987636B (en) * 2022-12-22 2023-07-18 北京深盾科技股份有限公司 Information security implementation method, device and storage medium

Similar Documents

Publication Publication Date Title
US10462118B2 (en) Systems and methods for login and authorization
KR102047902B1 (en) Message management methods, devices, and storage media
CN108322461B (en) Method, system, device, equipment and medium for automatically logging in application program
CN109873805B (en) Cloud desktop login method, device, equipment and storage medium based on cloud security
CN103095457A (en) Login and verification method for application program
CN109981665B (en) Resource providing method and device, and resource access method, device and system
CN108965331B (en) Login verification method, device and system
CN107241329B (en) Account login processing method and device
CN106372497B (en) Application programming interface API protection method and protection device
CN107819579B (en) User request processing method, server and computer readable storage medium
CN111797038B (en) Burning control method, system, device, equipment and computer readable storage medium
CN112887340B (en) Password resetting method and device, service management terminal and storage medium
CN112559991A (en) System secure login method, device, equipment and storage medium
CN103036852A (en) Method and device for achieving network login
CN111859325A (en) Terminal, computer readable storage medium, cross-user authorization method and system
CN110417784B (en) Authorization method and device of access control equipment
KR20210011577A (en) Apparatus and Method for Personal authentication using Sim Toolkit and Applet
CN107509180B (en) Method for automatically encrypting short message, storage device and mobile terminal
US9977907B2 (en) Encryption processing method and device for application, and terminal
KR102118380B1 (en) An access control system of controlling server jobs by users
CN112153025A (en) Method and device for realizing OAuth2.0 authentication based on PAM
CN112637195B (en) Method and device for controlling electronic equipment and electronic equipment
CN105871788B (en) Password generation method and device for login server
CN114333113A (en) Bluetooth key shortcut control method based on negative one screen and computer readable storage medium
US20170310480A1 (en) Access to software applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination