CN113010858B - Method and equipment for logging in application in user equipment - Google Patents
Method and equipment for logging in application in user equipment Download PDFInfo
- Publication number
- CN113010858B CN113010858B CN202110224570.9A CN202110224570A CN113010858B CN 113010858 B CN113010858 B CN 113010858B CN 202110224570 A CN202110224570 A CN 202110224570A CN 113010858 B CN113010858 B CN 113010858B
- Authority
- CN
- China
- Prior art keywords
- information
- user equipment
- target application
- identification information
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B11/00—Transmission systems employing sonic, ultrasonic or infrasonic waves
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application aims to provide a method for logging in an application in user equipment, which is applied to a first user and the equipment and comprises the following steps: responding to a trigger event in the first user equipment, acquiring current authorized login information of a target application corresponding to the trigger event, and packaging the authorized login information into first data information according to a preset protocol; executing a first preset operation on the first data information to generate second data information; adding check information in the second data information to generate audio data information; and playing the audio data information according to a preset frequency through the first sound device so that one or more corresponding second user equipment can acquire the audio data information, and logging in the target application according to the audio data information. The method and the device for the application login can simplify the operation of the user for logging in the application, and improve the experience of the user for using the application.
Description
Technical Field
The present application relates to the field of communications, and in particular, to a technique for logging in an application in a user equipment.
Background
At present, after a user has a user account related to any application, if a plurality of devices of the user need to share the user account for login synchronously, if the application in a certain device is already logged in, and other devices need to log in simultaneously, there are two ways: firstly, other equipment needing to be logged in provides a two-dimensional code, the two-dimensional code is identified by the logged-in equipment, authorized login is clicked on the logged-in equipment, for example, a mall on a computer browser, and the login can be scanned by a mobile phone application; and the other equipment needing to log in provides a user name and a password input box, and the user manually inputs the login.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for logging in an application in a user equipment.
According to an aspect of the present application, there is provided a method for logging in an application in a user equipment, applied to a first user equipment, wherein the first user equipment includes a first sound device, the method including:
responding to a trigger event in the first user equipment, acquiring current authorized login information of a target application corresponding to the trigger event, and packaging the authorized login information into first data information according to a preset protocol;
executing a first preset operation on the first data information to generate second data information;
adding verification information in the second data information to generate audio data information;
and playing the audio data information according to a preset frequency through the first sound device so that the audio data information can be collected by one or more corresponding second user equipment, and logging in the target application according to the audio data information.
According to another aspect of the present application, there is provided a method for logging in an application in a user equipment, applied to a second user equipment, wherein the second user equipment includes a second sound device, the method including:
responding to a trigger event in the second user equipment, and acquiring audio data information played by the first user equipment through the second sound device, wherein the audio data information is played at a preset frequency;
performing a second preset operation on the audio data information to generate first data information;
analyzing the first data information according to a preset protocol to obtain authorized login information of the target application corresponding to the trigger event;
and executing login operation on the target application according to the authorized login information.
According to another aspect of the present application, there is provided a method for logging in an application in a user equipment, applied to a network device, wherein the method includes:
receiving a login request sent by second user equipment, wherein the login request comprises identification information of a target application and authorized login information, and the authorized login information comprises account identification information of the target application currently logged in the first user equipment and authorized identification information provided by the first user equipment;
responding to the login request, and inquiring in the network equipment according to the identification information of the target application, the account identification information and the authorization identification information, wherein the network equipment stores the corresponding relation of the application identification information, the account identification information and the authorization identification information;
and if the query result is not empty, returning a login allowing instruction to the second user equipment, wherein the login allowing instruction is used for allowing the target application to log in the second user equipment.
According to yet another aspect of the present application, there is provided a method for logging in an application in a user equipment, wherein a first user equipment comprises a first sound device and a second user equipment comprises a second sound device, the method comprising:
responding to a trigger event in the first user equipment, the first user equipment acquires current authorized login information of a target application corresponding to the trigger event, encapsulates the authorized login information into first data information according to a preset protocol, executes first preset operation on the first data information to generate second data information, and adds check information in the second data information to generate audio data information; the audio data information is played through the first sound device according to a preset frequency so that the audio data information can be collected by one or more corresponding second user equipment, and the target application is logged in according to the audio data information;
responding to a trigger event in the second user equipment, the second user equipment acquires the audio data information through the second sound device, executes second preset operation on the audio data information to generate first data information, and analyzes the first data information according to a preset protocol to acquire authorized login information of a target application corresponding to the trigger event;
the second user equipment sends a login request to network equipment corresponding to the target application according to the authorized login information, wherein the login request comprises identification information of the target application and the authorized login information, and the authorized login information comprises account identification information of the first user equipment for currently logging in the target application and authorized identification information provided by the first user equipment;
the network equipment receives the login request, responds to the login request, and inquires in the network equipment according to the identification information of the target application, the account identification information and the authorization identification information, wherein the corresponding relation of the application identification information, the account identification information and the authorization identification information is stored in the network equipment, and if the inquiry result is not empty, the network equipment returns a login permission instruction to the second user equipment;
and the second user equipment receives the login permission instruction and executes login operation on the target application based on the login permission instruction, wherein the target application logs in the second user equipment by using account identification information in the authorized login information.
According to an aspect of the application, there is provided a first user equipment for logging in an application in the user equipment, the first user equipment comprising a first sound device, the apparatus comprising:
a one-to-one module, configured to respond to a trigger event in the first user equipment, obtain current authorized login information of a target application corresponding to the trigger event, and package the authorized login information into first data information according to a preset protocol;
a second module, configured to perform a first preset operation on the first data information to generate second data information;
a third module, configured to add check information to the second data information to generate audio data information;
and the fourth module is used for playing the audio data information through the first sound device according to a preset frequency so that the corresponding one or more second user equipment can acquire the audio data information, and logging in the target application according to the audio data information.
According to an aspect of the present application, there is provided a second user equipment for logging in an application in the user equipment, the second user equipment comprising a second sound device, the apparatus comprising:
the first module is used for responding to a trigger event in the second user equipment and acquiring audio data information played by the first user equipment through the second sound device, wherein the audio data information is played at a preset frequency;
the second module is used for executing second preset operation on the audio data information to generate first data information;
a second module and a third module, which are used for analyzing the first data information according to a preset protocol to obtain authorized login information of the target application corresponding to the trigger event;
and the second module and the fourth module are used for executing login operation on the target application according to the authorized login information.
According to an aspect of the present application, there is provided a network device for logging in an application in a user equipment, the device comprising:
a third module, configured to receive a login request sent by a second user equipment, where the login request includes identification information of a target application and authorized login information, and the authorized login information includes account identification information of a first user equipment that currently logs in the target application and authorized identification information provided by the first user equipment;
a third module and a second module, configured to query the network device according to the identification information of the target application, the account identification information, and the authorization identification information in response to the login request, where a corresponding relationship between the application identification information, the account identification information, and the authorization identification information is stored in the network device;
and a third module, configured to return a login permission instruction to the second user equipment if the query result is not null, where the login permission instruction is used to allow the target application to log in the second user equipment.
According to an aspect of the present application, there is provided an apparatus for logging in an application in a user equipment, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of any of the methods described above.
According to another aspect of the application, there is provided a computer readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods described above.
According to an aspect of the application, a computer program product is provided, comprising a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the method as described above.
Compared with the prior art, in the application, a first user device obtains current authorized login information of a target application corresponding to a trigger event, encapsulates the authorized login information into first data information according to a preset protocol, executes a first preset operation on the first data information to generate second data information, adds check information into the second data information to generate audio data information, and plays the audio data information according to a preset frequency through a first sound device so that one or more corresponding second user devices can acquire the audio data information and log in the target application according to the audio data information. According to the method and the device, the second user equipment can execute the login operation of the target application in the second user equipment according to the audio data information (sound wave information) played by the first user equipment, the user can not need to perform complex manual operation, namely, the manual login operation of the user is simplified, the target application can be safely and efficiently logged in (namely, the possibility that the target application password is leaked is not generated), and therefore the user login experience is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology according to an embodiment of the present application;
FIG. 2 illustrates a method flow diagram of a system method for logging in an application in a user device according to one embodiment of the present application;
fig. 3 shows a flowchart of a method for logging in an application in a user equipment, applied to a first user equipment, according to an embodiment of the present application;
FIG. 4 illustrates a protocol diagram for logging into an application in a user device according to one embodiment of the present application;
FIG. 5 shows a flowchart of a method for logging in an application in a user equipment, applied to a second user equipment, according to an embodiment of the application;
FIG. 6 illustrates a flowchart of a method for logging in an application in a user device, applied to a network device, according to an embodiment of the present application;
FIG. 7 shows a schematic diagram for logging in an application in a user device according to an embodiment of the present application;
FIG. 8 illustrates a first user equipment structure diagram for logging in an application in user equipment according to one embodiment of the present application;
FIG. 9 illustrates a second user equipment structure diagram for logging into an application in user equipment according to one embodiment of the present application;
FIG. 10 illustrates a network device architecture diagram for logging applications in a user device, according to one embodiment of the present application;
FIG. 11 illustrates a system device structure diagram for logging applications in a user device according to one embodiment of the present application;
FIG. 12 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The device referred to in the present application includes, but is not limited to, a user equipment, a network device, or a device formed by integrating a user equipment and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), such as a smart phone, a tablet computer, and the like, and the mobile electronic product may employ any operating system, such as an android operating system, an iOS operating system, and the like. The network device includes an electronic device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 illustrates a typical scenario of the present application, in which a target application (e.g., a video application, a social application, etc.) is installed in a first user device, and a same-style target application is installed in one or more second user devices, e.g., an a application is installed in the first user device, and the one or more second user devices are all installed with the a application, where the first user device and the second user device include but are not limited to a mobile phone, a tablet, a computer, and a television, and the first user device and the second user device may be equipped with a system including but not limited to an Android (Android) system and an IOS system, and the system is not limited herein. The holding user of the first user device may log in the target application in various ways, for example, the user inputs registered user account identification information (for example, a user name or a user ID) and a login password in the target application, the user assists the target application in logging in the first user device through other devices that have logged in the target application (for example, the first user device provides a two-dimensional code related to the target application, and the user scans the two-dimensional code with the target application in the logged-in device to log in the target application on the first user device), the first user device establishes a communication connection with the network device of the target application, and based on the communication connection, the first user device sends the obtained authorized login information of the current target application to the network device, wherein the authorized login information includes account identification information of the current logged in target application and authorized identification information (for example, the authorized identification information is randomly generated by the first user device), and the network device updates the application identification information, the authorized login information and a continuation relation list of the authorized identification information according to the information, so as to obtain the authorized login instruction of the target application in the other devices after receiving the authorized login information. The first user equipment performs encryption, encoding and other operations on the authorized login information to convert the authorized login information into audio data information (subsequently, the first user equipment plays the audio data, for example, data played in a sound wave form), after the second user equipment receives the audio data in the vicinity of the first user equipment, the second user equipment obtains the authorized login information in the audio data according to the audio data, and sends a login request to the network equipment based on the authorized login information, the network equipment queries in the corresponding relation list according to the authorized login information provided by the second user equipment, and if the query result is not null, a login permission instruction about a target application is sent to the second user equipment, and the target application is successfully logged in the second user equipment.
Fig. 2 illustrates a system method for logging in an application in a user equipment, wherein a first user equipment includes a first sound device and a second user equipment includes a second sound device, according to an embodiment of the present application, the method includes:
responding to a trigger event in the first user equipment, the first user equipment acquires current authorized login information of a target application corresponding to the trigger event, encapsulates the authorized login information into first data information according to a preset protocol, executes first preset operation on the first data information to generate second data information, and adds check information in the second data information to generate audio data information; the audio data information is played through the first sound device according to a preset frequency so that the audio data information can be collected by one or more corresponding second user equipment, and the target application is logged in according to the audio data information;
responding to a trigger event in the second user equipment, the second user equipment acquires the audio data information through the second sound device, executes second preset operation on the audio data information to generate the first data information, and analyzes the first data information according to a preset protocol to acquire authorized login information of a target application corresponding to the trigger event;
the second user equipment sends a login request to network equipment corresponding to the target application according to the authorized login information, wherein the login request comprises identification information of the target application and the authorized login information, and the authorized login information comprises account identification information of the first user equipment for currently logging in the target application and authorized identification information provided by the first user equipment;
the network equipment receives the login request, responds to the login request, and inquires in the network equipment according to the identification information of the target application, the account identification information and the authorization identification information, wherein the corresponding relation of the application identification information, the account identification information and the authorization identification information is stored in the network equipment, and if the inquiry result is not empty, the network equipment returns a login permission instruction to the second user equipment;
and the second user equipment receives the login permission instruction and executes login operation on the target application based on the login permission instruction, wherein the target application logs in the second user equipment by using account identification information in the authorized login information.
Fig. 3 shows a method for logging in an application in a user equipment, applied to a first user equipment, according to an embodiment of the present application, the method including step S101, step S102, step S103, and step S104.
Specifically, in step S101, the first user equipment responds to a trigger event in the first user equipment, obtains current authorized login information of the target application corresponding to the trigger event, and encapsulates the authorized login information into first data information according to a preset protocol. For example, in response to a trigger operation of a holding user of the first user equipment in the setting of the target application, the first user equipment generates a trigger event, and in some embodiments, in step S101, the first user equipment enables, in response to the trigger event in the first user equipment, a sound wave enabling setting in the target application corresponding to the trigger event, acquires current authorized login information of the target application corresponding to the trigger event, and encapsulates the authorized login information into first data information according to a preset protocol. For example, the triggering operation includes an opening operation of a sound wave enabling setting in the target application, where the sound wave enabling setting is used for controlling the first user equipment to generate sound wave information related to the target application and send the related sound wave information to the outside. And on the premise of starting the sound wave enabling setting, providing a basis for the subsequent generation of sound wave information related to the target application. In some embodiments, in step S101, a first user equipment responds to a trigger event in the first user equipment, detects a login state of a target application corresponding to the trigger event, and if the login state of the target application includes a logged-in state, obtains current authorized login information of the target application, and encapsulates the authorized login information into first data information according to a preset protocol. For example, only in the case that the target application is logged in the first user equipment, the first user equipment may enable the sound wave enabling setting in the target application corresponding to the trigger event, so as to obtain the current authorized login information of the target application based on the enabled sound wave enabling setting. Or for example, whether the target application is logged in the first user equipment or not, the user may open the sound wave enabling setting in the target application, the first user equipment detects the current login state of the target application based on the enabled sound wave enabling setting, and if the target application is logged in the first user equipment, the current authorized login information of the target application is acquired; and if the first user equipment is not logged in, not executing any operation.
In the case that a target application is logged in a first user device, it may be determined that account identification information (e.g., a user name, a user ID (e.g., an ID of the user in the target application or a mobile phone number of the user)) logged in the target application at this time and password information matching the account are uploaded to a network device corresponding to the target application, where the account identification information is unique and the network device stores a mapping relationship between the account identification information and the password information of the target application. In some embodiments, before obtaining the current authorized login information of the target application corresponding to the trigger event, generating the authorized login information is further included, where the authorized login information includes application identification information of the target application, account identification information that has already been logged in the target application, and authorized identification information, and a manner of generating the authorized login information includes any one of:
1) The authorization identification information corresponding to the user account identification information (i.e., the authorization identification information corresponds to the password information matching the account) is generated locally by the first user equipment, for example, once the acoustic wave enabling device is turned on, and is used as authentication information for allowing other devices to log in the target application by using the user account identification information. For example, the authorization identification information of the target application may be unique (i.e. bound to the user account identification information) or may be a character string randomly generated by the first user equipment. In some embodiments, the method further includes step S105 (not shown), in step S105, the first user device sends the authorized login information to a network device corresponding to the target application, where the authorized login information further includes account identification information and authorized identification information that have been logged in the target application, and a corresponding relationship between the application identification information, the account identification information, and the authorized identification information is stored in the network device. For example, the first user equipment sends the generated authorized login information to the network equipment corresponding to the target application, so that subsequent second user equipment obtains the authorized login information and then performs login verification on the target application by using the authorized login information at the network equipment, thereby avoiding the possibility of password leakage caused by direct use of a password, where the correspondence includes application identification information (e.g., application name or application ID), account identification information (e.g., user ID, mobile phone number, etc.), and authorized identification information (e.g., a character string corresponding to the account identification information), for example:
application ID 1-user ID 1-authorization identification information 1;
application ID 2-user ID 2-authorization identification information 2;
the method comprises the steps of application ID 3-user ID 3-authorization identification information 3 \8230andapplication IDn-user IDn-authorization identification information n.
2) In some embodiments, the method further includes step S106 (not shown), in step S106, the first user equipment sends an information request to the network device corresponding to the target application in response to the trigger event, where the information request includes account identification information logged in the target application; and receiving authorized login information returned by the network equipment based on the account identification information, wherein the network equipment generates the authorized login information according to the inquired authorized identification information and the account identification information, and the authorized identification information is matched with password information corresponding to the account identification information. For example, once the acoustic wave enabling device is turned on, the first user equipment sends an information request to the network equipment corresponding to the target application to request authorized login information related to the target application, so as to subsequently log in the second user equipment where the target application is located by using the authorized login information. The network device stores corresponding relations of application identification information, account identification information and authorization identification information, and in response to the information request, the network device searches the corresponding relations according to the application identification of the target application and the logged account identification information to obtain the authorization identification information corresponding to the application identification of the target application and the logged account identification information. For example, the application identifier of the target application and the login account identifier information are an application ID3 and a user ID3, respectively, and the correspondence stored by the network device includes:
application ID 1-user ID 1-authorization identification information 1;
application ID 2-user ID 2-authorization identification information 2;
application ID 3-user ID 3-authorization identification information 3. Based on this, the network device determines that the corresponding authorization identification information is authorization identification information 3. The network device generates authorization login information according to the authorization identification information 3 and the user ID3, and returns the authorization login information to the first user device, in some embodiments, the network device stores a mapping relationship between account identification information of the target application and password information, and on the premise that the authorization identification information 3 is corresponding to the user ID3, the authorization identification information 3 is also corresponding to the password information of the user ID 3.
On the premise that the first user equipment acquires the current authorized login information of the target application corresponding to the trigger event, the first user equipment encapsulates the authorized login information into first data information according to a preset protocol, wherein the preset protocol is shown in fig. 4, and the total length of 4 bytes in a is stored; the 4 bytes in b store account identification information; c, storing the length x of the authorization identification information by 4 bytes; x bytes in d store authorization identification information. For example, 40 88888 adfd95a4b3634b58b0cf3b8c67b18a29, where 40 is the total length of a packet in which the first data information is located: 40 bytes, 88888 account identification information (e.g., user ID), 32 authorization code length: 32 bytes, adfd95a4b3634b58b0cf3b8c67b18a29 is authorization identification information. In some embodiments, the first user equipment reads all characters of the authorization login information according to bits in advance to obtain a binary string, and then encapsulates the binary string into the first data information according to a preset protocol, or encapsulates the authorization login information according to the preset protocol, and then reads all characters according to bits to obtain the binary string, so as to generate the first data information.
In step S102, the first user equipment performs a first preset operation on the first data information to generate second data information. Based on the first preset operation, the first data information can be converted into audio data so as to be played in the following process. In some embodiments, the first preset operation comprises at least one of:
1) Performing an AES (Advanced Encryption Standard ) Encryption operation;
2) Performing Base64 encoding operation;
3) A fast fourier transform operation is performed. For example, the first user equipment performs an AES encryption operation, a Base64 encoding operation, and a fast fourier transform operation on the first data information in sequence, wherein the operation sequence of the three operations is fixed. In some embodiments, the first user equipment may replace AES encryption with another encryption algorithm, as long as the encryption algorithm appears symmetrically, that is, the encryption side and the decryption side must keep the same algorithm, and use the same encryption algorithm and the same key, where, since the generated first data information is a binary file, the AES may encrypt data information in a binary format, and after obtaining encrypted content, the first user equipment invokes the system bottom interface to perform Base64 (representing binary data based on 64 printable characters) encoding once to obtain a Base64 encoded string, where the first user equipment converts the encrypted content into a string visible on a keyboard by using the Base64 encoding for use, and then the first user equipment invokes an open-source kisft library to perform fast fourier transform on the Base64 encoded string to obtain second data information, where the fast fourier transform is used to convert the Base64 encoded string into second data information stored in an audio format. The data information after the first preset operation can be transmitted more safely in the follow-up process, so that the leakage risk is reduced.
In step S103, the first user equipment adds the verification information to the second data information to generate the audio data information. In some embodiments, when the audio data information is played by the subsequent first user equipment, the audio data information includes the check rule, so that the second user equipment receiving the audio data information checks the received data information through the check rule. In some embodiments, in step S103, the first user equipment adds the verification information before the content of said second data information to generate the audio data information. For example, the first user equipment invokes a qrencoder interface in an open-source libefc library to add check information before the content of the second data information to obtain audio data information including original audio pcm (Pulse Code Modulation) data, where the check information includes odd check information, even check information, and the like, and what kind of check information is specifically adopted is agreed by the first user equipment and a second user equipment that subsequently receives a sound wave played by the first user equipment.
In step S104, the first user equipment plays the audio data information according to a preset frequency through the first sound device, so that the corresponding one or more second user equipments acquire the audio data information, and logs in the target application according to the audio data information. The first sound device includes, but is not limited to, a speaker of the first user equipment, and a voice playing device (e.g., a bluetooth speaker or the like) connected to the first user equipment. In some embodiments, when the sound wave enabling device is enabled by the target application, the first user equipment matches a corresponding preset frequency for the target application (for example, a corresponding preset protocol is used by the target application, and when the first user equipment encapsulates the friend request information by using the preset protocol, the preset protocol already agrees with a preset frequency when the subsequent first user equipment plays audio data information), so that when the subsequent first user equipment sends out sound wave information at the preset frequency, the second user equipment determines, according to the sound wave information at the preset frequency, the target application indicated by the sound wave information and a purpose indicated by the sound wave information (for example, related information for logging in the target application in the second user equipment) are determined by the second user equipment. For example, if the first user equipment is an android system, the first user equipment calls an AudioTrack component interface of the system to play the audio data information in a first sound device; and if the first user equipment is the IOS system, the first user equipment calls an Audio Unit component interface of the system to play the audio data information in the first sound device. For example, the first user device may try to play the audio data information at a location close to one or more second user devices, which may be different devices in which the target application is installed. In some embodiments, after one or more second user devices obtain the audio data information and parse out corresponding authorized login information to request login, when a network device confirms a login permission instruction for at least one second user device of the one or more second user devices, the network device sends, to the first user device, prompt information about whether the at least one second user device is permitted to log in the target application (for example, whether the second user devices 1 are permitted to log in simultaneously, whether the second user devices 2 are permitted to log in simultaneously, and whether the second user devices 3 are permitted to log in simultaneously), and after a holding user at the first user device side performs a trigger operation on the prompt information, the network device sends, to the network device, a confirmation instruction, for example, the holding user only triggers that the second user devices 1 are permitted to log in simultaneously, and according to the confirmation instruction, the network device sends a login permission instruction to the second user device 1, and the target application is logged in the second user device 1.
In some embodiments, the enabling, in response to a trigger event in the first user equipment, a sound wave enabling setting in a target application corresponding to the trigger event, acquiring current authorized login information of the target application corresponding to the trigger event, and encapsulating the authorized login information into first data information according to a preset protocol includes: enabling a sound wave enabling setting in a target application corresponding to a trigger event in response to the trigger event in the first user equipment; detecting whether the first user equipment is provided with the associated application of the target application, if so, acquiring the current authorized login information of the target application and the associated application, and encapsulating the current authorized login information of the target application into first data information according to a preset protocol, wherein the authorized login information comprises application identification information of the associated application; in step S104, the first user equipment plays the audio data information through the first sound device, so that the corresponding one or more second user equipments acquire the audio data information, and logs in the target application and the associated application according to the audio data information. For example, on the premise that the first user equipment enables the sound wave enabling setting in the target application corresponding to the trigger event, the first user equipment detects whether a related application of the target application is installed in the first user equipment, where the related application includes at least any one of:
the target application and the associated application belong to the same company;
the current login information (e.g., account identification information and corresponding password) of the target application may also log into the associated application;
the target application and the associated application are in an authorized application relationship with each other;
the target application is an authorized application of the associated application, wherein the authorized application comprises a login request for initiating the associated application by the target application and logging in.
In some embodiments, on the premise that the associated application exists, the authorization identification information generated by the first user equipment and related to the target application may also be used as the authorization identification information of the associated application, and the first user equipment acquires current authorization login information including the target application and the associated application, where the authorization login information may be subsequently granted to the target application and the associated application in the second user equipment for login at the same time, where the authorization login information includes the application identification information of the associated application, so that after the subsequent second user equipment acquires the authorization login information, it is determined whether to install the associated application according to the application identification information of the associated application, so as to subsequently log in the associated application.
Fig. 5 shows a method for logging in an application in a user equipment, which is applied to a second user equipment, wherein the second user equipment includes a second sound device, according to an embodiment of the present application, and the method includes step S201, step S202, step S203, and step S204.
Specifically, in step S201, the second user equipment responds to a trigger event in the second user equipment, and acquires audio data information played by the first user equipment through the second sound device, where the audio data information is played at a preset frequency. For example, a target application is installed in a first user device and a second user device, the target application in the first user device is in a login state, the second user device includes an Android device, an IOS device, a TV device, or a computer device, and the second sound device includes a microphone or a sound receiving device (e.g., a smart speaker) paired with the second user device. For example, the distance between the first user equipment (or the first sound device) and the second user equipment (or the second sound device) is less than or equal to a predetermined sound wave transmission distance, so that sound wave information played by the first user equipment can be heard by the second user equipment. In some embodiments, in step S201, the second user equipment responds to a trigger event in the second user equipment, enables a sound wave receiving setting in a target application corresponding to the trigger event, and acquires audio data information played by the first user equipment through the second sound device, where the audio data information is played at a preset frequency. In response to a trigger operation of a holding user of the second user equipment (for example, the user may be the holding user of the first user equipment) in the setting of the target application, the second user equipment generates a trigger event, wherein the trigger operation comprises an opening operation of a sound wave receiving setting in the target application, and the sound wave receiving setting is used for controlling the second user equipment to receive sound wave information related to the target application. And on the premise of starting the sound wave receiving setting, providing a basis for subsequently analyzing the sound wave information related to the target application. In some embodiments, when the sound wave receiving setting of the target application is turned on, the second user equipment has set a preset receiving frequency (i.e., the second user equipment can only receive sound wave data information of the preset receiving frequency) related to the target application, and since the sound wave enabling setting of the target application is also enabled in the first user equipment, when the first user equipment plays the sound wave related to the target application, the first user equipment has set a preset transmitting frequency (i.e., a preset frequency) related to the target application, wherein the preset transmitting frequency and the preset receiving frequency have the same frequency range, for example, 7000 HZ to 8000HZ. The audio data information emitted by the first user equipment can be received by the second user equipment.
In step S202, the second user equipment performs a second preset operation on the audio data information to generate first data information. Wherein the audio data information includes audio data information, and the target data including the audio data information may be converted into the first data information including binary data based on the second preset operation.
In some embodiments, the enabling, in response to a trigger event in the second user equipment, a sound wave receiving setting in a target application corresponding to the trigger event, and acquiring, by the second sound device, audio data information played by the first user equipment, where the audio data information is played at a preset frequency includes: responding to a trigger event in the second user equipment, starting sound wave receiving setting in a target application corresponding to the trigger event, acquiring audio data information played by the first user equipment through the second sound device, and detecting whether the audio data information meets a preset condition, wherein the audio data information is played at a preset frequency; in step S202, if the preset condition is satisfied, the second user equipment performs a second preset operation on the audio data information to generate first data information. For example, when the second user equipment receives the audio data information, it is required to first detect whether the audio data information (i.e., the sound wave data information) is complete and legal, for example, whether the audio data information satisfies a preset condition, and if the audio data information does not satisfy the preset condition (for example, in some embodiments, the second user equipment receives other audio data information other than the audio data information, which is a noise for the second user equipment and causes the audio data information received by the second user equipment to be incomplete or unsafe), continue to wait for the audio data information played again by the first user equipment, then continue to detect whether the audio data information satisfies the preset condition, and so on until the audio data information played by the first user equipment satisfies the preset condition. On the premise that the audio data information meets the preset condition, the second user equipment executes second preset operation on the audio data information, so that the efficiency and the accuracy of analyzing the audio data information are improved.
In some embodiments, the preset condition comprises at least any one of:
1) The length of the audio data information is consistent with the total length specified by the preset protocol;
2) The audio data information accords with a preset verification rule, wherein the audio data information is verified by verification information in the audio information; for example, after the second user equipment receives the audio data information, because the first user equipment and the second user equipment agree with a preset check rule (e.g., a parity check rule) for the audio data information, where the check rule is used to check whether specific audio data in a data packet where the audio data information is located is not lost and is complete, the first user equipment adds check information to the audio data information before playing the audio data information, so that the second user equipment receives the audio data information and detects whether the audio data information conforms to the preset check rule according to the check information (e.g., the parity check information), if so, the second user equipment determines that the specific content in the audio data information is complete, so as to analyze and obtain authorized login information continuously, for example, in the first receiving unit data, the first bit is a data check code of the unit, the second bit is a check code of the next unit data, the first bit of the second receiving unit data is compared with the second bit of the next unit data, if the first bit is the same, the second user equipment identifies that the unit data is correct, and thus, if the second bit is not, the second user equipment identifies that the unit data is received, and if the specific content of the second receiving unit data is not, the second user equipment identifies that the audio data is not, and the second user equipment detects whether the audio data, the frequency is not identical, and the second user equipment detects the specific content of the audio data. After the verification is completed, the second user equipment checks the total length of bytes in a data packet where the audio data information is located, and when the total length of the bytes is consistent with the total length set in a preset protocol, the second user equipment determines that the audio data information meets a preset condition, or after the verification is completed, the second user equipment analyzes the audio data information, specifically analyzes how long the data are, and is determined by the length defined in the preset protocol.
In some embodiments, the second preset operation comprises at least one of:
1) Removing the verification information;
2) Performing an inverse fast fourier transform operation;
3) Performing a Base64 decode operation;
4) AES decrypt operation is performed. For example, the second user equipment sequentially performs verification information removal, an inverse fast fourier transform operation, a Base64 decoding operation and an AES decryption operation on the audio data information, wherein the sequence of the four operations is fixed. In some embodiments, once it is detected whether the audio data information satisfies the preset condition, the removal operation is performed on the check data in the audio data information (for example, the second user equipment uses the check information to detect whether the audio data information satisfies the preset condition), and in some embodiments, the second user equipment may replace AES encryption with another encryption algorithm, and only that the encryption algorithm appears symmetrically, that is, the encryption side and the decryption side must keep the same algorithm, and the same encryption algorithm, the same key, is used.
Because the current audio data information comprises original audio pcm data, the second user equipment calls a qrencoder interface in an open-source libefc library to remove verification information from the audio data information, then the second user equipment calls an open-source kissfft library to perform inverse fast Fourier transform operation on the audio data information from which the verification information is removed to obtain data information, then calls a system bottom interface to perform Base64 (representing binary data based on 64 printable characters) decoding once to obtain AES encrypted data, and then performs AES decryption operation on the AES encrypted data to obtain first data information, wherein the first data information is a binary file.
In step S203, the second user equipment analyzes the first data information according to a preset protocol to obtain authorized login information of the target application corresponding to the trigger event. The preset protocol is shown in fig. 4, in which 4 bytes in a store the total length; 4 bytes in b store account identification information; the 4 bytes in the c store the length x of the authorization identification information; x bytes in d store authorization identification information. For example, the second user equipment may convert the first data information into a decimal data form, and obtain account identification information and authorization identification information from the first data information according to the preset protocol, where the authorization login information includes the account identification information and authorization identification information of the target application currently logged in the first user equipment, and the authorization identification information includes authorization identification information provided by the first user equipment.
In step S204, the second user equipment performs a login operation on the target application according to the authorized login information. For example, the authorized login information is a login credential sent by the first user equipment to authorize the second user equipment to log in the target application, and based on the login credential, the target application logs in the second user equipment with account identification information currently logged in the target application in the first user equipment.
In some embodiments, the authorized login information includes account identification information of the first user equipment currently logging in the target application and authorized identification information provided by the first user equipment, and in step S204, the second user equipment sends a login request to a network device corresponding to the target application according to the authorized login information, where the login request includes identification information of the target application and the authorized login information; and receiving a login permission instruction returned by the network device in response to the login request, and executing login operation on the target application based on the login permission instruction, wherein the target application logs in the second user device by using account identification information in the authorized login information. For example, the second user device sends a login request to the network device corresponding to the target application based on the authorized login information, where the login request includes identification information of the target application (e.g., application ID 1), account identification information in the authorized login information (user ID 1), and authorized identification information in the authorized login information (authorized identification information 1), and the network device receives the login request and responds to the login request, and queries, according to the identification information of the target application, the account identification information in the authorized login information, and the authorized identification information in the authorized login information, a correspondence relationship, for example, the correspondence relationship includes application identification information (e.g., application name or application ID), account identification information (user ID, mobile phone number, etc.), and authorized identification information (character string corresponding to the account identification information), for example:
application ID 1-user ID 1-authorization identification information 1;
application ID 2-user ID 2-authorization identification information 2;
application ID 3-user ID 3-authorization identification information 3 \8230andapplication IDn-user IDn-authorization identification information n. And if the network equipment determines that the query result information exists (namely the query result is not null), determining that the authorized login information acquired by the second user equipment is a valid credential for logging in the target application, and returning a login permission instruction about the target application to the second user equipment based on the valid credential, wherein the second user equipment performs login operation on the target application based on the instruction, and the current login information of the target application is consistent with the login information of the target application in the first user equipment.
Fig. 6 shows a method for logging in an application in a user equipment, which is applied to a network device, according to an embodiment of the present application, and the method includes steps S301, S302, and S303.
Specifically, in step S301, the network device receives a login request sent by a second user device, where the login request includes identification information of a target application and authorized login information, and the authorized login information includes account identification information of a first user device currently logging in the target application and authorized identification information provided by the first user device. For example, after receiving audio data information about a target application, which is played by a first user device, from a second user device, authorized login information is analyzed from the audio data information, the second user device sends a login request to a network device corresponding to the target application according to the authorized login information, where the login request includes identification information of the target application and the authorized login information, and the network device receives the login request.
In step S302, the network device responds to the login request, and queries the network device according to the identification information of the target application, the account identification information, and the authorization identification information, where the network device stores a corresponding relationship between the application identification information, the account identification information, and the authorization identification information. For example, the login request includes identification information of the target application (e.g., application ID 1), account identification information (user ID 1) in the authorized login information, and authorized identification information (authorized identification information 1) in the authorized login information, and the network device receives the login request and, in response to the login request, queries in a correspondence relationship according to the identification information of the target application, the account identification information in the authorized login information, and the authorized identification information in the authorized login information, for example, the correspondence relationship includes application identification information (e.g., application name or application ID), account identification information (user ID, mobile phone number, etc.), and authorized identification information (character string corresponding to account identification information), for example:
application ID 1-user ID 1-authorization identification information 1;
application ID 2-user ID 2-authorization identification information 2;
application ID 3-user ID 3-authorization identification information 3 \8230andapplication IDn-user IDn-authorization identification information n.
In step S303, if the query result is not null, the network device returns a login permission instruction to the second user device, where the login permission instruction is used to allow the target application to log in the second user device. The network device queries identification information (for example, an application ID 1) of the target application, account identification information (user ID 1) in the authorized login information, and authorized identification information (authorized identification information 1) in the authorized login information item by item in a corresponding relationship, determines that the authorized login information acquired by the second user device is a valid credential for logging in the target application if query result information (that is, a query result is not null) is determined, and returns a login permission instruction about the target application to the second user device based on the determination, and the second user device performs a login operation on the target application based on the instruction.
Fig. 7 is a schematic diagram of a method for logging in an application in a user equipment according to an embodiment of the present application, in which a device a initiates a sound wave authorizing other devices to log in the application, packages authorized login information into a protocol string according to an encapsulation protocol, encrypts the protocol string AES and then re-encrypts the base64, sequentially performs FFT (fast fourier transform) on the base64 character string, adds sound wave verification information to the converted content and generates sound data, plays the sound data through a sound device, a device B turns on a function of receiving sound wave login in a program, verifies the sound wave first when the device B receives a sound wave band of a specific frequency, and if the verification fails, continues to wait for the sound wave; and if the sound wave passes the verification, performing inverse fast Fourier transform on the sound data, performing BASE64 decoding on the data subjected to the inverse fast Fourier transform to obtain AES encrypted data, decrypting the AES encrypted data, analyzing according to a packaging protocol to obtain authorized login information, and logging in the application by the equipment B according to the authorized login information.
Fig. 8 shows a first user equipment for logging in an application in a user equipment, the first user equipment comprising a one-one module 101, a two-two module 102, a three-one module 103 and a four-one module 104 according to an embodiment of the application.
Specifically, the one-to-one module 101 is configured to, in response to a trigger event in the first user equipment, obtain current authorized login information of a target application corresponding to the trigger event, and encapsulate the authorized login information into first data information according to a preset protocol. For example, in response to a trigger operation of a holding user of the first user equipment in the setting of the target application, the first user equipment generates a trigger event.
A second module 102, configured to perform a first preset operation on the first data information to generate second data information. Based on the first preset operation, the first data information can be converted into audio data so as to be played in the following process.
A third module 103, configured to add verification information to the second data information to generate audio data information. In some embodiments, when the audio data information is played by the subsequent first user equipment, the audio data information includes the check rule, so that the second user equipment receiving the audio data information checks the received data information through the check rule.
A fourth module 104, configured to play the audio data information according to a preset frequency through the first sound device, so that the corresponding one or more second user equipments acquire the audio data information, and log in the target application according to the audio data information. The first sound device includes, but is not limited to, a speaker of the first user equipment, and a voice playing device (e.g., a bluetooth speaker or the like) connected to the first user equipment. In some embodiments, when the target application enables the sound wave enabling device, the first user equipment matches a corresponding preset frequency for the target application, so that when the first user equipment sends out sound wave information at the preset frequency, the second user equipment determines, according to the sound wave information at the preset frequency, the target application indicated by the sound wave information and a use indicated by the sound wave information (for example, information related to the target application in the second user equipment is logged in). For example, if the first user equipment is an android system, the first user equipment calls an AudioTrack component interface of the system to play the audio data information in a first sound device; if the first user equipment is the IOS system, the first user equipment calls an Audio Unit component interface of the system to play the audio data information in a first sound device. For example, the first user device may try to play the audio data information at a location close to one or more second user devices, which may be different devices in which the target application is installed.
In some embodiments, the one-to-one module 101 is configured to, in response to a trigger event in the first user equipment, detect a login status of a target application corresponding to the trigger event, obtain current authorized login information of the target application if the login status of the target application includes logged in, and encapsulate the authorized login information into first data information according to a preset protocol. The related operations are the same as or similar to those of the embodiment shown in FIG. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the one-to-one module 101 is configured to, in response to a trigger event in the first user equipment, enable a sound wave enabling setting in a target application corresponding to the trigger event, obtain current authorized login information of the target application corresponding to the trigger event, and encapsulate the authorized login information into first data information according to a preset protocol. The related operations are the same as or similar to those of the embodiment shown in fig. 3, and thus are not repeated herein, and are incorporated by reference.
In some embodiments, the enabling, in response to a trigger event in the first user equipment, a sound wave enabling setting in a target application corresponding to the trigger event, acquiring current authorized login information of the target application corresponding to the trigger event, and encapsulating the authorized login information into first data information according to a preset protocol includes: enabling a sound wave enabling setting in a target application corresponding to a trigger event in response to the trigger event in the first user equipment; detecting whether the first user equipment is provided with the associated application of the target application, if so, acquiring the current authorized login information of the target application and the associated application, and encapsulating the current authorized login information of the target application into first data information according to a preset protocol, wherein the authorized login information comprises application identification information of the associated application; a fourth module 104, configured to play the audio data information through the first sound device, so that the corresponding one or more second user devices acquire the audio data information, and log in the target application and the associated application according to the audio data information. The related operations are the same as or similar to those of the embodiment shown in FIG. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the first user equipment further includes a fifth module 105 (not shown), where the fifth module 105 is configured to send the authorization login information to a network device corresponding to the target application, where the authorization login information further includes account identification information and authorization identification information that have already logged in the target application, and a corresponding relationship between the application identification information, the account identification information, and the authorization identification information is stored in the network device. The related operations are the same as or similar to those of the embodiment shown in FIG. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the first user equipment further includes a sixth module 106 (not shown), where the sixth module 106 is configured to send, in response to the trigger event, an information request to a network device corresponding to the target application, where the information request includes account identification information logged in the target application; and receiving authorized login information returned by the network equipment based on the account identification information, wherein the network equipment generates the authorized login information according to the inquired authorized identification information and the account identification information, and the authorized identification information is matched with password information corresponding to the account identification information. The related operations are the same as or similar to those of the embodiment shown in fig. 3, and thus are not repeated herein, and are incorporated by reference.
In some embodiments, the first preset operation comprises at least one of:
performing an AES encryption operation;
performing Base64 encoding operations;
performing a fast fourier transform operation; the related operations are the same as or similar to those of the embodiment shown in FIG. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, a third module 103 is configured to add verification information before the content of the second data information to generate audio data information. The related operations are the same as or similar to those of the embodiment shown in FIG. 3, and therefore are not described again, and are included herein by reference.
Fig. 9 illustrates a second user equipment for logging in an application in the user equipment, wherein the second user equipment comprises a second sound device, and the second user equipment comprises a two-in-one module 201, a two-in-two module 202, a two-in-three module 203, and a two-in-four module 204 according to an embodiment of the present application.
Specifically, the first-second module 201 is configured to, in response to a trigger event in the second user equipment, acquire, by the second sound device, audio data information played by the first user equipment, where the audio data information is played at a preset frequency. For example, a target application is installed in a first user device and a second user device, the target application in the first user device is in a login state, the second user device includes an Android device, an IOS device, a TV device, or a computer device, and the second sound device includes a microphone or a sound receiving device (e.g., a smart speaker) paired with the second user device. For example, the distance between the first user equipment (or the first sound device) and the second user equipment (or the second sound device) is less than or equal to a predetermined sound wave transmission distance, so that sound wave information played by the first user equipment can be heard by the second user equipment.
A second-two module 202, configured to perform a second preset operation on the audio data information to generate first data information. Wherein the audio data information includes audio data information, and the target data including the audio data information may be converted into the first data information including binary data based on the second preset operation.
A third module 203, configured to analyze the first data information according to a preset protocol to obtain authorized login information of the target application corresponding to the trigger event. The preset protocol is shown in fig. 4, wherein 4 bytes in a store the total length; the 4 bytes in b store account identification information; the 4 bytes in the c store the length x of the authorization identification information; x bytes in d store authorization identification information. For example, the second user equipment may convert the first data information into a decimal data form, and obtain account identification information and authorization identification information from the first data information according to the preset protocol, where the authorization login information includes the account identification information and authorization identification information of the target application currently logged in the first user equipment, and the authorization identification information includes authorization identification information provided by the first user equipment.
A twenty-four module 204, configured to execute a login operation on the target application according to the authorized login information. For example, the authorized login information is a login credential sent by the first user equipment to authorize the second user equipment to log in the target application, and based on the login credential, the target application logs in the second user equipment with account identification information currently logged in the target application in the first user equipment.
In some embodiments, the first module 201 is configured to enable a sound wave receiving setting in a target application corresponding to a trigger event in response to the trigger event in the second user equipment, and acquire, by using the second sound device, audio data information played by the first user equipment, where the audio data information is played at a preset frequency. The related operations are the same as or similar to the embodiment shown in fig. 5, and therefore are not repeated herein, and are included herein by reference.
In some embodiments, in response to a trigger event in the second user equipment, enabling a sound wave receiving setting in a target application corresponding to the trigger event, and acquiring, by the second sound device, audio data information played by the first user equipment, where the audio data information is played at a preset frequency includes:
responding to a trigger event in the second user equipment, starting sound wave receiving setting in a target application corresponding to the trigger event, acquiring audio data information played by the first user equipment through the second sound device, and detecting whether the audio data information meets a preset condition or not, wherein the audio data information is played at a preset frequency; a second module 202, configured to perform a second preset operation on the audio data information to generate first data information if the preset condition is met. The related operations are the same as or similar to those of the embodiment shown in FIG. 5, and therefore are not described again, and are included herein by reference.
In some embodiments the preset conditions include at least any one of:
the length of the audio data information is consistent with the total length specified by the preset protocol;
the audio data information accords with a preset verification rule, wherein the audio data information is verified by verification information in the audio information; the related operations are the same as or similar to those of the embodiment shown in FIG. 5, and therefore are not described again, and are included herein by reference.
In some embodiments, the second preset operation comprises at least one of:
removing the verification information;
performing an inverse fast fourier transform operation;
perform Base64 decoding operations.
Performing an AES decryption operation; the related operations are the same as or similar to those of the embodiment shown in FIG. 5, and therefore are not described again, and are included herein by reference.
In some embodiments, the authorized login information includes account identification information of the first user equipment currently logged in the target application and authorized identification information provided by the first user equipment,
a fourth module 204, configured to send a login request to a network device corresponding to the target application according to the authorized login information, where the login request includes identification information of the target application and the authorized login information;
and receiving a login permission instruction returned by the network equipment in response to the login request, and executing login operation on the target application based on the login permission instruction, wherein the target application logs in the second user equipment by using account identification information in the authorized login information. The related operations are the same as or similar to those of the embodiment shown in FIG. 5, and therefore are not described again, and are included herein by reference.
Fig. 10 shows a network device for logging in an application in a user equipment according to an embodiment of the present application, the network device includes a three-in-one module 301, a three-in-two module 302, and a three-in-three module 303.
Specifically, the third module 301 is configured to receive a login request sent by a second user equipment, where the login request includes identification information of a target application and authorized login information, and the authorized login information includes account identification information of a first user equipment currently logging in the target application and authorized identification information provided by the first user equipment. For example, after receiving audio data information about a target application, which is played by a first user device, from a second user device, authorized login information is parsed from the audio data information, and the second user device sends a login request to a network device corresponding to the target application according to the authorized login information, where the login request includes identification information of the target application and the authorized login information, and the network device receives the login request.
A third-second module 302, configured to respond to the login request, and query the network device according to the identification information of the target application, the account identification information, and the authorization identification information, where a corresponding relationship between the application identification information, the account identification information, and the authorization identification information is stored in the network device. For example, the login request includes identification information of the target application (e.g., application ID 1), account identification information in the authorized login information (user ID 1), and authorized identification information in the authorized login information (authorized identification information 1), and the network device receives the login request and, in response to the login request, queries in a correspondence relationship according to the identification information of the target application, the account identification information in the authorized login information, and the authorized identification information in the authorized login information, where the correspondence relationship includes, for example, application identification information (e.g., application name or application ID), account identification information (user ID, mobile phone number, etc.), and authorized identification information (character string corresponding to account identification information), for example:
application ID 1-user ID 1-authorization identification information 1;
application ID 2-user ID 2-authorization identification information 2;
the method comprises the steps of application ID 3-user ID 3-authorization identification information 3 \8230andapplication IDn-user IDn-authorization identification information n.
And a third module 303, if the query result is not null, returning a login permission instruction to the second user equipment, where the login permission instruction is used to allow the target application to log in the second user equipment. The network device queries identification information (for example, an application ID 1) of the target application, account identification information (user ID 1) in the authorized login information, and authorized identification information (authorized identification information 1) in the authorized login information item by item in a corresponding relationship, determines that the authorized login information acquired by the second user device is a valid credential for logging in the target application if query result information (that is, a query result is not null) is determined, and returns a login permission instruction about the target application to the second user device based on the determination, and the second user device performs a login operation on the target application based on the instruction.
Fig. 11 illustrates a system apparatus for logging in an application in a user equipment, wherein a first user equipment includes a first sound device and a second user equipment includes a second sound device, according to an embodiment of the present application, the system including:
responding to a trigger event in the first user equipment, the first user equipment acquires current authorized login information of a target application corresponding to the trigger event, encapsulates the authorized login information into first data information according to a preset protocol, executes first preset operation on the first data information to generate second data information, and adds check information in the second data information to generate audio data information; the audio data information is played through the first sound device according to a preset frequency so that the audio data information can be collected by one or more corresponding second user equipment, and the target application is logged in according to the audio data information;
responding to a trigger event in the second user equipment, the second user equipment acquires the audio data information through the second sound device, executes second preset operation on the audio data information to generate the first data information, and analyzes the first data information according to a preset protocol to acquire authorized login information of a target application corresponding to the trigger event;
the second user equipment sends a login request to network equipment corresponding to the target application according to the authorized login information, wherein the login request comprises identification information of the target application and the authorized login information, and the authorized login information comprises account identification information of the first user equipment for currently logging in the target application and authorized identification information provided by the first user equipment;
the network equipment receives the login request, responds to the login request, and inquires in the network equipment according to the identification information of the target application, the account identification information and the authorization identification information, wherein the corresponding relation of the application identification information, the account identification information and the authorization identification information is stored in the network equipment, and if the inquiry result is not empty, the network equipment returns a login permission instruction to the second user equipment;
and the second user equipment receives the login permission instruction and executes login operation on the target application based on the login permission instruction, wherein the target application logs in the second user equipment by using account identification information in the authorized login information.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs the method of any of the preceding claims.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method as recited in any preceding claim.
FIG. 12 illustrates an exemplary system that can be used to implement the various embodiments described in this application;
in some embodiments, as shown in FIG. 12, the system 300 can be implemented as any of the devices in the various embodiments described. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or to any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. As such, the software programs (including associated data structures) of the present application can be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
Additionally, some portions of the present application may be applied as a computer program product, such as computer program instructions, which, when executed by a computer, may invoke or provide the method and/or solution according to the present application through the operation of the computer. Those skilled in the art will appreciate that the forms of computer program instructions that reside on a computer-readable medium include, but are not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. In this regard, computer readable media can be any available computer readable storage media or communication media that can be accessed by a computer.
Communication media includes media whereby communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, feRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (19)
1. A method for logging in an application in a user equipment, applied to a first user equipment, wherein the first user equipment comprises a first sound device, the method comprising:
responding to a trigger event in the first user equipment, acquiring current authorized login information of a target application corresponding to the trigger event, and packaging the authorized login information into first data information according to a preset protocol, wherein the authorized login information is generated by the first user equipment or network equipment before being acquired, the authorized login information comprises account identification information and authorized identification information which are logged in the target application, and the authorized identification information is used as verification information for allowing other equipment to log in the target application by using the account identification information;
executing a first preset operation on the first data information to generate second data information;
adding check information in the second data information to generate audio data information;
and playing the audio data information according to a preset frequency through the first sound device so that one or more corresponding second user equipment can acquire the audio data information, and requesting the network equipment to log in the target application according to the audio data information, wherein the network equipment stores corresponding relations of application identification information, account identification information and authorization identification information of the target application.
2. The method of claim 1, wherein the obtaining current authorized login information of a target application corresponding to a trigger event in response to the trigger event in the first user equipment, and encapsulating the authorized login information into first data information according to a preset protocol comprises:
responding to a trigger event in the first user equipment, detecting the login state of a target application corresponding to the trigger event, if the login state of the target application comprises logged-in, acquiring current authorized login information of the target application, and packaging the authorized login information into first data information according to a preset protocol.
3. The method of claim 2, wherein the obtaining current authorized login information of a target application corresponding to a trigger event in response to the trigger event in the first user equipment, and encapsulating the authorized login information into first data information according to a preset protocol comprises:
responding to a trigger event in the first user equipment, starting sound wave starting setting in a target application corresponding to the trigger event, acquiring current authorized login information of the target application corresponding to the trigger event, and packaging the authorized login information into first data information according to a preset protocol.
4. The method of claim 3, wherein the responding to a trigger event in the first user equipment, enabling a sound wave enabling setting in a target application corresponding to the trigger event, acquiring current authorized login information of the target application corresponding to the trigger event, and encapsulating the authorized login information into first data information according to a preset protocol comprises:
responding to a trigger event in the first user equipment, and enabling sound wave enabling setting in a target application corresponding to the trigger event;
detecting whether the first user equipment is provided with the associated application of the target application, if so,
acquiring current authorized login information of the target application and the associated application, and packaging the current authorized login information of the target application into first data information according to a preset protocol, wherein the authorized login information comprises application identification information of the associated application;
the playing the audio data information according to a preset frequency through the first sound device so that the audio data information can be collected by one or more corresponding second user equipment, and the logging in the target application according to the audio data information comprises:
and playing the audio data information through the first sound device so that the corresponding one or more second user equipment can acquire the audio data information, and logging in the target application and the associated application according to the audio data information.
5. The method of claim 4, wherein the method further comprises:
and sending the authorized login information to network equipment corresponding to the target application, wherein the authorized login information further comprises account identification information and authorized identification information which are logged in the target application, and the network equipment stores the corresponding relation among the application identification information, the account identification information and the authorized identification information.
6. The method of any of claims 1-4, wherein the method further comprises:
responding to the trigger event, and sending an information request to network equipment corresponding to the target application, wherein the information request comprises account identification information logged in the target application;
and receiving authorized login information returned by the network equipment based on the account identification information, wherein the network equipment generates the authorized login information according to the inquired authorized identification information and the account identification information, and the authorized identification information is matched with password information corresponding to the account identification information.
7. The method of claim 1, wherein the first preset operation comprises at least one of:
performing AES encryption operation;
performing Base64 encoding operations;
a fast fourier transform operation is performed.
8. The method of claim 1, wherein the adding of the verification information to the second data information to generate the audio data information comprises:
and adding check information in front of the content of the second data information to generate audio data information.
9. A method for logging in an application in user equipment, applied to a second user equipment, wherein the second user equipment includes a second sound device, the method comprising:
responding to a trigger event in the second user equipment, and acquiring audio data information played by the first user equipment through the second sound device, wherein the audio data information is played at a preset frequency;
performing a second preset operation on the audio data information to generate first data information;
analyzing the first data information according to a preset protocol to obtain authorized login information of a target application corresponding to the trigger event, wherein the authorized login information is generated by the first user equipment or network equipment before being acquired, the authorized login information comprises account identification information and authorized identification information which are logged in the target application, the authorized identification information is used as verification information for allowing other equipment to log in the target application by using the account identification information, and the network equipment stores corresponding relations of the application identification information, the account identification information and the authorized identification information of the target application;
and executing login operation on the target application according to the authorized login information.
10. The method of claim 9, wherein the obtaining, by the second sound device, audio data information played by the first user equipment in response to a trigger event in the second user equipment, wherein the playing of the audio data information at a preset frequency comprises:
and responding to a trigger event in the second user equipment, starting sound wave receiving setting in a target application corresponding to the trigger event, and acquiring audio data information played by the first user equipment through the second sound device, wherein the audio data information is played at a preset frequency.
11. The method according to claim 10, wherein the enabling, in response to a trigger event in the second user equipment, a sound wave receiving setting in a target application corresponding to the trigger event, and acquiring, by the second sound device, audio data information played by the first user equipment, wherein the audio data information is played at a preset frequency, comprises:
responding to a trigger event in the second user equipment, starting sound wave receiving setting in a target application corresponding to the trigger event, acquiring audio data information played by the first user equipment through the second sound device, and detecting whether the audio data information meets a preset condition, wherein the audio data information is played at a preset frequency;
the performing a second preset operation on the audio data information to generate first data information comprises:
and if the preset condition is met, executing second preset operation on the audio data information to generate first data information.
12. The method of claim 11, wherein the preset condition comprises at least any one of:
the length of the audio data information is consistent with the total length specified by the preset protocol;
the audio data information accords with a preset verification rule, wherein the audio data information is verified by the verification information in the audio information.
13. The method of claim 9, wherein the second preset operation comprises at least one of:
removing the verification information;
performing an inverse fast fourier transform operation;
performing Base64 decoding operations
An AES decryption operation is performed.
14. The method of claim 9, wherein the authorized login information includes account identification information of the first user device currently logged in to the target application and authorized identification information provided by the first user device,
the executing the login operation on the target application according to the authorized login information comprises:
sending a login request to network equipment corresponding to the target application according to the authorized login information, wherein the login request comprises identification information of the target application and the authorized login information;
and receiving a login permission instruction returned by the network equipment in response to the login request, and executing login operation on the target application based on the login permission instruction, wherein the target application logs in the second user equipment by using account identification information in the authorized login information.
15. A method for logging in an application in user equipment, which is applied to network equipment, wherein the method comprises the following steps:
receiving a login request sent by second user equipment, wherein the login request comprises identification information of a target application and authorized login information, the authorized login information comprises account identification information of the first user equipment for currently logging in the target application and authorized identification information provided by the first user equipment, the authorized login information is generated by the first user equipment or network equipment before being acquired, the authorized login information comprises the account identification information logged in the target application and the authorized identification information, and the authorized identification information is used as verification information for allowing other equipment to log in the target application by using the account identification information;
responding to the login request, and inquiring in the network equipment according to the identification information of the target application, the account identification information and the authorization identification information, wherein the network equipment stores the corresponding relation of the application identification information, the account identification information and the authorization identification information;
and if the query result is not null, returning a login allowing instruction to the second user equipment, wherein the login allowing instruction is used for allowing the target application to log in the second user equipment.
16. A method for logging in an application in a user equipment, wherein a first user equipment comprises a first sound device and a second user equipment comprises a second sound device, the method comprising:
responding to a trigger event in the first user equipment, the first user equipment acquiring current authorized login information of a target application corresponding to the trigger event, packaging the authorized login information into first data information according to a preset protocol, executing a first preset operation on the first data information to generate second data information, and adding check information in the second data information to generate audio data information; playing the audio data information according to a preset frequency through the first sound device so that one or more corresponding second user devices can acquire the audio data information and request the network device to log in the target application according to the audio data information, wherein the authorized login information is generated by the first user device or the network device before being acquired, the authorized login information comprises account identification information and authorized identification information which are logged in the target application, and the authorized identification information is used as verification information for allowing other devices to log in the target application by using the account identification information;
responding to a trigger event in the second user equipment, the second user equipment acquires the audio data information through the second sound device, executes second preset operation on the audio data information to generate first data information, and analyzes the first data information according to a preset protocol to acquire authorized login information of a target application corresponding to the trigger event;
the second user equipment sends a login request to network equipment corresponding to the target application according to the authorized login information, wherein the login request comprises identification information of the target application and the authorized login information, and the authorized login information comprises account identification information of the first user equipment for currently logging in the target application and authorized identification information provided by the first user equipment;
the network equipment receives the login request, responds to the login request, and inquires in the network equipment according to the identification information of the target application, the account identification information and the authorization identification information, wherein the corresponding relation of the application identification information, the account identification information and the authorization identification information is stored in the network equipment, and if the inquiry result is not empty, the network equipment returns a login permission instruction to the second user equipment;
and the second user equipment receives the login permission instruction and executes login operation on the target application based on the login permission instruction, wherein the target application logs in the second user equipment by using account identification information in the authorized login information.
17. A device for logging an application in a user device, wherein the device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of any of claims 1 to 15.
18. A computer-readable medium comprising instructions that, when executed by a computer, cause the computer to perform the operations of any of the methods of claims 1-15.
19. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method according to any one of claims 1 to 15 when executed by a processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110224570.9A CN113010858B (en) | 2021-03-01 | 2021-03-01 | Method and equipment for logging in application in user equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110224570.9A CN113010858B (en) | 2021-03-01 | 2021-03-01 | Method and equipment for logging in application in user equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113010858A CN113010858A (en) | 2021-06-22 |
CN113010858B true CN113010858B (en) | 2023-01-31 |
Family
ID=76386879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110224570.9A Active CN113010858B (en) | 2021-03-01 | 2021-03-01 | Method and equipment for logging in application in user equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113010858B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115174161B (en) * | 2022-06-15 | 2023-06-13 | 平安银行股份有限公司 | Account login method and device, electronic equipment and storage medium |
CN116599764B (en) * | 2023-06-28 | 2023-09-19 | 央广云听文化传媒有限公司 | Application login method, application login device, storage medium and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105099985A (en) * | 2014-04-21 | 2015-11-25 | 百度在线网络技术(北京)有限公司 | Login method and device of multiple applications |
CN106909827A (en) * | 2017-03-02 | 2017-06-30 | 北京小米移动软件有限公司 | Using account management method and device |
CN106921650A (en) * | 2016-12-21 | 2017-07-04 | 阿里巴巴集团控股有限公司 | The login method of striding equipment, system and device |
CN109587162A (en) * | 2018-12-26 | 2019-04-05 | 闻泰通讯股份有限公司 | Login validation method, device, terminal, cipher server and storage medium |
CN111597540A (en) * | 2020-04-28 | 2020-08-28 | 维沃移动通信有限公司 | Login method of application program, electronic device and readable storage medium |
CN111741033A (en) * | 2020-08-27 | 2020-10-02 | 腾讯科技(深圳)有限公司 | Method, device, equipment and medium for account number cross-equipment login management |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882868A (en) * | 2012-09-21 | 2013-01-16 | 北京十分科技有限公司 | Audio-based user login method and device |
CN104735021B (en) * | 2013-12-18 | 2018-12-11 | 腾讯科技(深圳)有限公司 | A kind of account number login method, device and system |
CN103873593B (en) * | 2014-04-02 | 2018-04-20 | 北京奇艺世纪科技有限公司 | A kind of Website logging method and system |
CN107483503A (en) * | 2017-09-28 | 2017-12-15 | 深圳市口袋网络科技有限公司 | A kind of application program login method, apparatus and system |
-
2021
- 2021-03-01 CN CN202110224570.9A patent/CN113010858B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105099985A (en) * | 2014-04-21 | 2015-11-25 | 百度在线网络技术(北京)有限公司 | Login method and device of multiple applications |
CN106921650A (en) * | 2016-12-21 | 2017-07-04 | 阿里巴巴集团控股有限公司 | The login method of striding equipment, system and device |
CN106909827A (en) * | 2017-03-02 | 2017-06-30 | 北京小米移动软件有限公司 | Using account management method and device |
CN109587162A (en) * | 2018-12-26 | 2019-04-05 | 闻泰通讯股份有限公司 | Login validation method, device, terminal, cipher server and storage medium |
CN111597540A (en) * | 2020-04-28 | 2020-08-28 | 维沃移动通信有限公司 | Login method of application program, electronic device and readable storage medium |
CN111741033A (en) * | 2020-08-27 | 2020-10-02 | 腾讯科技(深圳)有限公司 | Method, device, equipment and medium for account number cross-equipment login management |
Also Published As
Publication number | Publication date |
---|---|
CN113010858A (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108512846B (en) | Bidirectional authentication method and device between terminal and server | |
CN103685267B (en) | Data access method and device | |
US20210152545A1 (en) | Systems and methods for authenticating device through iot cloud using hardware security module | |
CN113010858B (en) | Method and equipment for logging in application in user equipment | |
CN107396364B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
CN108924833B (en) | Method and equipment for authorizing user equipment to connect wireless access point | |
CN110245518A (en) | A kind of date storage method, device and equipment | |
CN112307515B (en) | Database-based data processing method and device, electronic equipment and medium | |
CN115412269A (en) | Service processing method, device, server and storage medium | |
EP4109304A1 (en) | Authorization verification system, method and apparatus for application, and storage medium | |
CN116346341A (en) | Private key protection and server access method, system, equipment and storage medium | |
WO2019037603A1 (en) | Method and device for carrying out wireless connection pre-authorization for user equipment | |
CN112968899B (en) | Method and equipment for encrypted communication | |
KR20210060282A (en) | SYSTEMS AND METHODS FOR AUTHENTICATING IoT DEVICE THROUGH CLOUD USING HARDWARE SECURITY MODULE | |
CN113099025B (en) | Method and device for adding friends in social application | |
CN110290097B (en) | Data processing method and device, storage medium and electronic device | |
KR101836211B1 (en) | Electronic device authentication manager device | |
WO2019037602A1 (en) | Wireless connection pre-authorization method and device for user equipment | |
CN113378195A (en) | Method, apparatus, medium, and program product for encrypted communication | |
CN111105777B (en) | Voice data acquisition and playing method and device, key package updating method and device and storage medium | |
WO2023020428A1 (en) | Data verification method and apparatus, and storage medium | |
CN107404722B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
CN107241341B (en) | Access control method and device | |
CN114090996A (en) | Multi-party system mutual trust authentication method and device | |
CN111052707B (en) | Audio communication token |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |