CN113127826A - Verification method and related device - Google Patents

Verification method and related device Download PDF

Info

Publication number
CN113127826A
CN113127826A CN202110461812.6A CN202110461812A CN113127826A CN 113127826 A CN113127826 A CN 113127826A CN 202110461812 A CN202110461812 A CN 202110461812A CN 113127826 A CN113127826 A CN 113127826A
Authority
CN
China
Prior art keywords
application program
authorization verification
login authorization
login
target application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110461812.6A
Other languages
Chinese (zh)
Other versions
CN113127826B (en
Inventor
姚小川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Futuo Network Technology Shenzhen Co ltd
Original Assignee
Futuo Network Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Futuo Network Technology Shenzhen Co ltd filed Critical Futuo Network Technology Shenzhen Co ltd
Priority to CN202110461812.6A priority Critical patent/CN113127826B/en
Publication of CN113127826A publication Critical patent/CN113127826A/en
Application granted granted Critical
Publication of CN113127826B publication Critical patent/CN113127826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

The application provides a verification method and a related device, which are applied to a server, wherein the method comprises the following steps: receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing a target application program on electronic equipment to carry out authorization authentication; judging whether a message channel is established with the target application program or not; if so, sending the login authorization verification request to the target application program; receiving a login authorization verification result sent by the target application program; and sending the login authorization verification result to the vehicle-mounted application program, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification, so that the convenience in login authorization can be improved.

Description

Verification method and related device
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a verification method and a related apparatus.
Background
When the application program of the vehicle-mounted terminal is authenticated and interacted with the application program on the electronic equipment, the application needs to poll and detect whether the vehicle-mounted application initiates an authorization verification request or not at regular time, and the application cannot receive the authorization verification request in an inactive state, so that the convenience in authorization login is low.
Disclosure of Invention
The application provides a verification method and a related device, which can improve the convenience in login authorization.
The application in a first aspect provides a verification method, applied to a server, the method including:
receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing a target application program on electronic equipment to carry out authorization authentication;
judging whether a message channel is established with the target application program or not;
if so, sending the login authorization verification request to the target application program;
receiving a login authorization verification result sent by the target application program;
and sending the login authorization verification result to the vehicle-mounted application program, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
A second aspect of the embodiments of the present application provides a verification method, which is applied to an electronic device, and the method includes:
receiving a login authorization verification request sent by a server;
if the target application program is in an active state, determining a verification page according to the login authorization verification request;
displaying the verification page through the target application program;
receiving verification information through the verification page;
determining a login authorization verification result according to the verification information;
and sending the login authorization verification result to the server, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to carry out authorization verification.
A third aspect of the embodiments of the present application provides an authentication apparatus applied to a server, the apparatus including a receiving unit, a determining unit, and a transmitting unit, wherein,
the receiving unit is used for receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing an object application program on the electronic equipment to carry out authorization authentication;
the judging unit is used for judging whether a message channel is established with the target application program or not;
the sending unit is used for sending the login authorization verification request to the target application program if the login authorization verification request is received;
the receiving unit is used for receiving a login authorization verification result sent by the target application program;
the sending unit is used for sending the login authorization verification result to the vehicle-mounted application program, and the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
A fourth aspect of embodiments of the present application provides an authentication apparatus applied to an electronic device, the apparatus including a receiving unit, a determining unit, a transmitting unit, and a presenting unit, wherein,
the receiving unit is used for receiving a login authorization verification request sent by the server;
the determining unit is used for determining a verification page according to the login authorization verification request if the target application program is in an active state;
the display unit is used for displaying the verification page through the target application program;
the receiving unit is used for receiving verification information through the verification page;
the determining unit is used for determining a login authorization verification result according to the verification information;
and the sending unit is used for sending the login authorization verification result to the server, and the login authorization verification result is used for indicating the vehicle-mounted application program to carry out authorization verification.
A fifth aspect of the embodiments of the present application provides a terminal, including a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is used to store a computer program, and the computer program includes program instructions, and the processor is configured to call the program instructions to execute the step instructions in the second aspect of the embodiments of the present application.
A sixth aspect of embodiments of the present application provides a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform some or all of the steps as described in the first or second aspect of embodiments of the present application.
A seventh aspect of embodiments of the present application provides a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps as described in the first or second aspect of embodiments of the present application. The computer program product may be a software installation package.
The embodiment of the application has at least the following beneficial effects:
the method comprises the steps that a login authorization verification request sent by a vehicle-mounted application program is received through a server, the login authorization verification request is used for processing a target application program on electronic equipment to carry out authorization authentication, the server judges whether a message channel is established with the target application program, if yes, the server sends the login authorization verification request to the target application program, the electronic equipment displays a verification page through the target application program, the electronic equipment receives verification information through the verification page, the electronic equipment determines a login authorization verification result according to the verification information, the server receives the login authorization verification result sent by the target application program and sends the login authorization verification result to the vehicle-mounted application program, and the login authorization verification result is used for indicating the vehicle-mounted application program to carry out login authorization verification, and compared with a complex authorization mode in the existing scheme, for example, a code scanning authorization mode and the like can be realized, the verification information can be received through the verification page displayed by the electronic equipment, the login authorization verification result is determined according to the verification information, the vehicle-mounted application program is indicated to perform login authorization verification through the login authorization verification result, and the convenience of login authorization verification is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is an interaction diagram of a verification method provided in an embodiment of the present application;
fig. 2 is a schematic structural diagram of a server according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is an interaction diagram of a verification method according to an embodiment of the present disclosure. As shown in fig. 1, the interaction method involves the following devices: the method comprises the following steps that:
s101, the vehicle-mounted application program on the vehicle-mounted terminal sends a login authorization verification request to the server.
The in-vehicle application on the in-vehicle terminal may be any application that requires login authorization verification on the electronic device, and may be, for example, a stock application, a life application, a chat application, and the like.
The vehicle-mounted application program can send a login authorization verification request to the server through the transmitting and receiving device of the vehicle-mounted terminal.
The login authorization verification request carries a routing table and the like, and is sent to the server according to a fixed routing rule. The login authorization verification request carries an identifier of the target application program and the like, and carries information for requesting the target application program to perform login authorization verification.
S102, after receiving the login authorization verification request, the server judges whether a message channel is established between the server and a target application program in the electronic equipment.
The server can be a cloud server, a server cluster and the like.
The message channel is a communication channel established between the server and the target application program, and the message channel can be a TCP long connection channel.
If the message channel exists, it may be determined that the target application program is in an active state, where the active state may be understood that the target application program may receive the sent message, perform other operations corresponding to the message channel using the target application program, and the like. The active state is opposite to the inactive state, and the inactive state may be understood as that the electronic device closes the target application program or keeps the target application program in a background suspended state only for saving energy.
And S103, if so, the server sends a login authorization verification request to the electronic equipment.
The server forwards the login authorization verification request to the electronic device.
S104, the target application program in the electronic equipment determines a verification page according to the login authorization verification request.
According to the login authorization authentication request, the method for determining the authentication page can be as follows: and generating a template according to a preset verification page, and determining the verification page. The verification page generation template is a preset template, and specific setting rules can be set through empirical data and the like.
The verification page is used for prompting the user to perform authorized login verification, and the verification page includes verification prompt information, such as "whether login is allowed", "whether authorization is allowed", and the like.
And S105, displaying the verification page by the target application program.
And when the target application program displays the verification page, the verification page is displayed after the window currently displayed on the electronic equipment is closed. After the currently displayed window is closed, the verification page is displayed, the situation that the windows are stacked can be avoided, and the convenience of operation is improved.
S106, the electronic equipment receives the verification information, and the electronic equipment determines a login authorization verification result according to the verification information.
The method for receiving the verification message by the electronic device may be receiving by a manual input of the user, or receiving the verification message by performing voice recognition on the target user and according to a voice mode.
The method for determining the login authorization verification result according to the verification information may be: and acquiring a keyword in the verification information, and determining a login authorization verification result according to the keyword. The keywords may be, for example, "allow", "is", "may", etc., including but not limited to words of positive replies, or "disallow", "cannot", "not", etc., including but not limited to words of negative replies. The login authorization verification result includes authorization indication information, and the authorization indication information can be determined according to the keyword, and specifically can indicate whether to authorize according to the keyword. If the keyword is a word returned positively, authorization is indicated, and if the keyword is a word returned negatively, authorization is not indicated. Of course, the authorization indication information may also indicate whether to authorize or not by other means, for example, "0" indicates authorization, "1" indicates not authorization, etc. Where "0" corresponds to a word whose keyword is a positive response, and "1" corresponds to a word whose keyword is a negative response.
S107, the electronic equipment sends a login authorization verification result to the server.
And S108, after receiving the login authorization verification result, the server sends the login authorization verification result to the vehicle-mounted terminal.
And S109, the vehicle-mounted terminal carries out authorization verification according to the login authorization verification result.
The vehicle-mounted terminal analyzes the login authorization verification result to obtain authorization indication information for authorization verification, and the authorization verification specifically includes: if the keyword is a keyword which is answered affirmatively, the login is carried out, and if the keyword is a keyword which is answered negatively, the login is cancelled.
In the example, a login authorization verification request sent by a vehicle-mounted application program is received through a server, the login authorization verification request is used for processing authorization authentication of a target application program on electronic equipment, the server judges whether a message channel is established with the target application program, if yes, the server sends the login authorization verification request to the target application program, the electronic equipment displays a verification page through the target application program, the electronic equipment receives verification information through the verification page, the electronic equipment determines a login authorization verification result according to the verification information, the server receives the login authorization verification result sent by the target application program and sends the login authorization verification result to the vehicle-mounted application program, and the login authorization verification result is used for indicating the vehicle-mounted application program to perform login authorization verification, compared with a complex authorization mode in the existing scheme, for example, a code scanning authorization mode and the like can be realized, the verification information can be received through the verification page displayed by the electronic equipment, the login authorization verification result is determined according to the verification information, the vehicle-mounted application program is indicated to perform login authorization verification through the login authorization verification result, and the convenience of login authorization verification is improved.
In a possible implementation manner, the server sends a message to the electronic device or the target application program when determining that the message channel is not established with the target application program, where the message is used to notify the target application program of establishing the message channel. Specifically, when the target application is in an active state, a message channel is established with the server. Sending a message to the electronic device may be understood as sending a short message to the electronic device, and the target application may be system information, etc.
In a possible implementation manner, when the server sends the login authorization verification message, the target application program is in an active state, and after the electronic device receives the login authorization verification message, and when the target application program is in an inactive state, the electronic device may execute the following method:
and if the target application program is in an inactive state, storing the login authorization verification request.
After the login authorization verification request is stored, when the target application program is in an active state, the login authorization verification request is pushed to the target application program, and when the login authorization verification request is pushed, the login authorization verification request with the shortest storage time is pushed.
In a possible implementation manner, the method may further include establishing a message channel, specifically as follows:
and if the target application program is in an active state, establishing a message channel between the target application program and the server, wherein the message channel is used for transmitting the login authorization verification request or feeding back the login authorization verification result.
In a possible implementation manner, the electronic device may further perform exception handling, specifically including:
a1, acquiring the page state of the target application program;
a2, if the page state is an abnormal page state, acquiring abnormal information;
a3, determining the type of the abnormality according to the abnormality information;
and A4, performing exception handling according to the exception type.
The page state includes a normal page state and an abnormal page state, and the normal page state can be understood as a page state when the target application program operates normally.
The abnormal information may be understood as a cause of the abnormal page state, for example, if the abnormal page state is a no-network state, the abnormal information may be a cause of network disconnection, specifically, for example, the mobile network is not turned on, the electronic device is in a flight state, the electronic device does not search for a mobile network signal, and the like.
The abnormal information corresponds to the abnormal type, for example, if the abnormal information is a cause of network disconnection, the abnormal type is a network abnormality.
The method for processing the exception according to the exception type can be as follows: and acquiring an exception handling method corresponding to the exception type, and carrying out exception handling according to the method. The method corresponding to the abnormality type may be preset.
In this example, when the page state is the abnormal page state, the exception handling is performed, so that the reliability is improved.
In a possible implementation manner, when the exception type is a network exception, the method for performing exception handling according to the exception type includes:
b1, acquiring the network quality of the N reference networks, wherein the reference networks are networks within a preset range of the electronic equipment, and N is a positive integer greater than or equal to 2;
b2, determining a first network to be accessed and a second network to be accessed from the N reference networks according to the network quality, wherein the network quality of the first network to be accessed is higher than that of the second network to be accessed;
b3, acquiring a first distance between the electronic equipment and the access equipment of the first network to be accessed, and acquiring a second distance between the electronic equipment and the access equipment of the second network to be accessed;
b4, determining a first access probability of the first network to be accessed and a second access probability of the second generation access network according to the first distance and the second distance;
b5, acquiring a first network type of the first network to be accessed, and acquiring a second network type of the second network to be accessed;
b6, acquiring the network access tendency of a target user, wherein the target user is a user operating the target application program;
b7, determining a third access probability of the first network to be accessed and a fourth access probability of the second network to be accessed according to the first network type, the second network type and the network access tendency;
b8, determining a first target access probability of the first network to be accessed according to the first access probability and the third access probability, and determining a second target access probability of the first network to be accessed according to the second access probability and the fourth access probability;
b9, determining a target network to be accessed from the first network to be accessed and the second network to be accessed according to the first target access probability and the second target access probability;
b10, accessing the electronic equipment to the target network to be accessed.
The reference network may be understood as a network within a preset range of the electronic device: the distance between the access device of the reference network and the electronic device is smaller than a preset distance, and the preset distance is set through experience values or historical data. The reference network is a network that the electronic device can access, such as a WIFI network, a mobile network, and the like.
The network quality can be understood as energy of a probe frame and the like sent by a reference network received by the electronic device, and the higher the energy value is, the better the network quality is, and the lower the energy value is, the worse the network quality is.
The method for determining the first network to be accessed and the second network to be accessed from the N reference networks may be to rank the N reference networks from high to low according to network quality, determine a network with the highest network quality as the first network to be accessed, and determine a network ranked to a third position as the second network to be accessed. The network ranked as the third location is determined as the second network to be accessed, so that the situation that the network ranked as the first location network and the network ranked as the second location network are very close in quality and selection cannot be performed (in this situation, a random selection mode is usually adopted, and random selection has uncertainty) can be avoided, and the accuracy of network selection to be accessed is improved.
The first distance is short, the first access probability is high, and the longer the first distance is, the lower the first access probability is. The method for determining the second access probability by the second distance refers to the method for determining the first access probability by the first distance.
The network access tendency of the target user may be understood as the network type that the target user prefers to access the network. Specifically, the determination may be performed by the number of times that the target user accesses the network type, and the higher the number of times, the more the network type is preferred.
And determining the similarity between the network type which the target user tends to access and the first network type, and determining the third access probability according to the similarity. The method of determining the fourth probability is the same as the method of determining the third probability. The higher the similarity is, the larger the third access probability is, and the lower the similarity is, the smaller the third access probability is. The similarity between network types can be understood as: and if the network type which the target user tends to access is a WIFI network of a first merchant, and the first network type is a WIFI network of a second merchant, determining the similarity between the network types according to the similarity between the commodities of the first merchant and the commodities of the second merchant. For example, if the commodities of the first merchant and the second merchant are both clothes, the similarity is high, the first merchant is clothes, and the second merchant is a restaurant, the similarity is low.
The mean of the first and third access probabilities may be determined as a first target access probability. A minimum value between the second access probability and the fourth access probability may be determined as a second target access probability.
And determining the network corresponding to the maximum value of the first target access probability and the second target access probability as a target network to be accessed.
In this example, when the network is abnormal, the target network to be accessed is determined according to the distance between the first network to be accessed and the second network to be accessed and the network type, so that the accuracy of determining the target network to be accessed is improved.
In a possible implementation manner, the voice control message may also be received to play the corresponding information, which is as follows:
c1, if the authorization verification is successful, receiving a voice control message;
c2, determining the information audio to be played according to the voice control message;
c3, playing the audio of the information to be played.
If the authorization verification of the vehicle-mounted application program is successful, the message intercommunication between the vehicle-mounted application program and the terminal equipment can be realized, and the terminal equipment can receive the voice control message sent by the user. The voice control message may be received through a microphone, and the voice control message carries information of the information audio to be played, where the information may be, for example, a name of the information audio to be played, a price identifier (e.g., price, etc.) included in the information audio to be played, and switching information, and specifically, the information may include, for example, "listen + security name + price", "security name", and the like. The switching information may be, for example, a switching action, such as switching to a previous piece of information and switching to a next piece of information.
The corresponding information audio to be played can be determined according to the name carried in the voice control message. Or determining the information audio to be played according to the information play list and the switching information. For example, if the switching message is to switch to the next message, the next message audio of the currently played message audio can be determined according to the message playlist and the currently played message audio.
If the currently played information audio is not the last information audio in the information play list, it is determined that the information audio to be played is empty, and a prompt message is presented, where the prompt message may be "no more information" or "no more information". If no information play list exists currently, the information audio to be played is determined to be empty, and the processing mode of the information audio to be played is the same as the processing mode of the last information audio of the information audio not-played list currently played.
Certainly, the voice control message may also carry a trigger time of the information audio to be played, and the information audio to be played may be determined according to the trigger time. The trigger occasions may be, for example: broadcast the headline information, broadcast the headline, broadcast the flash information, etc.
The method for determining the information audio to be played according to the trigger timing can be: according to the specific trigger time, the corresponding information audio to be played is determined, for example, if the information to be played is played, the information to be played can be determined as the information audio to be played.
The voice control message may also carry a play instruction, and the play instruction includes: play, pause, close, etc. The audio can be controlled to play according to the playing instruction.
In a possible implementation manner, the player type may be further indicated to play the information according to the corresponding player type, and the method specifically includes:
d1, if the authorization verification is successful, receiving playing indication information;
d2, determining the type of the player according to the playing indication information;
d3, playing information according to the player type.
The indication button may receive the playing indication information, for example, the player indication button may receive the playing indication information, and the button may specifically include: a close button of the small window player, a stow button of the small window player, a return button of the small window player, which may be understood as switching the small window player to a large window player. The indication may be user triggered.
The playing indication information may carry a player type, where the player type includes a small window player and a large window player, the small window player may be understood as a player whose playing window is smaller than a preset area, or may be smaller than a preset proportion of the display screen, and the large window player may be understood as a player whose playing window is larger than the preset area, or may be larger than the preset proportion of the display screen, for example, a full screen player, and the like. The preset ratio is set by empirical values or historical data.
In this example, the player type of the information can be determined through the received playing instruction information, so that the user can adjust the player type by sending the playing instruction information, and convenience in playing the information is improved.
In a possible implementation manner, if an application program corresponding to the vehicle-mounted application program does not exist on the terminal device, before receiving the login authorization verification request sent by the vehicle-mounted application program, the method may obtain the vehicle-mounted application program, and specifically includes:
e1, displaying the target downloading information on the vehicle-mounted terminal where the vehicle-mounted application program is located;
e2, the terminal equipment acquires the installation package of the target vehicle-mounted application program according to the target download message;
e3, installing the vehicle-mounted application program according to the installation package.
The target download information may be a two-dimensional code including a download address of the in-vehicle application. For example, the two-dimensional code may be presented on a display of the in-vehicle terminal.
The terminal equipment can scan the codes through the camera to obtain the download addresses stored in the two-dimensional codes, download the installation package according to the download addresses, and install the vehicle-mounted application program after the download is completed.
In this example, the terminal device acquires the vehicle-mounted application program by displaying the target download information, so that convenience in acquiring the vehicle-mounted application program is improved.
In a possible implementation manner, there may be a case where the vehicle-mounted application sends the login authorization verification request multiple times, where the multiple sending of the login authorization verification request may be sent by the same device or sent by multiple different devices, and specifically, the multiple sending of the login authorization verification request may be processed in the following manner:
the electronic equipment receives a plurality of login authorization verification requests sent by the server, judges whether the target application program is in an active state or not after receiving the login authorization verification requests, if the target application program is in an inactive state, the electronic equipment pushes notification messages in a notification bar, the number of the notification messages is the same as that of the authorized login verification requests, and for example, after receiving one login authorization verification request, one notification message is pushed. The notification bar can have a plurality of notification messages at the same time, after a user clicks any one of the notification messages, the verification pages displayed after the target application program is opened are all the verification pages corresponding to the latest login authorization verification request, and the latest login authorization verification request can be understood as the last received login authorization verification request in the plurality of login authorization verification requests.
If the target application program is in an active state, the verification page adopts a repeated refreshing method to ensure that the currently displayed verification page is the verification page corresponding to the latest login authorization verification request.
In one possible implementation manner, the user may also log in the in-vehicle application, for example, if the user does not log in, an operation button for authorizing login is displayed on the in-vehicle application, so that the user may log in by clicking the operation button. When the user logs in, if the user is not registered in the vehicle-mounted application program, the user can log in through a mobile phone number and the like, specifically, the vehicle-mounted application program can acquire the mobile phone number associated with the user, or the user inputs the mobile phone number to log in, and the operation of registering in the vehicle-mounted application program is not required to be triggered, so that the operation of logging in the vehicle-mounted application program can be completed. The mobile phone number used by the user may be the same as or different from the mobile phone number used by the user to log in the target application program. Of course, the user may also log in through other identifiers, which are the same as the identifiers used by the user in logging in the target application program, and are not limited in this respect.
After the user logs in, a login authorization verification request is sent to the server, the server sends the login authorization verification request to the target application program, the target application program displays a verification page and the like corresponding to the authorization login verification request, and specific operations of the server, the vehicle-mounted application program and the electronic device can be the same as the method for processing the login authorization verification request in the previous embodiment.
In a specific example, a user triggers a login button in a vehicle-mounted application program, the vehicle-mounted application program judges whether the user has logged in, if so, the login button is triggered to obtain a mobile phone number of the user, and a login authentication window is displayed, the login authentication window is used for triggering whether to send a login authorization authentication request, a confirmation button and a cancel button are displayed on the login authentication window, if the user triggers the confirmation button, the login authorization authentication request is sent, and if the user triggers the cancel button, the login authorization authentication request is not sent. If the login authorization verification request is triggered to be sent, the login authorization verification request is sent to the server, the server sends the login authorization verification request to the target application program, the target application program displays a verification page and the like corresponding to the authorized login verification request, and specific operations of the server, the vehicle-mounted application program and the electronic device can be the same as the method for processing the login authorization verification request in the previous embodiment.
If not, whether the user uses the electronic equipment to perform code scanning to perform login is judged (for example, a vehicle-mounted application program displays a login two-dimensional code, and the user uses the electronic equipment to scan the code to perform login), if so, a login button is triggered to obtain the mobile phone number of the user, and a login verification window is displayed, wherein the login verification window is used for triggering whether to send a login authorization verification request, a confirmation button and a cancel button are displayed on the login verification window, if the user triggers the confirmation button, the login authorization verification request is sent, and if the user triggers the cancel button, the login authorization verification request is not sent. If the login authorization verification request is triggered to be sent, the login authorization verification request is sent to the server, the server sends the login authorization verification request to the target application program, the target application program displays a verification page and the like corresponding to the authorized login verification request, and specific operations of the server, the vehicle-mounted application program and the electronic device can be the same as the method for processing the login authorization verification request in the previous embodiment.
In accordance with the foregoing embodiments, please refer to fig. 2, fig. 2 is a schematic structural diagram of a server according to an embodiment of the present application, and as shown in the drawing, the server includes a processor and a memory, and the processor and the memory are connected to each other, where the memory is used for storing a computer program, the computer program includes program instructions, the processor is configured to call the program instructions, and the program includes instructions for executing the following steps;
receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing a target application program on electronic equipment to carry out authorization authentication;
judging whether a message channel is established with the target application program or not;
if so, sending the login authorization verification request to the target application program;
receiving a login authorization verification result sent by the target application program;
and sending the login authorization verification result to the vehicle-mounted application program, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
In accordance with the foregoing embodiments, please refer to fig. 3, fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application, and as shown in the drawing, the electronic device includes a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is used to store a computer program, the computer program includes program instructions, the processor is configured to call the program instructions, and the program includes instructions for performing the following steps;
receiving a login authorization verification request sent by a server;
if the target application program is in an active state, determining a verification page according to the login authorization verification request;
displaying the verification page through the target application program;
receiving verification information through the verification page;
determining a login authorization verification result according to the verification information;
and sending the login authorization verification result to the server, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to carry out authorization verification.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the terminal includes corresponding hardware structures and/or software modules for performing the respective functions in order to implement the above-described functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the terminal may be divided into the functional units according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
In accordance with the above, please refer to fig. 4, fig. 4 is a schematic structural diagram of a verification apparatus according to an embodiment of the present application. As shown in fig. 4, the apparatus is applied to a server, and includes a receiving unit 401, a judging unit 402, and a transmitting unit 403, wherein,
the receiving unit 401 is configured to receive a login authorization verification request sent by a vehicle-mounted application, where the login authorization verification request is used to process an authorization authentication of a target application on an electronic device;
a judging unit 402, configured to judge whether a message channel is established with the target application;
the sending unit 403, configured to send the login authorization verification request to the target application program if the login authorization verification request is received;
the receiving unit 401 is configured to receive a login authorization verification result sent by the target application program;
the sending unit is configured to send the login authorization verification result to the vehicle-mounted application program, where the login authorization verification result is used to instruct the vehicle-mounted application program to perform authorization verification.
In one possible implementation, the apparatus is further configured to:
and if the message channel is not established with the target application program, sending a message to the electronic equipment or the target application program, wherein the message is used for informing the target application program of establishing the message channel.
In accordance with the above, please refer to fig. 5, fig. 5 is a schematic structural diagram of a verification apparatus according to an embodiment of the present application. As shown in fig. 5, the apparatus is applied to an electronic device, and the apparatus includes a receiving unit 501, a determining unit 502, a sending unit 503, and a presenting unit 504, wherein,
the receiving unit 501 is configured to receive a login authorization verification request sent by a server;
the determining unit 502 is configured to determine, if the target application program is in an active state, a verification page according to the login authorization verification request;
the presentation unit 504 is configured to present the verification page through the target application;
the receiving unit 501 is configured to receive verification information through the verification page;
the determining unit 502 is configured to determine a login authorization verification result according to the verification information;
the sending unit 503 is configured to send the login authorization verification result to the server, where the login authorization verification result is used to instruct the vehicle-mounted application program to perform authorization verification.
In one possible implementation, the apparatus is further configured to:
and if the target application program is in an inactive state, storing the login authorization verification request.
In one possible implementation, the apparatus is further configured to:
and if the target application program is in an active state, establishing a message channel between the target application program and the server, wherein the message channel is used for transmitting the login authorization verification request or feeding back the login authorization verification result.
In one possible implementation, the apparatus is further configured to:
acquiring the page state of the target application program;
if the page state is an abnormal page state, acquiring abnormal information;
determining an abnormal type according to the abnormal information;
and performing exception handling according to the exception type.
In a possible implementation manner, the exception type includes a network exception, and in the aspect of performing exception handling according to the exception type, the apparatus is further configured to:
acquiring the network quality of the N reference networks, wherein the reference networks are networks within a preset range of the electronic equipment, and N is a positive integer greater than or equal to 2;
determining a first network to be accessed and a second network to be accessed from the N reference networks according to the network quality, wherein the network quality of the first network to be accessed is higher than that of the second network to be accessed;
acquiring a first distance between the electronic equipment and access equipment of the first network to be accessed, and acquiring a second distance between the electronic equipment and access equipment of the second network to be accessed;
determining a first access probability of the first to-be-accessed network and a second access probability of the second generation access network according to the first distance and the second distance;
acquiring a first network type of the first network to be accessed and acquiring a second network type of the second network to be accessed;
acquiring a network access tendency of a target user, wherein the target user is a user operating the target application program;
determining a third access probability of the first network to be accessed and a fourth access probability of the second network to be accessed according to the first network type, the second network type and the network access tendency;
determining a first target access probability of the first network to be accessed according to the first access probability and the third access probability, and determining a second target access probability of the first network to be accessed according to the second access probability and the fourth access probability;
determining a target network to be accessed from the first network to be accessed and the second network to be accessed according to the first target access probability and the second target access probability;
and accessing the electronic equipment to the target network to be accessed.
Embodiments of the present application also provide a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the authentication methods as described in the above method embodiments.
Embodiments of the present application also provide a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and the computer program causes a computer to execute part or all of the steps of any one of the authentication methods as described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may be implemented in the form of a software program module.
The integrated units, if implemented in the form of software program modules and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: various media capable of storing program codes, such as a usb disk, a read-only memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and the like.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash memory disks, read-only memory, random access memory, magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (11)

1. An authentication method applied to a server, the method comprising:
receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing a target application program on electronic equipment to carry out authorization authentication;
judging whether a message channel is established with the target application program or not;
if so, sending the login authorization verification request to the target application program;
receiving a login authorization verification result sent by the target application program;
and sending the login authorization verification result to the vehicle-mounted application program, wherein the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
2. The method of claim 1, further comprising:
and if the message channel is not established with the target application program, sending a message to the electronic equipment or the target application program, wherein the message is used for informing the target application program of establishing the message channel.
3. An authentication method applied to an electronic device, the method comprising:
receiving a login authorization verification request sent by a server;
if the target application program is in an active state, determining a verification page according to the login verification request;
displaying the verification page through the target application program;
receiving verification information through the verification page;
determining a login authorization verification result according to the verification information;
and sending the login authorization verification result to the server, wherein the login authorization verification result is used for the server to indicate the vehicle-mounted application program to carry out authorization verification.
4. The method of claim 3, further comprising:
and if the target application program is in an inactive state, storing the login authorization verification request.
5. The method according to claim 3 or 4, characterized in that the method further comprises:
and if the target application program is in an active state, establishing a message channel between the target application program and the server, wherein the message channel is used for transmitting the login authorization verification request or feeding back the login authorization verification result.
6. The method of claim 5, further comprising:
acquiring the page state of the target application program;
if the page state is an abnormal page state, acquiring abnormal information;
determining an abnormal type according to the abnormal information;
and performing exception handling according to the exception type.
7. The method according to any one of claims 3-6, further comprising:
if the authorization verification is successful, receiving a voice control message;
determining the information audio to be played according to the voice control message;
and playing the audio of the information to be played.
8. The method according to any one of claims 3-6, further comprising:
if the authorization verification is successful, receiving playing indication information;
determining the type of a player according to the playing indication information;
and playing the information according to the player type.
9. An authentication apparatus, applied to a server, comprising a receiving unit, a judging unit, and a transmitting unit, wherein,
the receiving unit is used for receiving a login authorization verification request sent by a vehicle-mounted application program, wherein the login authorization verification request is used for processing an object application program on the electronic equipment to carry out authorization authentication;
the judging unit is used for judging whether a message channel is established with the target application program;
the sending unit is used for sending the login authorization verification request to the target application program if the login authorization verification request is received;
the receiving unit is used for receiving a login authorization verification result sent by the target application program;
the sending unit is used for sending the login authorization verification result to the vehicle-mounted application program, and the login authorization verification result is used for indicating the vehicle-mounted application program to perform authorization verification.
10. An authentication apparatus, applied to an electronic device, comprising a receiving unit, a determining unit, a transmitting unit, and a presenting unit, wherein,
the receiving unit is used for receiving a login authorization verification request sent by the server;
the determining unit is used for determining a verification page according to the login authorization verification request if the target application program is in an active state;
the display unit is used for displaying the verification page through the target application program;
the receiving unit is used for receiving verification information through the verification page;
the determining unit is used for determining a login authorization verification result according to the verification information;
and the sending unit is used for sending the login authorization verification result to the server, and the login authorization verification result is used for indicating the vehicle-mounted application program to carry out authorization verification.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to carry out the method according to any one of claims 1-8.
CN202110461812.6A 2021-04-27 2021-04-27 Verification method and related device Active CN113127826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110461812.6A CN113127826B (en) 2021-04-27 2021-04-27 Verification method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110461812.6A CN113127826B (en) 2021-04-27 2021-04-27 Verification method and related device

Publications (2)

Publication Number Publication Date
CN113127826A true CN113127826A (en) 2021-07-16
CN113127826B CN113127826B (en) 2023-05-23

Family

ID=76780206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110461812.6A Active CN113127826B (en) 2021-04-27 2021-04-27 Verification method and related device

Country Status (1)

Country Link
CN (1) CN113127826B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399713A (en) * 2008-09-28 2009-04-01 腾讯科技(深圳)有限公司 Method for measuring proximity of network node
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN107659573A (en) * 2017-10-09 2018-02-02 深圳市沃特沃德股份有限公司 Control method and device of vehicle-mounted system
CN108320744A (en) * 2018-02-07 2018-07-24 广东欧珀移动通信有限公司 Method of speech processing and device, electronic equipment, computer readable storage medium
CN110018920A (en) * 2018-12-25 2019-07-16 阿里巴巴集团控股有限公司 A kind of detection method, device and the equipment of page presentation exception
CN110753067A (en) * 2014-07-01 2020-02-04 谷歌有限责任公司 Wireless local area network access
CN110830263A (en) * 2019-11-06 2020-02-21 南京酷沃智行科技有限公司 Automatic login method and device for vehicle-mounted system
CN110958234A (en) * 2019-11-22 2020-04-03 腾讯科技(深圳)有限公司 Application login control method and device and storage medium
CN111163533A (en) * 2019-12-31 2020-05-15 Oppo广东移动通信有限公司 Network connection method and related product
CN112653769A (en) * 2021-01-08 2021-04-13 青岛海尔科技有限公司 Message pushing method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399713A (en) * 2008-09-28 2009-04-01 腾讯科技(深圳)有限公司 Method for measuring proximity of network node
CN110753067A (en) * 2014-07-01 2020-02-04 谷歌有限责任公司 Wireless local area network access
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN107659573A (en) * 2017-10-09 2018-02-02 深圳市沃特沃德股份有限公司 Control method and device of vehicle-mounted system
CN108320744A (en) * 2018-02-07 2018-07-24 广东欧珀移动通信有限公司 Method of speech processing and device, electronic equipment, computer readable storage medium
CN110018920A (en) * 2018-12-25 2019-07-16 阿里巴巴集团控股有限公司 A kind of detection method, device and the equipment of page presentation exception
CN110830263A (en) * 2019-11-06 2020-02-21 南京酷沃智行科技有限公司 Automatic login method and device for vehicle-mounted system
CN110958234A (en) * 2019-11-22 2020-04-03 腾讯科技(深圳)有限公司 Application login control method and device and storage medium
CN111163533A (en) * 2019-12-31 2020-05-15 Oppo广东移动通信有限公司 Network connection method and related product
CN112653769A (en) * 2021-01-08 2021-04-13 青岛海尔科技有限公司 Message pushing method and system

Also Published As

Publication number Publication date
CN113127826B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
US11671826B2 (en) Voice control and telecommunications service integration
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
US11070505B2 (en) Group chat initiating method on basis of shared document, device and apparatus therefor, and storage medium
JP2022502692A (en) Speech processing methods, devices, devices, programs and computer storage media
US10993090B2 (en) Network access method, apparatus, and system
CN109644154B (en) Location-based access control for human dialog entities
US10812489B2 (en) Method and system for classifying network requests
CN107248995B (en) Account verification method and device
CN112738046B (en) One-key login method, terminal and system server
CN111093159A (en) Message pushing method and device, server and computer readable storage medium
CN111092904B (en) Network connection method and device
CN113127826A (en) Verification method and related device
EP4310407A1 (en) Control right switching method and apparatus for virtual remote control, device, and storage medium
KR102315391B1 (en) Server, service providing system and processing method of server
CN113099453A (en) Authentication method, device and equipment for access server and readable storage medium
CN111193655B (en) Information processing method, information processing apparatus, server, and storage medium
CN114630323A (en) Voice call service processing method and device and computer readable storage medium
CN112040057B (en) Device control method, device, electronic device, control system and storage medium
US20220050687A1 (en) Method of booting electronic device and electronic device control system, methods of operating and controlling electronic device, electronic device, control terminal, and electronic device control system
CN104580070A (en) Method, device and system for confirming network conversations
CN113438489B (en) Push method and push system of cloud video
CN111918224B (en) Short message verification method, device, equipment and storage medium
CN111770051B (en) Cloud game sharing method, device, equipment and medium
CN111885677B (en) Content pushing method and device, electronic equipment and storage medium
WO2024060908A1 (en) Information sharing method and apparatus, device, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant