CN112100613A - Application login control method and device, electronic equipment and storage medium - Google Patents

Application login control method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112100613A
CN112100613A CN202010878647.XA CN202010878647A CN112100613A CN 112100613 A CN112100613 A CN 112100613A CN 202010878647 A CN202010878647 A CN 202010878647A CN 112100613 A CN112100613 A CN 112100613A
Authority
CN
China
Prior art keywords
application
login
resource transfer
request
state information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010878647.XA
Other languages
Chinese (zh)
Inventor
王宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010878647.XA priority Critical patent/CN112100613A/en
Publication of CN112100613A publication Critical patent/CN112100613A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

An application login control method, an application login control device, an electronic device and a storage medium are used for improving the efficiency of login of an application in a sandbox in a virtualized environment, wherein the method comprises the following steps: receiving a login request for logging in a target application through a third-party application, wherein the target application runs in a sandbox environment, and the third-party application runs outside the sandbox environment; receiving first login state information which is sent by a third-party application in response to the authorization confirmation operation and is associated with the authorization confirmation operation; acquiring second login state information of the target object login target application based on the first login state information; and sending the second login state information to the target application, so that the target application sets the target object to be in a login state according to the second login state information. According to the application, signature verification is completed through the third-party application outside the sandbox environment, the third-party application does not need to be installed in the sandbox, and the application login efficiency in the sandbox in the virtual environment is improved when the third-party application is passed.

Description

Application login control method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to an application login control method and apparatus, an electronic device, and a storage medium.
Background
In the related art, before the target application is logged in the sandbox environment through the third-party application, the third-party application needs to be cloned in the sandbox environment, that is, the third-party application is installed in the sandbox environment, so that the target application and the third-party application can be applied in the same environment, the third-party application considers that the target application is in an installed state, signature verification can be completed, and the login function of the target application in the sandbox environment is achieved.
However, in this method, when the target application is found to have a login behavior, the installation package of the third-party application needs to be obtained first, and the installation package needs to be installed in the sandbox environment, so that a long installation waiting time is generated in the login process at this time. In addition, after the third-party application is installed in the sandbox, because the application is brand-new and has no data, the user needs to log in the account again, and the account logged in by the third-party application installed in the system is kicked off the line, so that the implementation process is complicated.
Disclosure of Invention
The embodiment of the application login control method and device, the electronic equipment and the storage medium are used for improving the efficiency of logging in the application in the sandbox virtualization environment.
The first application login control method provided by the embodiment of the application is applied to sandbox host application and comprises the following steps:
receiving a login request for logging in a target application through a third-party application, wherein the target application runs in a sandbox environment, and the third-party application runs outside the sandbox environment;
receiving first login state information sent by the third-party application in response to an authorization confirmation operation, wherein the first login state information is login state information of a target object associated with the authorization confirmation operation for logging in the third-party application;
acquiring second login state information of the target object for logging in the target application based on the first login state information;
and sending the second login state information to the target application, so that the target application sets the target object to be in a login state according to the second login state information.
The second application login control method provided in the embodiment of the present application is applied to a target application, where the target application runs in a sandbox environment, and the method includes:
when a login request for logging in through a third-party application is received, sending the login request to a sandbox host application, wherein the third-party application runs outside a sandbox environment;
receiving second login state information, returned by the sandbox host application, of the target object during login, and setting the target object in a login state, wherein the second login state information is obtained by the sandbox host application according to first login state information of the target object for logging in the third-party application, the first login state information is obtained by the sandbox host application from the third-party application according to the login request, and the target object is associated with authorization confirmation operation performed on the third-party application.
The first application login control device provided by the embodiment of the application is applied to sandbox host application and comprises the following components:
a first receiving unit, configured to receive a login request for logging in a target application through a third-party application, where the target application runs in a sandbox environment and the third-party application runs outside the sandbox environment;
a second receiving unit, configured to receive first login state information sent by the third-party application in response to an authorization confirmation operation, where the first login state information is login state information of a target object associated with the authorization confirmation operation logging in the third-party application;
the information acquisition unit is used for acquiring second login state information of the target object for logging in the target application based on the first login state information;
and the sending unit is used for sending the second login state information to the target application, so that the target application sets the target object to be in a login state according to the second login state information.
The second application login control device provided in the embodiment of the present application is applied to a target application, where the target application runs in a sandbox environment, and the second application login control device includes:
the device comprises a request unit, a display unit and a display unit, wherein the request unit is used for sending a login request to a sandbox host application when receiving the login request logged in through a third-party application, and the third-party application runs outside a sandbox environment;
and the login unit is used for receiving second login state information, returned by the sandbox host application, of the target object during login, and setting the target object to be in a login state, wherein the second login state information is obtained by the sandbox host application according to first login state information of the target object for logging in the third-party application, the first login state information is obtained by the sandbox host application from the third-party application according to the login request, and the target object is a target object associated with authorization confirmation operation performed on the third-party application.
Optionally, the request unit is specifically configured to:
calling a preset monitoring module when the sandbox environment is started, so that the login request is generated when the monitoring module is called, and the login request is sent to the sandbox host application; or
And after the monitoring module is started, responding to the triggering operation of the login control logged in through the third-party application to generate the login request, so that the monitoring module intercepts the login request and sends the login request to the sandbox host application.
Optionally, the apparatus further comprises:
the second resource transfer unit is used for responding to the resource transfer operation triggered by the target object and sending a resource transfer request to the sandbox host application so that the sandbox host application carries out resource transfer processing according to the resource transfer request after receiving the resource transfer request;
and receiving a resource transfer result returned by the sandbox host application.
Optionally, the second resource transfer unit is specifically configured to:
responding to the resource transfer operation triggered by the target object, and obtaining a resource transfer request, wherein a resource transfer mode indication parameter in the resource transfer request is a request parameter corresponding to a third-party mode, and the third-party mode is determined based on the third-party application;
modifying the request parameter corresponding to the third-party mode into a request parameter corresponding to a guest mode and then sending the request parameter to the sandbox host application; and
and the resource transfer result is obtained by the sandbox host application performing resource transfer processing according to the resource transfer interface corresponding to the guest mode.
An electronic device provided in an embodiment of the present application includes a processor and a memory, where the memory stores a program code, and when the program code is executed by the processor, the processor is caused to execute any one of the steps of the application login control method.
Embodiments of the present application provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions to cause the computer device to execute the steps of any one of the application login control methods described above.
An embodiment of the present application provides a computer-readable storage medium, which includes program code for causing an electronic device to execute any one of the steps of the application login control method when the program product runs on the electronic device.
The beneficial effect of this application is as follows:
the embodiment of the application provides an application login control method, an application login control device, electronic equipment and a storage medium. After receiving the login request, the sandbox host obtains login state information from a third-party application located outside the sandbox environment, namely local to the terminal device, and does not need to download and install the third-party application in the sandbox environment, so that the third-party application does not need to wait for downloading; and because the third-party application does not need to be installed in the sandbox environment, the situation that the third-party application account installed locally on the terminal equipment is kicked off the line can be avoided, and the efficiency of logging in the target application in the sandbox virtual environment can be effectively improved.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is an alternative schematic diagram of an application scenario in an embodiment of the present application;
fig. 2 is a flowchart of a first application login control method in an embodiment of the present application;
FIG. 3 is a schematic illustration of an authorization interface in an embodiment of the present application;
FIG. 4 is a schematic view of a game interface in an embodiment of the present application;
fig. 5 is a schematic flow chart of a payment method in an embodiment of the present application;
FIG. 6 is a schematic illustration of a payment interface in an embodiment of the present application;
fig. 7 is a flowchart of a second application login control method in the embodiment of the present application;
FIG. 8 is a schematic diagram illustrating an alternative interactive implementation timing sequence in the embodiments of the present application;
fig. 9 is a schematic structural diagram of a first application login control method in the embodiment of the present application;
fig. 10 is a schematic structural diagram illustrating a second application login control method in an embodiment of the present application;
fig. 11 is a schematic structural diagram of an electronic device to which an embodiment of the present application is applied.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments, but not all embodiments, of the technical solutions of the present application. All other embodiments obtained by a person skilled in the art without any inventive step based on the embodiments described in the present application are within the scope of the protection of the present application.
Some concepts related to the embodiments of the present application are described below.
Sandbox (also called sand table): i.e., a virtual system program, that allows a user to run a browser or other program in a sandbox environment so that changes made to the run can be subsequently deleted. The method creates an independent operation environment similar to a sandbox, and programs running in the environment cannot permanently influence a hard disk. It is an independent virtual environment that can be used to test untrusted applications or internet behavior. In the embodiment of the application, a sandbox technology can be adopted to build an Android virtual machine in an APP (application program) to operate other APPs.
A sandbox environment: an API (Application Program Interface) capability open platform sandbox environment is an auxiliary environment for clients to develop Interface functions and coordinate major functions. The sandbox environment provides the main functions of the open platform, and customers can know, combine and debug various open interfaces in the sandbox environment according to self requirements to carry out development and debugging work, so that the customers can carry out online debugging and acceptance work more quickly and smoothly.
The login state and the login state are mutually switched: with the popularization of services, it is increasingly difficult to directly maintain sessions, and therefore, generally, a token (representing an object for performing some operation right) is used to represent the login state of a user, so as to identify the identity of the user, which is the login state. In this embodiment of the application, the login state information may be represented by OpenId (login state, which is a unique identifier of a user), which refers to a unique id (identifier) of a user under an application platform such as a social application, and each user entering an application program may be assigned an OpenId, which is similar to an identity card number, for a unique identification identifier. The login-state interaction interface may be used to mutually convert OpenId among multiple applications, and the OIDB service in the embodiment of the present application is a login-state interaction interface provided by a common social application, which is also referred to as an OpenId interaction interface.
A third party application: software developed by a pointer for a certain device, such as a mobile phone, a camera, and other devices, is also developed by manufacturers, but there are also many programming enthusiasts or application software developed by organizations specifically for a certain type of devices, which are called third-party applications. Social applications are a common third-party application, where social, i.e. social, communication is carried out, and applications that do so over a network are social applications.
Resource transfer: refers to the transfer of resources from one place to another. In the embodiment of the present application, it refers to when a target object requests resource transfer in a target application, for example, when the target object purchases a certain game item, and requests payment, electronic resources and the like are transferred from one platform or application to another platform or application.
Resource transfer mode, third party mode, and guest mode: the resource transfer mode refers to a mode for transferring resources when a target object triggers a resource transfer request in a target application, and is related to the login state of the target object. In this embodiment of the application, the resource transfer mode includes a third party mode and a guest mode, where the third party mode is that after the target object logs in the target application through the third party application, when the resource transfer request is triggered in the target application, the target object is in a third party login state at this time, and the corresponding resource transfer mode is the third party mode, which indicates that when the target object logs in the target application through the third party application, the target object pays by using the identity of the third party login state, and in this mode, the login state of the target object needs to be verified. The guest mode refers to the mode in which the target object pays for the guest identity, and the login state of the target object does not need to be verified.
Signature verification: when the target application is logged in through the third-party account, that is, when the target application is authorized to log in through the third-party application, the third-party application reversely verifies whether the signature of the request application is consistent with the signature registered on the platform through a method for acquiring the signature of the installed application of the system.
SDK (Software Development Kit ): are typically a collection of development tools used by some software engineers to build application software for a particular software package, software framework, hardware platform, operating system, etc. Software development tools include a collection of related documents, paradigms, and tools that broadly refer to assisting in the development of a certain class of software. In general, the SDK is an SDK used by an application program under a Windows (Windows operating system) platform. It may simply be a file that provides an application program interface API for a certain programming language, but may also include complex hardware that can communicate with a certain embedded system. Typical tools include utility tools for debugging and other purposes. SDKs also often include example code, supporting technical notes, or other supporting documentation to clarify suspicions for basic reference. In the embodiment of the application, the SDK can be pre-embedded in the target application, so that the SDK acquires the login request, receives the login result and establishes communication with the sandbox host application. When the SDK is pre-embedded in the target application, the method can be realized by adding maven dependence in the application program coding process of the target application and then calling a plurality of lines of codes.
A communication component: the ContentProvider (content provider or content provider, CP) running in the sandbox hosting application and the target application SDK, respectively, is used to enable intercommunication between the two (sandbox hosting application and SDK). The CP is an interface for sharing data between applications. The Content provider mechanism in the Android can support data storage and reading in multiple applications, and the Content provider better provides the uniformity of a data sharing interface. In the Android system, there is no common memory area for multiple applications to share stored data.
Cloud technology refers to a hosting technology for unifying serial resources such as hardware, software, network and the like in a wide area network or a local area network to realize calculation, storage, processing and sharing of data. Cloud technology (Cloud technology) is based on a general term of network technology, information technology, integration technology, management platform technology, application technology and the like applied in a Cloud computing business model, can form a resource pool, is used as required, and is flexible and convenient. Cloud computing technology will become an important support. Background services of the technical network system require a large amount of computing and storage resources, such as video websites, picture-like websites and more web portals. With the high development and application of the internet industry, each article may have its own identification mark and needs to be transmitted to a background system for logic processing, data in different levels are processed separately, and various industrial data need strong system background support and can only be realized through cloud computing.
The embodiment of the application mainly relates to the aspects of cloud computing, cloud security and the like in the cloud technology. The cloud computing is a computing mode, and distributes computing tasks on a resource pool formed by a large number of computers, so that various application systems can acquire computing power, storage space and information services according to needs. The network that provides the resources is referred to as the "cloud". Resources in the "cloud" appear to the user as being infinitely expandable and available at any time, available on demand, expandable at any time, and paid for on-demand. Cloud security refers to the generic name of security software, hardware, users, organizations, and security cloud platforms applied based on cloud computing business models. The cloud security integrates emerging technologies and concepts such as parallel processing, grid computing and unknown virus behavior judgment, abnormal monitoring of software behaviors in the network is achieved through a large number of meshed clients, the latest information of trojans and malicious programs in the internet is obtained and sent to the server for automatic analysis and processing, and then the virus and trojan solution is distributed to each client.
The embodiment of the application mainly relates to a research direction of cloud computing safety in cloud safety, and mainly comprises how to ensure safety of cloud and various applications on the cloud, including safety of a cloud computer system, safety storage and isolation of user data, user access authentication, information transmission safety, network attack protection, compliance audit and the like. In the embodiment of the present application, when the third-party application authorizes to log in the target application, signature verification needs to be performed to ensure the security of the application, and the process relates to the listed user access authentication and the like.
The following briefly introduces the design concept of the embodiments of the present application:
with the continuous development of science and technology, electronic technology has also gained rapid development, and the variety of electronic products is also more and more, and people also enjoy various conveniences brought by the development of science and technology. People can enjoy comfortable life brought along with the development of science and technology through various types of mobile terminals. For example, mobile terminals such as smart phones and tablet computers have become an important part of people's lives, and users can listen to music, play games and the like by using the mobile terminals such as smart phones and tablet computers, so as to relieve pressure brought by modern fast-paced lives.
Under the general condition, with the continuous development of the mobile internet and the continuous improvement of the intelligent terminal, the terminal device loaded with the android system at present no longer only has a communication function, various terminal application programs can be installed on the terminal device to provide functions for a user, and the user can perform operations in various aspects such as office, entertainment, life and the like by using the terminal device. However, these applications require testing before they are brought online or during online debugging.
A sandbox environment is a virtual environment that may be used to test an application. In the related art, when the target application is logged in through the third-party application in the sandbox environment, the third-party application is mainly cloned in the sandbox environment, so that the target application and the third-party application can be applied in the same environment, and signature verification is further completed.
However, in this manner, when the sandbox host application finds that the target application has a login behavior, the installation package of the third-party application needs to be acquired first for installation, and a long time for waiting for installation is generated in the login process. In addition, even if the third-party application is installed in the sandbox environment, the third-party application is brand-new and has no data, when a user needs to log in or pay, the account needs to be logged in again, and the account of the third-party application installed in the system can be kicked off, so that the operation is complicated.
In view of the above, the present application provides an application login control method, an application login control device, an electronic device, and a storage medium. Because the function of the sandbox host application is expanded, when the target application running in the sandbox environment determines that the target object logs in through the third-party application, the login request is transferred to the sandbox host application, the sandbox host application is entrusted to process, and the function of logging in the sandbox environment by the target application can be achieved. After receiving the login request, the sandbox host obtains login state information from a third-party application located outside the sandbox environment, namely local to the terminal device, and does not need to download and install the third-party application in the sandbox environment, so that the third-party application does not need to wait for downloading; and because the third-party application does not need to be installed in the sandbox environment, the situation that the third-party application account installed locally on the terminal equipment is kicked off the line can be avoided, and the efficiency of logging in the target application in the sandbox environment can be effectively improved.
The preferred embodiments of the present application will be described below with reference to the accompanying drawings of the specification, it should be understood that the preferred embodiments described herein are merely for illustrating and explaining the present application, and are not intended to limit the present application, and that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Fig. 1 is a schematic view of an application scenario in the embodiment of the present application. The application scenario diagram includes two terminal devices 110 and a server 130, and the application-related interface 120 can be logged in through the terminal devices 110. The terminal device 110 and the server 130 can communicate with each other through a communication network.
In an alternative embodiment, the communication network is a wired network or a wireless network. The terminal device 110 and the server 130 may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
In this embodiment, the terminal device 110 is an electronic device used by a user, and the electronic device may be a computer device having a certain computing capability and running instant messaging software and a website or social contact software and a website, such as a personal computer, a mobile phone, a tablet computer, a notebook, an e-book reader, a smart home, and the like. Each terminal device 110 and the server 130 are connected via a wireless Network, and the server 130 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server 130 providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a CDN (Content Delivery Network), a big data and artificial intelligence platform, and the like.
Each terminal device may be installed with a third-party application, a sandbox hosting application, and the like, the application related to the embodiment of the present application may be a software, or a client such as a web page, an applet, and the like, and the server is an application server corresponding to the software, or the web page, the applet, and the specific type of the client is not limited.
In the embodiment of the present application, the third-party application refers to an APP that runs outside the sandbox environment, that is, the third-party application and the sandbox-hosted application are both installed on the terminal device 110, and the target application runs inside the sandbox environment and runs inside the sandbox-hosted application.
Referring to fig. 2, an implementation flow chart of an application login control method provided in the embodiment of the present application is shown, and a specific implementation flow of the method applied to a sandbox host is as follows:
step S21: receiving a login request for logging in a target application through a third-party application, wherein the target application runs in a sandbox environment, and the third-party application runs outside the sandbox environment;
the third-party application refers to an application which can authorize to log in the target application. Some common target applications support login by using a third-party account, when a user logs in by using the third-party account, an application corresponding to the third-party account is the third-party application, for example, the third-party application may be a social application, and the user may log in a game APP, a video APP, or the like by using the social application account. Furthermore, it should be noted that the third-party application in the embodiment of the present application runs outside the sandbox environment, that is, the third-party application runs in a system local to the terminal device; and the target application is an application running in a sandbox environment, such as a game APP, a video APP, or the like.
In the embodiment of the application, the sandbox host application is an application for providing a sandbox environment, so that a virtual running environment can be provided based on the sandbox host application, other APPs can run in the virtual running environment, a program running inside the sandbox cannot generate permanent influence on a hard disk, and the sandbox host application can be used for testing a target application. Of course, a third-party application may also be run in the sandbox environment, that is, as listed in the related art, but the third-party application needs to be installed in the sandbox environment when the third-party application running in the sandbox environment logs in the target application, so that the login efficiency of the target application is reduced. In the embodiment of the application, the third-party application which can authorize to log in the target application is operated outside the sandbox environment and does not need to be installed in the sandbox environment, so that the time for waiting for installation is saved when the target application is logged in the sandbox environment.
For example, a third-party application X1 and a sandbox hosting application X2 are installed on a terminal device, when a user needs to log in a target application X3 through the third-party application X1 in the sandbox hosting application X2, the target application X3 sends a login request to the sandbox hosting application X2, corresponding processing is performed by the sandbox hosting application S2, the third-party application X1 does not need to be installed in a sandbox environment, waiting is not needed, and login efficiency of the target application X2 and the like is improved.
After receiving the login request, the sandbox host application may forward the login request to the third-party application, so that the third-party application displays an authorization interface to further acquire login state information, where the specific process is as follows in step S22 to step S24:
step S22: receiving first login state information sent by a third-party application in response to an authorization confirmation operation, wherein the first login state information is login state information of a target object associated with the authorization confirmation operation for logging in the third-party application;
for example, when a user clicks to play a game immediately after finding a favorite game in a sandbox, the sandbox host application first pulls up the login to acquire the OpenId of the user logging in the third-party application, that is, the first login state information. The detailed process of the sandbox host application pull-up login comprises the following steps:
and the sandbox host application forwards the login request to the third-party application, and the third-party application displays an authorization interface after receiving the login request. The target object can select a certain third-party account in the authorization interface through operations such as clicking and the like, authorization confirmation operations are triggered, and the third-party application sends the third-party account selected by the target object through the authorization confirmation operations to the sandbox host application as first login state information.
Referring to fig. 3, the left interface S31 in fig. 3 is an operation interface of the target application in the sandbox environment. When the user clicks "play now", the sandbox hosting application may pull the login, and an authorization interface shown in the right interface S32 of fig. 3 is displayed, which is an authorization interface of a third-party application listed in the embodiments of the present application. And displaying at least one piece of third party account information of the user in the authorization interface, wherein a confirmation button is displayed. As can be seen from fig. 3, the third party application is an a application, and the nickname of the third party account currently selected by the user is "ice lolly", and the avatar is as shown in the figure. When the user triggers the authorization confirmation operation through a confirmation button of 'A application authorization login', the third-party application sends corresponding third-party account information when the user executes the authorization confirmation operation, namely account information of the account of the ice lolly, to the sandbox host application as login state information when the user logs in the third-party application, wherein the ice lolly is a target object associated with the authorization confirmation operation.
Step S23: acquiring second login state information of the target object login target application based on the first login state information;
step S24: and sending the second login state information to the target application, so that the target application sets the target object to be in a login state according to the second login state information.
In the embodiment of the application, after the sandbox host application obtains the first login state information, the sandbox host application can obtain second login state information through a conversion or unique id binding mode, and return the second login state information to the target application, so that the target application executes corresponding logic, and the target object is set to be in a login state, wherein the second login state information is the login state information of the target object for logging in the target application.
Take the target application as a game APP running in a sandbox environment as an example. As shown in fig. 4, for example, when the user selects the account of the ice lolly, clicks "a application authorized login", after the login is successfully authorized by the third party application account, the third party application sends corresponding first login state information to the sandbox host application, and after the sandbox host application receives the first login state information, the login state information of the game APP can be converted or generated based on the first login state information and is returned to the game APP, so as to complete the game login and enter the game, and the interface S40 shown on the right side in fig. 4 is displayed, that is, the game interface after the game is entered.
Because the function of the sandbox host application is expanded, when the target application running in the sandbox environment determines that the target object logs in through the third-party application, the login request is transferred to the sandbox host application, the sandbox host application is entrusted to process, and the function of logging in the sandbox environment by the target application can be achieved. After receiving the login request, the sandbox host obtains login state information from a third-party application located outside the sandbox environment, namely local to the terminal device, and does not need to download and install the third-party application in the sandbox environment, so that the third-party application does not need to wait for downloading; and because the third-party application does not need to be installed in the sandbox environment, the situation that the third-party application account number locally installing the terminal equipment outside the sandbox kicks off the line can be avoided, and the efficiency of logging in the target application in the sandbox environment can be effectively improved. Moreover, the embodiment of the application can achieve lossless experience, and the user can not even perceive the experience, so that the same experience effect as that of local operation is achieved.
Optionally, in order to monitor the login request to ensure that the target application sends the login request to the sandbox host application, a monitoring module may be preset in the target application in the embodiment of the present application, and when the target object determines that the target application logs in through the third-party application, the monitoring module sends the login request to the sandbox host application.
The monitoring module in the embodiment of the application can be realized based on an embedded SDK (software development kit) in a target application, and the sandbox host application is provided with a communication component in communication connection with the SDK. Therefore, in the embodiment of the present application, when the monitoring module sends the login request to the sandbox host application, the following two ways are specifically adopted:
the first mode is that the SDK automatically initiates login, and the mode is suitable for strong login applications, namely target applications which can only run by login.
Specifically, when the target application is started in the sandbox environment, a preset monitoring module is called, so that a login request is generated when the monitoring module is called, and the login request is sent to the sandbox host application through the communication component.
Taking a game APP running in a sandbox environment as an example, because the game APP can call the login interface of the SDK after being accessed into the SDK, the login interface can be actively called directly when the game APP process is started, login is automatically initiated, a login request is generated, and the login request is sent to the sandbox host application through the communication component.
In the embodiment of the application, the SDK requests the sandbox host application to pull up for login through the communication component in the sandbox host application so as to obtain the first login state information of the target object for logging in the third-party application, and actively initiates a login behavior to realize login after entering the game APP.
And in the second mode, the SDK can intercept the login request, and the method is suitable for target applications which can run without login.
And after the target application is started, responding to the trigger operation of the target object aiming at the login control logged in through the third-party application, and generating a login request so that the monitoring module intercepts the login request and sends the intercepted login request to the sandbox host application through the communication assembly.
For the target application which does not need strong login, in the embodiment of the application, the target application can be started firstly, after the target application enters, when a user executes a triggering operation aiming at the login control through a third-party application, for example, when the user clicks an application A to authorize the login, a login request is generated, then the login request is intercepted by an SDK, the sandbox host application is pulled up to log in, then the sandbox host application returns second login state information (which refers to a login result) to the SDK accessed by the target application through a communication component, and the SDK returns the second login state information to the target application as a response of the login request.
In the embodiment, the SDK can acquire the login request and receive the login state information, and the login process is switched in, so that the target application can be logged in without installing a third-party application in the sandbox, and the application login efficiency is improved.
It should be noted that, in this embodiment of the present application, communication between the monitoring module of the target application and the sandbox host application is implemented based on a communication component, where the communication component may be a ContentProvider respectively running in the sandbox host application and the SDK of the target application, and is used to implement mutual communication between the sandbox host application and the SDK.
In an optional implementation manner, when the sandbox host application obtains the second login state information of the target application based on the first login state information of the third-party application, the sandbox host application may also be divided into the following two manners:
in the first mode, the first login state information of the third-party application is converted into the second login state information of the target application by calling the login state mutual conversion interface of the third-party application.
Taking the logging-state inter-conversion interface as the OIDB service in the third-party application a1 as an example, in the third-party application a1 login process, after the sandbox host is successfully logged in, the second logging-state information may be obtained in a conversion manner. Specifically, the sandbox host application calls the OIDB service in the third-party application A1, and the first login state information of the target object logging in the third-party application A1 is converted into the second login state information of the target object logging in the game APP.
For some third-party applications without OpenId conversion rights, the second login state information cannot be obtained through conversion by adopting a login state mutual conversion interface in one mode. At this time, the second registered state information can be generated in the following two ways.
And in a second mode, according to the first login state information of the third-party application, a new OpenId account is generated in a unique identifier binding mode, and the OpenId account is used as second login state information of the target application.
The unique identifier may be a terminal device unique id, for example, when the terminal device is a mobile phone, the unique identifier is a mobile phone unique id. After the sandbox host successfully logs in, login state information of the game APP can be obtained in a unique id binding mode.
For example, when login is authorized by the third-party application a2, the sandbox host application regenerates a new OpenId account as the second login state information of the target application for the target object to login according to the acquired first login state information of the target object to login the third-party application a2, and at this time, the login record is also saved by the mobile phone unique id. And if the target application is installed in the local system of the terminal equipment subsequently, the generated new OpenId account can be retrieved through the unique id of the mobile phone.
In the above embodiment, the sandbox host application may obtain the second login state information of the login target application in a conversion or unique ID binding manner, so as to return the second login state information to the target application, and the sandbox host application mainly processes the login process, so as to implement the function of logging in the sandbox environment by the login target application.
In an optional implementation manner, after the method for logging in the target application through the third-party application is introduced, an embodiment of the present application further provides a method for implementing resource transfer through the third-party application by using the sandbox host application. When the resource transfer is realized by the sandbox host application, the sandbox host application also has the related functions of the resource transfer, such as code scanning payment and the like.
In the sandbox host application, a module for completing the payment function may be referred to as a resource transfer component (hereinafter also referred to as a payment component), and for the target application side, after a related request for payment is transferred to the sandbox host application, the resource transfer component and a third-party application interact with each other to complete the processing of resource transfer and obtain a resource transfer result.
In addition, in the embodiment of the present application, the monitoring module preset in the target application may also monitor a resource transfer request (hereinafter, also referred to as a payment request). Referring to fig. 5, the specific operation of the target application side includes the following steps:
step S51: the target application responds to the resource transfer operation triggered by the target object, initiates a resource transfer request, and intercepts the resource transfer request initiated by the target application by the monitoring module;
step S52: the target application calls the monitoring module to modify a target request parameter in the resource transfer request into a request parameter corresponding to the guest mode, and the monitoring module sends the modified resource transfer request to the sandbox host application through the communication component;
when receiving the resource transfer request, the sandbox host application forwards the resource transfer request to the resource transfer component, the resource transfer component interacts with the third-party application according to the resource transfer interface corresponding to the tourist mode to complete resource transfer processing, and the resource transfer result is sent to the monitoring module of the target application through the communication component.
Step S53: and the target application receives the resource transfer result through the monitoring module.
Taking resource transfer as an example for payment, the resource transfer component in the sandbox hosted application includes a payment component. Referring to fig. 6, the left interface S61 shown in fig. 6 is a schematic diagram of a game store interface in a game APP according to an embodiment of the present application. Three game props of a money-shaking cow, a task crazy mule and a revival doodle are displayed in the interface S61, and information such as function introduction and price of each game prop. For example, the function of a joker is: double gold coins are obtained each time the door is opened, and the price is 6 electronic resources; the function of the task crazy mule is as follows: the task is refreshed immediately without waiting, and the price is 8 electronic resources; the revival doodle has the functions of: the revival is free once a week, and the price is 15 electronic resources.
For example, when the user clicks a payment control of "6" electronic resources to trigger a resource transfer operation, that is, when a payment operation is triggered, the interface S62 shown in fig. 6 may be displayed, which is a payment interface provided in the embodiment of the present application. Among them, 4 payment modes, namely a mode, B mode, C mode and D mode, are displayed in the interface S62. The user can select which payment method is adopted for payment in the interface, wherein different payment methods correspond to different third-party applications. Therefore, when the user selects different payment modes for payment, different third-party applications are called through the payment component of the sandbox host application to recharge the target application and complete payment.
For example, the payment of the application a is selected, that is, the sandbox host application charges the target application through the application a, and when charging, the electronic resource in the balance of the application a or the electronic resource in the payment card bound in the application a can be used for charging the game APP to complete the payment.
It should be noted that the third-party applications involved in the login process and the payment process in the embodiment of the present application may be different, for example, the application a, the application B, the application C, the application D, the application E, and the like are all third-party applications outside the sandbox environment. When logging in recreation APP in the sandbox environment, accessible A application authorizes the login, when paying in the sandbox environment, also can pay through third party's application, third party payment promptly. When the B application, the C application, the D application, and the E application also have the payment function, the payment may be made by any one of the B application, the C application, the D application, and the E application, and the payment does not necessarily have to be made by the a application at the time of registering the game APP.
In the embodiment of the application, the visitor payment interface of the payment component of the sandbox host application supports recharging any APP, so that when the target application initiates a payment request of third-party payment, the SDK intercepts the payment request, modifies the resource transfer mode indication parameters sessionid and sessionType in the payment request, and modifies the third-party mode into the visitor mode. The third-party mode is related to the third-party application when the target application is authorized to be logged in, for example, when the login is authorized through the application A, the third-party mode is represented as a login-state payment mode of the application A, when the login is authorized through the application B, the third-party mode is represented as a login-state payment mode of the application B, the payment in the third-party mode needs to be verified in the login state, and the characteristic of the payment of the tourist is that the login state is not verified, so that the resource transfer mode indication parameter in the payment request can be modified into the request parameter corresponding to the tourist mode through the process.
The target application may then delegate payment to the sandbox host application via the SDK. Specifically, the sandbox host application charges the target application through a visitor payment interface of the payment component to complete payment. Since the payment component of the sandbox hosting application is the uniform posting id for the deferid of the target application, which refers to the id of the target application under the payment platform, the posting is available no matter what payment method the user uses to make the payment.
In the embodiment of the application, the visitor payment interface of the payment component of the sandbox host application supports the recharge of any APP, when the target application initiates payment, the sandbox host application is entrusted to pay, and the sandbox host application recharges the application through the visitor payment of the payment component to complete the payment.
In the above embodiment, the payment process can be realized without installing or logging in a third-party application in the sandbox environment, and the payment process can be realized through the payment component of the sandbox host, so that the efficiency of application payment in the sandbox environment is improved. In addition, the visitor payment support of the payment component in the embodiment of the application supplements any APP with money, and the offer id is a uniform account id, so that the account can be reached no matter which third party payment form is adopted, and the payment process of the target application in the sandbox environment is realized.
Referring to fig. 7, an implementation flow chart of an application login control method provided in the embodiment of the present application is applied to a target application side, where the target application runs in a sandbox environment, and a specific implementation flow of the method is as follows:
s71: when a login request for logging in through a third-party application is received, the login request is sent to a sandbox host application, and the third-party application runs outside a sandbox environment;
s72: receiving second login state information, returned by the sandbox host application, of the target object during login, and setting the target object to be in a login state, wherein the second login state information is obtained by the sandbox host application according to first login state information of the target object for logging in the third-party application, the first login state information is obtained by the sandbox host application from the third-party application according to a login request, and the target object is associated with authorization confirmation operation performed on the third-party application.
Optionally, when receiving a login request for logging in through a third-party application, sending the login request to the sandbox host application includes:
calling a preset monitoring module when the monitoring module is started in a sandbox environment so as to generate a login request when the monitoring module is called, and sending the login request to the sandbox host application; or
After the monitoring module is started, a login request is generated in response to the triggering operation of the login control logged in through the third-party application, so that the monitoring module intercepts the login request and sends the login request to the sandbox host application.
Optionally, the method further comprises:
responding to the resource transfer operation triggered by the target object, and sending a resource transfer request to the sandbox host application so that the sandbox host application carries out resource transfer processing according to the resource transfer request after receiving the resource transfer request;
and receiving a resource transfer result returned by the sandbox host application.
Optionally, the sending the resource transfer request to the sandbox host application in response to the resource transfer operation triggered by the target object specifically includes:
responding to a resource transfer operation triggered by a target object, and acquiring a resource transfer request, wherein a resource transfer mode indication parameter in the resource transfer request is a request parameter corresponding to a third-party mode, and the third-party mode is determined based on a third-party application;
modifying the request parameter corresponding to the third-party mode into a request parameter corresponding to the visitor mode and then sending the request parameter to the sandbox host application; and
and the resource transfer result is obtained by the sandbox host application performing resource transfer processing according to the resource transfer interface corresponding to the guest mode.
Referring to fig. 8, an alternative interaction timing diagram is shown. The specific implementation flow of the method is as follows:
step S801: when the target application determines to log in the target application through the third-party application, the target application sends a login request to the sandbox host application;
step S802: the sandbox host application forwards the login request to the third party application;
step S803: the third party application displays an authorization interface;
step S804: the third party application responds to the authorization confirmation operation of the target object through the authorization interface and sends first login state information of the target object to log in the third party application to the sandbox host application;
step S805: the sandbox host application obtains second login state information of the target object to login the target application based on the first login state information;
step S806: the sandbox host application sends the second login state information to the target application;
step S807: and the target application sets the target object to be in a login state according to the second login state information.
Because the SDK is provided in the embodiment of the application, the target application can get through the login and payment process of the target application only by simply accessing the SDK, the request is transferred to the sandbox host application for processing, the sandbox host application is entrusted to skillfully pass the signature verification and the like of the third-party application, so that the third-party login and third-party payment functions of the target application in the sandbox environment are realized, and the application login and payment efficiency is improved.
As shown in fig. 9, which is a schematic structural diagram of a first application control device 900 in the embodiment of the present application, applied to a sandbox host application, and may include:
a first receiving unit 901, configured to receive a login request for logging in a target application through a third-party application, where the target application runs in a sandbox environment, and the third-party application runs outside the sandbox environment;
a second receiving unit 902, configured to receive first login state information sent by a third-party application in response to an authorization and confirmation operation, where the first login state information is login state information of a target object associated with the authorization and confirmation operation and used for logging in the third-party application;
an information obtaining unit 903, configured to obtain second login state information of the target application for login of the target object based on the first login state information;
the sending unit 904 sends the second login state information to the target application, so that the target application sets the target object in a login state according to the second login state information.
Optionally, the apparatus further comprises:
a third receiving unit 905, configured to receive a resource transfer request sent by a target application, where the resource transfer request is sent after the target application responds to a resource transfer operation triggered by a target object;
the first resource transferring unit 906 is configured to obtain a resource transferring result according to the resource transferring request, and return the resource transferring result to the target application.
Optionally, the resource transfer mode indication parameter included in the resource transfer request is a request parameter corresponding to the guest mode, the resource transfer request is sent after the target application modifies the resource transfer mode indication parameter in the resource transfer request triggered by the target object from a third-party mode to the guest mode, and the third-party mode is determined based on the third-party application;
the first resource transfer unit 906 is specifically configured to:
and when the resource transfer result is obtained according to the resource transfer request, the resource transfer result is obtained according to the resource transfer interface corresponding to the guest mode, and the resource transfer result is returned to the target application.
Optionally, the information obtaining unit 903 is specifically configured to:
the method comprises the steps that a login state mutual conversion interface of a third-party application is called, and first login state information of the third-party application is converted into second login state information of a target application; or
And generating an OpenId account in a unique identifier binding mode according to the first login state information of the third-party application, and taking the OpenId account as the second login state information of the target application.
As shown in fig. 10, which is a schematic structural diagram of a second application control apparatus 1000 in the embodiment of the present application, and is applied to a target application, where the target application runs in a sandbox environment, the method may include:
a request unit 1001 configured to send a login request to a sandbox host application when receiving a login request for login by a third-party application, the third-party application running outside a sandbox environment;
the login unit 1002 is configured to receive second login state information, which is obtained by the sandbox host application according to first login state information of the target object when the target object logs in, and set the target object in a login state, where the second login state information is obtained by the sandbox host application according to first login state information of the target object when the target object logs in to the third party application, the first login state information is obtained by the sandbox host application from the third party application according to the login request, and the target object is a target object associated with an authorization confirmation operation performed on the third party application.
Optionally, the requesting unit 1001 is specifically configured to:
calling a preset monitoring module when the monitoring module is started in a sandbox environment so as to generate a login request when the monitoring module is called, and sending the login request to the sandbox host application; or
After the monitoring module is started, a login request is generated in response to the triggering operation of the login control logged in through the third-party application, so that the monitoring module intercepts the login request and sends the login request to the sandbox host application.
Optionally, the apparatus further comprises:
a second resource transfer unit 1003, configured to send a resource transfer request to the sandbox host application in response to a resource transfer operation triggered by the target object, so that the sandbox host application performs resource transfer processing according to the resource transfer request after receiving the resource transfer request;
and receiving a resource transfer result returned by the sandbox host application.
Optionally, the second resource transfer unit 1003 is specifically configured to:
responding to a resource transfer operation triggered by a target object, and acquiring a resource transfer request, wherein a resource transfer mode indication parameter in the resource transfer request is a request parameter corresponding to a third-party mode, and the third-party mode is determined based on a third-party application;
modifying the request parameter corresponding to the third-party mode into a request parameter corresponding to the visitor mode and then sending the request parameter to the sandbox host application; and
and the resource transfer result is obtained by the sandbox host application performing resource transfer processing according to the resource transfer interface corresponding to the guest mode.
For convenience of description, the above parts are separately described as modules (or units) according to functional division. Of course, the functionality of the various modules (or units) may be implemented in the same one or more pieces of software or hardware when implementing the present application.
After introducing the application login control method and apparatus according to an exemplary embodiment of the present application, an electronic device according to another exemplary embodiment of the present application is introduced next.
As will be appreciated by one skilled in the art, aspects of the present application may be embodied as a system, method or program product. Accordingly, various aspects of the present application may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
Fig. 11 is a block diagram illustrating an electronic device 1100 according to an example embodiment, the apparatus comprising:
a processor 1110;
a memory 1120 for storing instructions executable by the processor 1110;
the processor 1110 is configured to execute instructions to implement the application login control method in the embodiment of the present application.
In an exemplary embodiment, a storage medium comprising instructions, such as the memory 1120 comprising instructions, executable by the processor 1110 of the electronic device 1100 to perform the method described above is also provided. Alternatively, the storage medium may be a non-transitory computer readable storage medium, for example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In some possible implementations, the present embodiments provide a computer program product or a computer program comprising computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions to cause the computer device to execute the steps of any one of the application login control methods described above.
In some possible embodiments, the various aspects of the application login control method provided in the present application may also be implemented in the form of a program product comprising program code for causing a computer device to perform the steps in the application login control method according to various exemplary embodiments of the present application described above in this specification when the program product is run on a computer device, for example, the computer device may perform the steps as shown in fig. 2 or fig. 7.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product of embodiments of the present application may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a computing device. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with a command execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with a command execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Furthermore, those skilled in the art will appreciate that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied in the medium.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or portions thereof contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as cloud service, a cloud database, cloud computing, a cloud function, cloud storage, network service, cloud communication, middleware service, domain name service, security service, CDN, and a big data and artificial intelligence platform. The terminal may be, but is not limited to, a smart phone, a tablet computer, a laptop computer, a desktop computer, a smart speaker, a smart watch, and the like. The terminal and the server may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (15)

1. A login control method is applied to a sandbox host application, and comprises the following steps:
receiving a login request for logging in a target application through a third-party application, wherein the target application runs in a sandbox environment, and the third-party application runs outside the sandbox environment;
receiving first login state information sent by the third-party application in response to an authorization confirmation operation, wherein the first login state information is login state information of a target object associated with the authorization confirmation operation for logging in the third-party application;
acquiring second login state information of the target object for logging in the target application based on the first login state information;
and sending the second login state information to the target application, so that the target application sets the target object to be in a login state according to the second login state information.
2. The method of claim 1, wherein the method further comprises:
receiving a resource transfer request sent by the target application, wherein the resource transfer request is sent after the target application responds to a resource transfer operation triggered by the target object;
and obtaining a resource transfer result according to the resource transfer request, and returning the resource transfer result to the target application.
3. The method according to claim 2, wherein the resource transfer request includes a resource transfer mode indication parameter that is a request parameter corresponding to a guest mode, the resource transfer request is sent after the target application modifies the resource transfer mode indication parameter in the resource transfer request triggered by the target object from a third party mode to the guest mode, and the third party mode is determined based on the third party application;
and when a resource transfer result is obtained according to the resource transfer request, obtaining the resource transfer result according to a resource transfer interface corresponding to the guest mode, and returning the resource transfer result to the target application.
4. The method according to any one of claims 1 to 3, wherein the obtaining second login state information of the target object logging in the target application based on the first login state information specifically includes:
converting the first login state information of the third-party application into second login state information of the target application by calling a login state mutual conversion interface of the third-party application; or
And generating a login state OpenId account in a unique identifier binding mode according to the first login state information of the third-party application, and taking the OpenId account as second login state information of the target application.
5. An application login control method is applied to a target application, wherein the target application runs in a sandbox environment, and the method comprises the following steps:
when a login request for logging in through a third-party application is received, sending the login request to a sandbox host application, wherein the third-party application runs outside a sandbox environment;
receiving second login state information, returned by the sandbox host application, of the target object during login, and setting the target object in a login state, wherein the second login state information is obtained by the sandbox host application according to first login state information of the target object for logging in the third-party application, the first login state information is obtained by the sandbox host application from the third-party application according to the login request, and the target object is associated with authorization confirmation operation performed on the third-party application.
6. The method of claim 5, wherein sending a login request to the sandbox host application upon receiving the login request to login via the third party application comprises:
calling a preset monitoring module when the sandbox environment is started, so that the login request is generated when the monitoring module is called, and the login request is sent to the sandbox host application; or
And after the monitoring module is started, responding to the triggering operation of the login control logged in through the third-party application to generate the login request, so that the monitoring module intercepts the login request and sends the login request to the sandbox host application.
7. The method of claim 5, wherein the method further comprises:
responding to the resource transfer operation triggered by the target object, and sending a resource transfer request to the sandbox host application so that the sandbox host application carries out resource transfer processing according to the resource transfer request after receiving the resource transfer request;
and receiving a resource transfer result returned by the sandbox host application.
8. The method according to claim 7, wherein said sending a resource transfer request to said sandbox hosting application in response to said target object triggered resource transfer operation comprises:
responding to the resource transfer operation triggered by the target object, and obtaining a resource transfer request, wherein a resource transfer mode indication parameter in the resource transfer request is a request parameter corresponding to a third-party mode, and the third-party mode is determined based on the third-party application;
modifying the request parameter corresponding to the third-party mode into a request parameter corresponding to a guest mode and then sending the request parameter to the sandbox host application; and
and the resource transfer result is obtained by the sandbox host application performing resource transfer processing according to the resource transfer interface corresponding to the guest mode.
9. An application login control device, which is applied to a sandbox host application, comprises:
a first receiving unit, configured to receive a login request for logging in a target application through a third-party application, where the target application runs in a sandbox environment and the third-party application runs outside the sandbox environment;
a second receiving unit, configured to receive first login state information sent by the third-party application in response to an authorization confirmation operation, where the first login state information is login state information of a target object associated with the authorization confirmation operation logging in the third-party application;
the information acquisition unit is used for acquiring second login state information of the target object for logging in the target application based on the first login state information;
and the sending unit is used for sending the second login state information to the target application, so that the target application sets the target object to be in a login state according to the second login state information.
10. The apparatus of claim 9, wherein the apparatus further comprises:
a third receiving unit, configured to receive a resource transfer request sent by the target application, where the resource transfer request is sent by the target application after responding to a resource transfer operation triggered by the target object;
and the first resource transfer unit is used for obtaining a resource transfer result according to the resource transfer request and returning the resource transfer result to the target application.
11. The apparatus according to claim 10, wherein the resource transfer request includes a resource transfer mode indication parameter that is a request parameter corresponding to a guest mode, the resource transfer request is sent after the target application modifies the resource transfer mode indication parameter in the resource transfer request triggered by the target object from a third party mode to the guest mode, and the third party mode is determined based on the third party application;
the first resource transfer unit is specifically configured to:
and when a resource transfer result is obtained according to the resource transfer request, obtaining the resource transfer result according to a resource transfer interface corresponding to the guest mode, and returning the resource transfer result to the target application.
12. The apparatus according to any one of claims 9 to 11, wherein the information obtaining unit is specifically configured to:
converting the first login state information of the third-party application into second login state information of the target application by calling a login state mutual conversion interface of the third-party application; or
And generating an OpenId account in a unique identifier binding mode according to the first login state information of the third-party application, and taking the OpenId account as the second login state information of the target application.
13. An application login control device, applied to a target application, the target application running in a sandbox environment, comprising:
the device comprises a request unit, a display unit and a display unit, wherein the request unit is used for sending a login request to a sandbox host application when receiving the login request logged in through a third-party application, and the third-party application runs outside a sandbox environment;
and the login unit is used for receiving second login state information, returned by the sandbox host application, of the target object during login, and setting the target object to be in a login state, wherein the second login state information is obtained by the sandbox host application according to first login state information of the target object for logging in the third-party application, the first login state information is obtained by the sandbox host application from the third-party application according to the login request, and the target object is a target object associated with authorization confirmation operation performed on the third-party application.
14. An electronic device, comprising a processor and a memory, wherein the memory stores program code which, when executed by the processor, causes the processor to perform the steps of the method of any of claims 1 to 4 or the steps of the method of any of claims 5 to 8.
15. A computer-readable storage medium, characterized in that it comprises program code for causing an electronic device to carry out the steps of the method of any one of claims 1 to 4 or the steps of the method of any one of claims 5 to 8, when said program product is run on said electronic device.
CN202010878647.XA 2020-08-27 2020-08-27 Application login control method and device, electronic equipment and storage medium Pending CN112100613A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010878647.XA CN112100613A (en) 2020-08-27 2020-08-27 Application login control method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010878647.XA CN112100613A (en) 2020-08-27 2020-08-27 Application login control method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112100613A true CN112100613A (en) 2020-12-18

Family

ID=73758023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010878647.XA Pending CN112100613A (en) 2020-08-27 2020-08-27 Application login control method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112100613A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112966257A (en) * 2021-05-18 2021-06-15 腾讯科技(深圳)有限公司 Authorization method and device for application program
CN113259939A (en) * 2021-07-07 2021-08-13 杭州天谷信息科技有限公司 Terminal credibility authentication method and system based on electronic signature

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112966257A (en) * 2021-05-18 2021-06-15 腾讯科技(深圳)有限公司 Authorization method and device for application program
CN113259939A (en) * 2021-07-07 2021-08-13 杭州天谷信息科技有限公司 Terminal credibility authentication method and system based on electronic signature
CN113259939B (en) * 2021-07-07 2021-10-29 杭州天谷信息科技有限公司 Terminal credibility authentication method and system based on electronic signature

Similar Documents

Publication Publication Date Title
US9451043B2 (en) Remote virtualization of mobile apps
CN113296798B (en) Service deployment method, device and readable storage medium
CN111991813B (en) Method and device for logging in game, electronic equipment and storage medium
CN110351269A (en) The method for logging in open platform by third-party server
CN109787959B (en) Account information processing method and related device
CN105939362A (en) User account management method and device
JP2015537305A (en) Method, apparatus, facility, program and recording medium for adding plug-in to address book
CN110007936B (en) Data processing method and device
CN106027631B (en) Data transmission method and device
JP6127241B2 (en) Application fulfillment to device
CN112100613A (en) Application login control method and device, electronic equipment and storage medium
TWI839875B (en) Payment method, user terminal, device, equipment, system and medium
EP2893500A2 (en) Management of digital receipts
CN109614778B (en) Dynamic configuration method, gateway and system for user permission
CN110442407B (en) Application program processing method and device
CN112966257B (en) Authorization method and device for application program
CN111078424A (en) Information interaction method and device, computer equipment and storage medium
CN108769059B (en) Verification method, device, medium and computing equipment
CN112291183A (en) Account login method, system and related equipment
CN112286632B (en) Cloud platform, cloud platform management method and device, electronic equipment and storage medium
CN111580883B (en) Application program starting method, device, computer system and medium
CN112491940B (en) Request forwarding method and device of proxy server, storage medium and electronic equipment
CN115454576B (en) Virtual machine process management method and system and electronic equipment
CN105141586B (en) A kind of method and system verified to user
US20230074627A1 (en) Method and system for detecting forgery of mobile application by using user identifier and signature collection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40035372

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination