CN113595871A - Account login method and device, computer equipment and storage medium - Google Patents

Account login method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113595871A
CN113595871A CN202110742199.5A CN202110742199A CN113595871A CN 113595871 A CN113595871 A CN 113595871A CN 202110742199 A CN202110742199 A CN 202110742199A CN 113595871 A CN113595871 A CN 113595871A
Authority
CN
China
Prior art keywords
terminal
login
account
contact
target account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110742199.5A
Other languages
Chinese (zh)
Other versions
CN113595871B (en
Inventor
王海婴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fibocom Wireless Inc
Original Assignee
Fibocom Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fibocom Wireless Inc filed Critical Fibocom Wireless Inc
Priority to CN202110742199.5A priority Critical patent/CN113595871B/en
Publication of CN113595871A publication Critical patent/CN113595871A/en
Application granted granted Critical
Publication of CN113595871B publication Critical patent/CN113595871B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to an account login method, an account login device, computer equipment and a storage medium. The method is applied to a first terminal logged with a target account, and comprises the following steps: receiving a login request of a second terminal, wherein a login account carried in the login request is the same as a target account; displaying a candidate shared contact tag corresponding to the target account; responding to the selection operation of the candidate shared contact person label, and determining a visible contact person of the second terminal login target account; and feeding back the login permission information to the second terminal, wherein the login permission information carries a contact person identifier corresponding to the visible contact person, and the login permission information is used for enabling the second terminal to log in the target account and displaying the information corresponding to the contact person identifier. By adopting the method, only the information corresponding to the contact person identification can be displayed after the second terminal logs in, the privacy of the account can be effectively protected, and the privacy disclosure is avoided. The application also provides an account login method and device, computer equipment and a storage medium applied to the second terminal.

Description

Account login method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to an account login method, an account login device, a computer device, and a storage medium.
Background
With the development of communication technology, instant messaging technology appears, and the development of instant messaging in the network information era is more and more rapid, for example, instant messaging software such as WeChat, QQ and nailing makes the communication mode more convenient and faster.
The current instant messaging has the condition that multiple terminals log in the same account number at the same time, and the information content of the multiple terminals can be presented at different terminals after the multiple terminals log in the same account number at the same time.
Disclosure of Invention
In view of the above, it is necessary to provide an account login method, an account login apparatus, a computer device, and a storage medium capable of protecting privacy.
An account login method, the method comprising:
receiving a login request of a second terminal, wherein a login account carried in the login request is the same as a target account;
displaying a candidate shared contact tag corresponding to the target account;
responding to the selection operation of the candidate shared contact person label, and determining a visible contact person of the second terminal login target account;
and feeding back the login permission information to the second terminal, wherein the login permission information carries a contact person identifier corresponding to the visible contact person, and the login permission information is used for enabling the second terminal to log in the target account and displaying the information corresponding to the contact person identifier.
In one embodiment, the displaying the candidate shared contact tag corresponding to the target account includes:
when the second terminal is judged to be an authorized terminal based on the authorized terminal identification associated with the target account, displaying a candidate shared contact tag corresponding to the target account;
when the second terminal is judged to be an unauthorized terminal based on the authorized terminal identification associated with the target account, displaying terminal information corresponding to the second terminal and a login confirmation entry;
and responding to the login confirmation operation aiming at the login confirmation entry, and displaying a candidate shared contact tag corresponding to the target account.
In one embodiment, the account login method further includes:
displaying selection labels, wherein the selection labels comprise labels corresponding to the sharing contact person confirmation and the sharing contact person cancellation respectively;
when a selection tag corresponding to the contact person for canceling the sharing is triggered, determining that the visible contact person of the second terminal for logging in the target account is empty;
displaying a candidate shared contact tag corresponding to the target account comprises:
and when the selection tag corresponding to the sharing contact is triggered, displaying a candidate sharing contact tag corresponding to the target account.
In one embodiment, the account login method further includes:
when the selection label corresponding to the sharing contact is triggered, displaying a full selection label, wherein the full selection label is a label associated with all candidate sharing contact labels corresponding to the target account;
and responding to the selection operation of the all-selection label, and determining that the visible contact persons of the second terminal login target account are all candidate sharing contact persons.
In one embodiment, the account login further comprises:
adding a contact identification of the visible contact to a target field associated with an information database; the information database stores account information of each contact corresponding to the target account and interaction data between the target account and each contact;
the feeding back the login permission information to the second terminal includes:
and based on the target field, generating login permission information carrying field content in the target field and feeding the login permission information back to the second terminal, wherein the login permission information is used for enabling the second terminal to log in the target account, enabling the second terminal to log in the target account based on the contact person identification in the field content, and reading and displaying account information of the visible contact person and interactive data between the target account and the visible contact person from the information database.
An account login device is applied to a first terminal logged in with a target account, and comprises:
the login request receiving module is used for receiving a login request of the second terminal, and a login account carried in the login request is the same as the target account;
the contact tag display module is used for displaying a candidate shared contact tag corresponding to the target account;
the contact person determining module is used for responding to the selection operation of the candidate shared contact person label and determining the visible contact person of the second terminal login target account;
and the login information feedback module is used for feeding the login permission information back to the second terminal, the login permission information carries a contact person identifier corresponding to the visible contact person, the login permission information is used for enabling the second terminal to log in the target account, and information corresponding to the contact person identifier is displayed.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving a login request of a second terminal, wherein a login account carried in the login request is the same as a target account;
displaying a candidate shared contact tag corresponding to the target account;
responding to the selection operation of the candidate shared contact person label, and determining a visible contact person of the second terminal login target account;
and feeding back the login permission information to the second terminal, wherein the login permission information carries a contact person identifier corresponding to the visible contact person, and the login permission information is used for enabling the second terminal to log in the target account and displaying the information corresponding to the contact person identifier.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving a login request of a second terminal, wherein a login account carried in the login request is the same as a target account;
displaying a candidate shared contact tag corresponding to the target account;
responding to the selection operation of the candidate shared contact person label, and determining a visible contact person of the second terminal login target account;
and feeding back the login permission information to the second terminal, wherein the login permission information carries a contact person identifier corresponding to the visible contact person, and the login permission information is used for enabling the second terminal to log in the target account and displaying the information corresponding to the contact person identifier.
The account login method, the account login device, the computer equipment and the storage medium are applied to a first terminal logged in with a target account, and display a candidate shared contact tag corresponding to the target account by receiving a login request of a second terminal, wherein the login account carried in the login request is the same as the target account; the display selection of the target shared contact is carried out before the second terminal logs in, so that the condition that all account information is directly displayed when another terminal logs in is avoided, and the visible contact of the target account logged in by the second terminal can be determined in response to the selection operation of the candidate shared contact label; the method comprises the steps that visible contacts needing to be shared can be selected, the shared visible contacts are displayed on a second terminal, login permission information is fed back to the second terminal, the login permission information carries contact person identifications corresponding to the visible contacts, the login permission information is used for enabling the second terminal to log in the target account and display information corresponding to the contact person identifications, after the login permission of the second terminal is successful, only the information corresponding to the contact person identifications is displayed on the second terminal, the privacy of the account can be effectively protected, and privacy disclosure is avoided.
An account login method is applied to a second terminal, and comprises the following steps:
sending a login request carrying a login account to a first terminal, wherein the first terminal logs in a target account which is the same as the login account;
receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and logging in the target account based on the login permission information, and displaying information corresponding to the contact person identification.
An account login device is applied to a second terminal, and comprises:
the system comprises a login request sending module, a login request sending module and a login request sending module, wherein the login request carrying a login account is sent to a first terminal, the first terminal logs in a target account, and the target account is the same as the login account;
the login information receiving module is used for receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and the account login module is used for logging in the target account and displaying information corresponding to the contact person identification based on the login permission information.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
sending a login request carrying a login account to a first terminal, wherein the first terminal logs in a target account which is the same as the login account;
receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and logging in the target account based on the login permission information, and displaying information corresponding to the contact person identification.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
sending a login request carrying a login account to a first terminal, wherein the first terminal logs in a target account which is the same as the login account;
receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and logging in the target account based on the login permission information, and displaying information corresponding to the contact person identification.
The account login method, the account login device, the computer equipment and the storage medium are applied to a second terminal, and a login request carrying a login account is sent to a first terminal, wherein the first terminal logs in a target account, and the target account is the same as the login account; sending a login request to a first terminal, ensuring that a target account and a login account are the same account, and receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to a visible contact person; the visible contact is determined by the first terminal responding to the operation of selecting the candidate shared contact label; the candidate shared contact tag corresponds to the target account; the method and the device have the advantages that the visible contact person determined to be shared by the first terminal can be displayed after the second terminal logs in the account, the target account is logged in based on the login permission information, information corresponding to the contact person identification is displayed, and only the information corresponding to the contact person identification is displayed at the second terminal after the second terminal successfully logs in, so that the privacy of the account can be effectively protected, and the privacy disclosure is avoided.
Drawings
FIG. 1 is a diagram of an application environment of an account login method in an embodiment;
fig. 2 is a schematic flowchart of an account login method applied to a first terminal in an embodiment;
fig. 3 is a schematic flowchart of an account login method applied to a first terminal in another embodiment;
fig. 4 is a schematic flowchart of an account login method applied to a second terminal in an embodiment;
fig. 5 is a schematic flowchart of an account login method in an application embodiment;
fig. 6 is a block diagram illustrating an account login apparatus applied to a first terminal according to an embodiment;
fig. 7 is a block diagram illustrating an account login apparatus applied to a second terminal according to an embodiment;
FIG. 8 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The account login method provided by the application can be applied to the application environment shown in fig. 1. The first terminal 102 communicates with the second terminal 104 through a network, and the first terminal 102 logs in a target account. The first terminal 102 receives a login request of the second terminal 104, wherein a login account carried in the login request is the same as a target account; the first terminal 102 displays a candidate shared contact tag corresponding to the target account; the first terminal 102 responds to the selection operation of the candidate shared contact tags and determines visible contacts of the second terminal login target account; the first terminal 102 feeds back the login permission information to the second terminal 104, the login permission information carries a contact identification corresponding to the visible contact, the login permission information is used for enabling the second terminal to log in the target account, and information corresponding to the contact identification is displayed. The first terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The second terminal 104 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The interaction between the first terminal and the second terminal can also be realized by a server, and the server can be realized by an independent server or a server cluster formed by a plurality of servers.
In an embodiment, as shown in fig. 2, an account login method is provided, which is described by taking the example that the method is applied to the first terminal in fig. 1, where a target account is logged in, and includes the following steps:
step 202, receiving a login request of the second terminal, wherein a login account carried in the login request is the same as the target account.
The method comprises the steps that a first terminal is a terminal which logs in a target account, a second terminal is a terminal which logs in and sends a login request of a login account when the account logs in currently, the target account of the first terminal and the login account of the second terminal are the same account, the account can log in at a plurality of terminals at the same time, the target account is an account which logs in successfully at the first terminal and attempts to log in at the second terminal, the account login can be login performed by inputting the account and an account password, and the login request is sent to the first terminal by the second terminal. And the login account of the second terminal is the account carried in the login request. When a second terminal logs in an account, the second terminal sends a login request to a first terminal, the first terminal receives the login request from the second terminal, the login request of the second terminal needs to obtain login authentication of the first terminal, the login authentication refers to login authentication of a legal user, when the user confirms that the login behavior of the second terminal is own operation, login authorization can be directly carried out on the first terminal, the account is allowed to log in the second terminal, and when the user confirms that the login behavior of the second terminal is not own operation, login can be refused, the account is refused to log in the second terminal and the like.
Specifically, when a first terminal logs in a target account, a second terminal logs in the account, the login account logged in by the second terminal at this time is the same as that of the first terminal, the second terminal sends a login request to the first terminal, and the first terminal receives the login request from the second terminal and performs login authentication on the second terminal.
And step 204, displaying a candidate shared contact tag corresponding to the target account.
The candidate shared contact person tags are obtained according to contact persons in the target account number logged in the first terminal, and one candidate shared contact person tag corresponds to one contact person. The candidate sharing contact person is displayed and selected on the first terminal, and the candidate sharing contact person label can be a key used for clicking and triggering selection of the candidate sharing contact person by a user on a display interface, wherein the candidate sharing contact person can be displayed after the second terminal is logged in correspondingly.
Specifically, when the first terminal receives a login request of the second terminal, the first terminal performs login authentication on the second terminal, and when the login of the second terminal is identified as a legal login request, the first terminal displays a candidate shared contact tag corresponding to the target account.
And step 206, responding to the selection operation of the candidate shared contact tag, and determining the visible contact of the second terminal login target account.
And responding to the selection operation of the user of the first terminal on the candidate shared contact person label, wherein the selected candidate shared contact person label is the visible contact person corresponding to the second terminal login target account. The visible contact is a contact which can be displayed after the second terminal logs in the target account.
Specifically, the first terminal responds to the selection operation of the user on the candidate shared contact tags, each candidate shared contact tag corresponds to one contact of the target account, the selected candidate shared contact tag corresponds to a visible contact which can be displayed after the second terminal logs in the target account, and therefore the visible contact of the second terminal logging in the target account can be determined through the first terminal.
And step 208, feeding back login permission information to the second terminal, wherein the login permission information carries a contact person identifier corresponding to a visible contact person, the login permission information is used for enabling the second terminal to log in a target account, and information corresponding to the contact person identifier is displayed, the login permission information is fed back to the second terminal by the first terminal, the login permission information is used for enabling the second terminal to log in the target account identical to the first terminal account, the login permission information carries the contact person identifier corresponding to the visible contact person determined by the first terminal, the contact person identifier is data used for representing the visible contact person in the login permission information, for example, the contact person identifier may be a string of codes, and each code represents one visible contact person. Each contact person identification corresponds to a visible contact person, after the second terminal successfully logs in the target account, the second terminal only displays the visible contact person determined by the first terminal, contact persons which are not visible contact persons on the first terminal are not displayed on the second terminal.
Specifically, the first terminal feeds back the login permission information to the second terminal, the login permission information carries contact person identifiers corresponding to visible contact persons, each contact person identifier corresponds to one visible contact person, the login permission information is used for enabling the second terminal to log in a target account, information corresponding to the contact person identifiers is displayed, after the second terminal receives the login permission information, the target account same as the first terminal can be logged in, and the information corresponding to the contact person identifiers is displayed after the login permission information is successfully logged in.
The account login method is applied to a first terminal logged in with a target account, and displays a candidate shared contact tag corresponding to the target account by receiving a login request of a second terminal, wherein the login account carried in the login request is the same as the target account; the display selection of the target shared contact is carried out before the second terminal logs in, so that the condition that all account information is directly displayed when another terminal logs in is avoided, the selection operation of a candidate shared contact label can be responded, and the visible contact of the target account logged in by the second terminal is determined; the method comprises the steps of selecting visible contacts needing to be shared, displaying the shared visible contacts at a second terminal, feeding login permission information back to the second terminal, enabling the login permission information to carry contact identification corresponding to the visible contacts, enabling the login permission information to be used for enabling the second terminal to log in a target account, displaying information corresponding to the contact identification, and after the login permission of the second terminal is successful, displaying only information corresponding to the contact identification at the second terminal, effectively protecting the privacy of the account, and avoiding privacy disclosure. In another embodiment, as shown in fig. 3, the step 204 of displaying a candidate shared contact tag corresponding to the target account includes:
step 302, when the second terminal is judged to be an authorized terminal based on the authorized terminal identification associated with the target account, displaying a candidate shared contact tag corresponding to the target account;
304, when the second terminal is judged to be an unauthorized terminal based on the authorized terminal identification associated with the target account, displaying terminal information corresponding to the second terminal and a login confirmation entry;
and step 306, responding to the login confirmation operation aiming at the login confirmation entry, and displaying a candidate shared contact tag corresponding to the target account.
The authorized terminal identification represents a terminal which is authorized by the first terminal and can directly log in. Specifically, the authorization may be obtained by logging in the target account, or the authorization may be performed by selecting and confirming an authorization identifier "allow to log in the device" in the login interface. The first terminal may record a terminal identifier of a terminal authorized to log in the target account, where the authorized terminal identifier is associated with the logged in target account, and the first terminal may determine, based on the authorized terminal identifier, whether a login request of the second terminal is a legal login request, that is, whether the second terminal is an authorized terminal identifier. When the second terminal is an unauthorized terminal, the first terminal can also allow or refuse the second terminal to log in the target account by responding to the login confirmation operation or the login cancellation operation of the user.
Specifically, when the second terminal is an unauthorized terminal, the terminal information and the login confirmation entry corresponding to the second terminal are displayed on the login authorization page of the first terminal, and the candidate shared contact tag corresponding to the target account is displayed in response to the login confirmation operation of the user of the first terminal on the login confirmation entry.
In addition, a login canceling entry can be displayed on the login authorization page of the first terminal, and login failure information is fed back to the second terminal in response to a login canceling operation aiming at the login canceling entry. And if the second terminal is an unauthorized terminal and the login canceling operation of the user for the login canceling entry is detected, determining that the login request of the second terminal is an illegal login request, specifically, when the first terminal determines that the login request of the second terminal is the illegal login request, the first terminal feeds login failure information back to the second terminal, and the second terminal cannot log in the target account.
And if the second terminal is an authorized terminal or the second terminal is an unauthorized terminal but the login confirmation operation of the user for the login confirmation entry is detected, judging that the login request of the second terminal is a legal login request, and displaying the candidate shared contact tag corresponding to the target account.
When the first terminal judges that the login request of the second terminal is a legal login request, candidate shared contact person tags corresponding to the target account are displayed on the first terminal, and each candidate shared contact person tag corresponds to one contact person in the target account logged in the first terminal. Specifically, when the login request of the second terminal is a legal login request, the first terminal displays a candidate sharing contact tag corresponding to the target account, and the candidate sharing contact tag corresponding to the target account displayed by the first terminal is used for being pushed to a user of the first terminal for selection.
In the embodiment, whether the login request of the second terminal is a legal login request or not is judged based on the authorized terminal identifier associated with the target account, when the login request is an illegal login request, login failure information is fed back to the second terminal, unsafe illegal login is avoided, the account can be effectively protected, only when the login request is a legal login request, the candidate shared contact tag corresponding to the target account can be displayed, the privacy of the account can be effectively protected, and privacy disclosure is avoided.
In one embodiment, displaying a candidate shared contact tag corresponding to a target account includes:
displaying terminal information, a login confirmation entry and a login canceling entry corresponding to the second terminal; and responding to a login confirmation operation aiming at the login confirmation entry, and displaying a candidate shared contact tag corresponding to the target account. The account login method further comprises the following steps: and feeding back login failure information to the second terminal in response to the login confirmation operation aiming at the cancel login entrance.
In this embodiment, for the second terminal, the target account needs to be correspondingly confirmed by logging in the first terminal every time, so that privacy protection of the account is further improved, and privacy disclosure is avoided. In one embodiment, after receiving the login request of the second terminal, the method further includes:
and displaying selection labels, wherein the selection labels comprise labels corresponding to the sharing contact person confirmation and the sharing contact person cancellation respectively. And when the selection tag corresponding to the share canceling contact is triggered, determining that the visible contact of the second terminal for logging in the target account is empty. Displaying a candidate shared contact tag corresponding to the target account comprises: and when the selection tag corresponding to the sharing contact is triggered, displaying a candidate sharing contact tag corresponding to the target account.
The method comprises the steps that a first terminal displays a selection tag to be pushed to a user of the first terminal for selection, the selection tag comprises tags corresponding to a shared contact person and a shared contact person cancellation respectively, the shared contact person is confirmed to be a contact person on a target account number to be shared by the first terminal to a second terminal, how to share the shared contact person is further determined by entering a step of displaying a candidate shared contact person tag corresponding to the target account number, and the shared contact person cancellation means that the contact person on the target account number cannot be shared by the first terminal to the second terminal, namely after the second terminal logs in the target account number, a visible contact person on the second terminal is empty, and the contact person on the target account number of the first terminal cannot be displayed on the second terminal.
Specifically, the first terminal displays a selection tag, and the step of displaying the selection tag may be that after determining whether the login request of the second terminal is a legal login request, when the login request is a legal login request, the first terminal displays the selection tag, where the selection tag includes tags corresponding to the confirmed shared contact and the cancelled shared contact, respectively. When the selection tag corresponding to the contact person to be shared is triggered, the first terminal can determine that the visible contact person of the second terminal logging in the target account is empty. And when the selection tag corresponding to the sharing contact is triggered, displaying a candidate sharing contact tag corresponding to the target account on the first terminal.
In this embodiment, by determining the triggering operations of the tags corresponding to the shared contact and the shared contact cancellation respectively, a more convenient operation of privacy protection can be achieved, and when the selection tag corresponding to the shared contact cancellation on the first terminal is triggered, it can be determined by the first terminal that the visible contact of the second terminal logging in the target account is empty. When the first terminal confirms that the selection tag corresponding to the shared contact is triggered, the candidate shared contact tag corresponding to the target account is displayed on the first terminal, so that the condition that all account information is directly displayed when another terminal is logged in is avoided, and the visible contact of the target account logged in by the second terminal can be determined in response to the selection operation of the candidate shared contact tag; only the information corresponding to the visible contact is displayed at the second terminal, so that the privacy of the account can be effectively protected, and the privacy disclosure is avoided.
In one embodiment, the account login method further includes:
and when the selection tag corresponding to the sharing contact is triggered, displaying a full selection tag, wherein the full selection tag is a tag associated with all candidate sharing contact tags corresponding to the target account. And responding to the selection operation of the all-selection label, and determining that the visible contact persons of the second terminal login target account are all candidate sharing contact persons.
The full selection label is displayed on the first terminal, the full selection label and the candidate sharing contact label corresponding to the target account are displayed on the first terminal simultaneously, after the selection of the full selection label by a user is responded, all the candidate sharing contact labels corresponding to the target account are selected completely through the full selection label, and the full selection label is a label associated with all the candidate sharing contact labels corresponding to the target account.
Specifically, when it is determined that the selection tag corresponding to the sharing contact is triggered, the first terminal displays a candidate sharing contact tag corresponding to the target account and also displays a full selection tag, where the full selection tag is a tag associated with all candidate sharing contact tags corresponding to the target account. If the user selects the all-selected tag, the first terminal responds to the operation of selecting the all-selected tag, and the visible contacts of the second terminal logging in the target account are determined to be all candidate shared contacts.
In the embodiment, the first terminal not only displays the candidate shared contact tags corresponding to the target account, but also displays the all-selected tags, when the user needs the tag, the first terminal responds to the selection of the all-selected tags by the user, the candidate shared contacts do not need to be selected one by one, the rapid and convenient selection of the all-selected tags can be achieved, the all-selected tags are tags associated with all the candidate shared contact tags corresponding to the target account, the selection operation of the all-selected tags of all the candidate shared contacts can be responded, the visible contacts needing to be shared can be selected more effectively, the shared visible contacts are determined to be displayed at the second terminal, the privacy of the account can be effectively protected, and privacy disclosure is avoided.
In one embodiment, the account login method further includes: adding a contact identification of a visible contact to a target field associated with an information database; the information database stores account information of each contact corresponding to the target account and interaction data between the target account and each contact;
feeding back the login permission information to the second terminal, including:
and based on the target field, generating login permission information carrying field content in the target field and feeding the login permission information back to the second terminal, wherein the login permission information is used for enabling the second terminal to log in the target account, enabling the second terminal to log in the contact person identifier based on the field content, and reading and displaying account information of the visible contact person and interactive data between the target account person and the visible contact person from the information database. The visible contact persons have corresponding contact person identifications, each contact person identification corresponds to one visible contact person, and account information and interaction data corresponding to each contact person of the target account are stored in the information database. The account information may be information such as an account and identity parameters corresponding to the visible contact. The interactive data may be chat information between the target account and the visible contact, specifically, but not limited to, content information in a chat box, and may also be data that is arbitrarily communicated with the other contact in the target account. The target field is a newly increased field relative to a traditional data field in the system and is a newly increased sharable field, the first terminal adds the contact person identification of the visible contact person selected by the user to the newly increased sharable field, each newly increased sharable field corresponds to one visible contact person, and the second terminal can read account information corresponding to the visible contact person and interactive data between the account information and the target account number from the information database based on each newly increased sharable field. The login permission information is sent by the first terminal to the second terminal and is generated according to a newly added sharable field (sharable field), the login permission information comprises the login permission information of the second terminal to the target account, and the contact identification, account information and interactive data of the visible contact corresponding to the newly added sharable field carried in the login permission information are displayed.
In the embodiment, the login permission information is generated, the login permission information can be fed back to the second terminal, the login permission information carries the contact person identification corresponding to the visible contact person, the login permission information is used for enabling the second terminal to log in the target account, the information corresponding to the contact person identification is displayed, and after the login permission of the second terminal is successful, only the information corresponding to the contact person identification is displayed at the second terminal, so that the privacy of the account number can be effectively protected, and the privacy disclosure is avoided.
In one embodiment, as shown in fig. 4, an account login method is applied to a second terminal, and the method includes:
step 402, sending a login request carrying a login account to a first terminal, wherein the first terminal logs in a target account, and the target account is the same as the login account.
The login request is sent to the first terminal by the second terminal, the login account of the second terminal for account login is the same as the target account which is already logged in by the first terminal, the first terminal receives the login request of the second terminal, and the login request of the first terminal to the second terminal is subjected to login authentication.
Specifically, the second terminal performs account login, at this time, after the second terminal inputs an account password, a login request carrying a login account is sent to the first terminal, the login account of the second terminal performing login at this time is the same as a target account already logged in by the first terminal, the first terminal performs login authentication on the second terminal, a result of the login authentication is fed back to the second terminal, and the second terminal responds to the login authentication of the first terminal on the second terminal.
Step 404, receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account.
The login allowing information comprises that the first terminal is allowed to log in the target account, and the login allowing information also carries a contact person identifier of a visible contact person determined by the first terminal after the second terminal logs in. The visible contact is a contact determined by the first terminal responding to the operation of selecting the candidate shared contact label, the candidate shared contact label corresponds to the target account, the candidate shared contact label corresponds to a contact in the target account, each contact in the target account has a corresponding candidate shared contact label, and only the contact corresponding to the candidate shared contact label selected for the first terminal responding is the visible contact. The account information and the interactive data of the corresponding visible contact can be read from the information database, and the login permission information can be obtained by the first terminal performing field processing on the contact identification of the selected visible contact.
Specifically, the second terminal receives login permission information fed back by the first terminal based on the login request, wherein the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact person is a contact person determined by the first terminal responding to the operation of selecting the candidate shared contact person label; the candidate shared contact tags correspond to contacts in the target account.
And 406, logging in the target account based on the login permission information, and displaying information corresponding to the contact person identification.
After the second terminal logs in the target account, the target account logs in on the first terminal and the second terminal at the same time, but the target account logged in on the second terminal only displays information corresponding to a contact person identifier carried in login-allowed information generated by the first terminal, the login-allowed information carries a contact person identifier corresponding to a visible contact person, and displaying the information corresponding to the contact person identifier comprises displaying the visible contact person determined by the first terminal, account information corresponding to the visible contact person of the corresponding visible contact person read from an information database based on the contact person identifier and interactive data. The account information may be information such as an account and identity parameters corresponding to the visible contact. The interactive data may be chat information between the target account and the visible contact, specifically, but not limited to, content information in a chat box, and may also be data that is arbitrarily communicated with the other contact in the target account.
Specifically, the second terminal logs in the target account identical to the target account of the first terminal on the second terminal based on the login permission information generated by the first terminal, and only the visible contact corresponding to the contact identifier, the account information corresponding to the visible contact and the interactive data are displayed on the second terminal.
In the embodiment, a login request carrying a login account is sent to a first terminal, the first terminal logs in a target account, and the target account is the same as the login account; sending a login request to a first terminal, ensuring that a target account and a login account are the same account, and receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account; the method has the advantages that the visible contact person determined to be shared by the first terminal can be displayed after the second terminal logs in the account, the target account is logged in based on the login permission information, the information corresponding to the contact person identification is displayed, after the second terminal successfully logs in, only the information corresponding to the contact person identification is displayed at the second terminal, the privacy of the account can be effectively protected, and privacy disclosure is avoided.
In an application example, the application scenario is shown in fig. 5, where the application scenario applies the account login method described above, and in the application scenario, the first terminal may be a mobile phone terminal, that is, a UE terminal; the second terminal can be a computer terminal, namely a PC terminal; the account login may be login performed by an account on instant messaging software on the terminal, the instant messaging software may be, but is not limited to, instant messaging software such as QQ, wechat and the like, and login of multiple terminals to the same account may exist during account login. Specifically, the application of the account login method in the application scenario is as follows:
the method includes the steps that account login is conducted on a PC end, for example, when a second terminal inputs an account password or scans a login two-dimensional code through the UE end, the PC end sends a login request carrying a login account to the UE end, the UE end already logs in a target account which is the same as the PC end, the UE end receives the login request from the PC end, and the UE end conducts login authentication on the login request of the PC end.
And the UE terminal acquires an authorized terminal identifier associated with the target account and judges whether the login request of the PC terminal is a legal login request. Specifically, if the second terminal is an unauthorized terminal and a login canceling operation of the user for the login canceling entry is detected, it is determined that the login request of the second terminal is an illegal login request, the first terminal feeds login failure information back to the second terminal, and the second terminal cannot log in the target account. And if the second terminal is an authorized terminal or the second terminal is an unauthorized terminal but the login confirmation operation of the user for the login confirmation entry is detected, judging that the login request of the second terminal is a legal login request, and displaying the candidate shared contact tag corresponding to the target account.
When the UE identifies that the login of the PC is a legal login request, the UE displays a selection tag, where the step of displaying the selection tag may be after determining whether the login request of the PC is a legal login request, and when the login request is a legal login request, the UE displays the selection tag, where the selection tag includes tags corresponding to the sharing confirmation contact and the sharing cancellation contact. When the selection tag corresponding to the contact person to be shared is triggered, the visible contact person of the PC terminal for logging in the target account is determined to be empty by the UE terminal. When the UE terminal confirms that the selection tag corresponding to the sharing contact is triggered, the candidate sharing contact tag corresponding to the target account is displayed on the UE terminal, and the candidate sharing contact tag corresponding to the target account displayed on the UE terminal is used for being pushed to a user of the UE terminal for selection.
When the UE terminal confirms that the selection tag corresponding to the shared contact is triggered, the UE terminal displays a candidate shared contact tag corresponding to the target account and simultaneously displays a full selection tag, wherein the full selection tag is a tag associated with all candidate shared contact tags corresponding to the target account. If the user selects the all-selected tag, the UE responds to the operation of selecting the all-selected tag, and the visible contacts of the PC terminal for logging in the target account are determined to be all candidate shared contacts.
If the user does not select the all-selected tag, the UE responds to the selection operation of the user on the candidate shared contact tags, each candidate shared contact tag corresponds to one contact of the target account, the selected candidate shared contact tag corresponds to a visible contact which can be displayed after the second terminal logs in the target account, and then the visible contact which can be used for determining the target account logging in by the PC through the UE can be determined.
And after the UE terminal determines that the PC terminal logs in the visible contact of the target account, the UE terminal also acquires the contact identification corresponding to the visible contact. And processing fields of the contact person identification on the UE terminal, processing each visible contact person into a field, thereby obtaining a newly increased sharable field corresponding to the visible contact person, and generating login permission information by the UE terminal based on the newly increased sharable field.
The UE end feeds back the login permission information to the PC end, the login permission information carries contact person identifications corresponding to visible contact persons, each contact person identification corresponds to one visible contact person, the login permission information is used for enabling the PC end to log in a target account, account information and interactive data of the visible contact persons are obtained from the information database and displayed respectively, after the PC end receives the login permission information, the target account same as the UE end can be logged in, and information corresponding to the contact person identifications is displayed after the login is successful.
The method comprises the steps that a PC terminal receives login permission information fed back by a UE terminal based on a login request, wherein the login permission information carries a contact person identifier corresponding to a visible contact person; the visible contact person is a contact person determined by the UE end responding to the selected operation of the candidate shared contact person label; the candidate shared contact tags correspond to contacts in the target account.
And the PC terminal logs in a target account identical to the target account of the UE terminal on the PC terminal based on the login permission information generated by the UE terminal, and only displays the visible contact corresponding to the contact identification, the account information corresponding to the visible contact and the interactive data on the PC terminal.
In addition, after the PC successfully logs in, that is, when the UE and the PC log in the target account at the same time, the UE and the PC can perform data interaction to feed back data that has been transmitted by the message of state change of their respective terminals, for example, a contact is added to the PC, and the PC feeds back data of the added contact to the UE. The newly added or changed data can be processed through the fields to obtain newly added sharable fields, and the feedback information is generated through the sharable fields.
In the embodiment, a PC terminal sends a login request carrying a login account to a UE terminal, the UE terminal logs in a target account, and the target account is the same as the login account; sending a login request to a UE (user equipment) end, ensuring that a target account and a login account are the same, and displaying a candidate shared contact tag corresponding to the target account by the UE end by receiving the login request of a PC (personal computer) end; the display selection of the target shared contact is carried out before the PC terminal logs in, so that the condition that all account information is directly displayed when another terminal logs in is avoided, the selection operation of a candidate shared contact label can be responded, and the visible contact of the target account logged in by the PC terminal is determined; the method comprises the steps of selecting visible contacts needing to be shared, displaying the shared visible contacts at the PC end, feeding back login permission information to the PC end, wherein the login permission information carries contact identification corresponding to the visible contacts, and the login permission information is used for enabling the PC end to log in a target account. The PC terminal receives the login permission information fed back by the UE terminal based on the login request; the method has the advantages that the visible contact determined to be shared by the UE can be displayed after the PC logs in the account, the target account is logged in based on the login permission information, the information corresponding to the contact identification is displayed, after the PC permits login to be successful, only the information corresponding to the contact identification is displayed at the PC, the privacy of the account can be effectively protected, and privacy disclosure is avoided.
It should be understood that, although the steps in the flowcharts of the above embodiments are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in each flowchart may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a part of the steps or stages in other steps.
In one embodiment, as shown in fig. 6, an account login apparatus is provided, which is applied to a first terminal logged in with a target account, and includes: a login request receiving module 602, a contact tag display module 604, a contact determination module 606, and a login information feedback module 608, wherein:
a login request receiving module 602, configured to receive a login request of a second terminal, where a login account carried in the login request is the same as the target account;
a contact tag display module 604, configured to display a candidate shared contact tag corresponding to the target account;
a contact determination module 606, configured to determine, in response to a selection operation on a candidate shared contact tag, a visible contact of the second terminal logged in to the target account;
the login information feedback module 608 is configured to feed back login permission information to the second terminal, where the login permission information carries a contact identifier corresponding to a visible contact, and the login permission information is used to enable the second terminal to log in the target account and display information corresponding to the contact identifier.
In one embodiment, the account login device further comprises a legal login request judging module, wherein the legal login request judging module is used for displaying a candidate shared contact tag corresponding to the target account when the second terminal is judged to be an authorized terminal based on the authorized terminal identifier associated with the target account; when the second terminal is judged to be an unauthorized terminal based on the authorized terminal identification associated with the target account, displaying terminal information corresponding to the second terminal and a login confirmation entry; and responding to a login confirmation operation aiming at the login confirmation entry, and displaying a candidate shared contact tag corresponding to the target account.
In one embodiment, the account login device further comprises a selection tag module, wherein the selection tag module is used for displaying a selection tag, and the selection tag comprises tags corresponding to the sharing contact person and the sharing contact person; when a selection tag corresponding to the contact person for canceling the sharing is triggered, determining that the visible contact person of the second terminal for logging in the target account is empty; displaying a candidate shared contact tag corresponding to the target account comprises: and when the selection tag corresponding to the sharing contact is triggered, displaying a candidate sharing contact tag corresponding to the target account.
In one embodiment, the account login device further comprises a full selection tag module, wherein the full selection tag module is used for displaying a full selection tag when a selection tag corresponding to the shared contact is triggered, and the full selection tag is a tag associated with all candidate shared contact tags corresponding to the target account; and responding to the selection operation of the all-selection label, and determining that the visible contact persons of the second terminal login target account are all candidate sharing contact persons.
In one embodiment, the login information feedback module 608 adds the contact identification of the visible contact to a target field associated with the information database; the information database stores account information of each contact corresponding to the target account and interaction data between the target account and each contact; and based on the target field, generating login permission information carrying field content in the target field and feeding the login permission information back to the second terminal, wherein the login permission information is used for enabling the second terminal to log in the target account, enabling the second terminal to log in the contact person identifier based on the field content, and reading and displaying account information of the visible contact person and interactive data between the target account person and the visible contact person from the information database.
In one embodiment, as shown in fig. 7, there is provided an account login apparatus applied to a second terminal, including: a login request sending module 702, a login information receiving module 704 and an account login module 706, wherein:
a login request sending module 702, configured to send a login request carrying a login account to a first terminal, where the first terminal logs in a target account that is the same as the login account;
a login information receiving module 704, configured to receive login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and an account login module 706, configured to log in the target account based on the login permission information, and display information corresponding to the contact identifier.
For specific limitations of the account login device, reference may be made to the above limitations on the account login method, which is not described herein again. All or part of the modules in the account login device can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an account login method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device applied to a first terminal logged with a target account number is provided, and includes a memory and a processor, where the memory stores a computer program, and the processor implements the following steps when executing the computer program:
sending a login request carrying a login account to a first terminal, wherein the first terminal logs in a target account which is the same as the login account;
receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and logging in the target account based on the login permission information, and displaying information corresponding to the contact person identification.
In one embodiment, the processor, when executing the computer program, further performs the steps of: when the second terminal is judged to be an authorized terminal based on the authorized terminal identification associated with the target account, displaying a candidate shared contact tag corresponding to the target account; when the second terminal is judged to be an unauthorized terminal based on the authorized terminal identification associated with the target account, displaying terminal information corresponding to the second terminal and a login confirmation entry; and responding to a login confirmation operation aiming at the login confirmation entry, and displaying a candidate shared contact tag corresponding to the target account.
In one embodiment, the processor, when executing the computer program, further performs the steps of: displaying selection labels, wherein the selection labels comprise labels corresponding to the sharing contact person confirmation and the sharing contact person cancellation respectively; when a selection tag corresponding to the contact person for canceling the sharing is triggered, determining that the visible contact person of the second terminal for logging in the target account is empty; displaying a candidate shared contact tag corresponding to the target account comprises: and when the selection tag corresponding to the sharing contact is triggered, displaying a candidate sharing contact tag corresponding to the target account.
In one embodiment, the processor, when executing the computer program, further performs the steps of: when the selection label corresponding to the sharing contact is triggered, displaying a full selection label, wherein the full selection label is a label associated with all candidate sharing contact labels corresponding to the target account; and responding to the selection operation of the all-selection label, and determining that the visible contact persons of the second terminal login target account are all candidate sharing contact persons.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
adding a contact identification of a visible contact to a target field associated with an information database; the information database stores account information of each contact corresponding to the target account and interaction data between the target account and each contact;
and based on the target field, generating login permission information carrying field content in the target field and feeding the login permission information back to the second terminal, wherein the login permission information is used for enabling the second terminal to log in the target account, enabling the second terminal to log in the contact person identifier based on the field content, and reading and displaying account information of the visible contact person and interactive data between the target account person and the visible contact person from the information database.
In one embodiment, a computer-readable storage medium is provided, which is applied to a first terminal logged with a target account, and has a computer program stored thereon, and when executed by a processor, the computer program implements the following steps:
sending a login request carrying a login account to a first terminal, wherein the first terminal logs in a target account which is the same as the login account;
receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and logging in the target account based on the login permission information, and displaying information corresponding to the contact person identification.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the second terminal is judged to be an authorized terminal based on the authorized terminal identification associated with the target account, displaying a candidate shared contact tag corresponding to the target account; when the second terminal is judged to be an unauthorized terminal based on the authorized terminal identification associated with the target account, displaying terminal information corresponding to the second terminal and a login confirmation entry; and responding to a login confirmation operation aiming at the login confirmation entry, and displaying a candidate shared contact tag corresponding to the target account.
In one embodiment, the computer program when executed by the processor further performs the steps of:
displaying selection labels, wherein the selection labels comprise labels corresponding to the sharing contact person confirmation and the sharing contact person cancellation respectively; when a selection tag corresponding to the contact person for canceling the sharing is triggered, determining that the visible contact person of the second terminal for logging in the target account is empty; displaying a candidate shared contact tag corresponding to the target account comprises: and when the selection tag corresponding to the sharing contact is triggered, displaying a candidate sharing contact tag corresponding to the target account.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the selection label corresponding to the sharing contact is triggered, displaying a full selection label, wherein the full selection label is a label associated with all candidate sharing contact labels corresponding to the target account; and responding to the selection operation of the all-selection label, and determining that the visible contact persons of the second terminal login target account are all candidate sharing contact persons.
In one embodiment, the computer program when executed by the processor further performs the steps of:
adding a contact identification of a visible contact to a target field associated with an information database; the information database stores account information of each contact corresponding to the target account and interaction data between the target account and each contact;
and based on the target field, generating login permission information carrying field content in the target field and feeding the login permission information back to the second terminal, wherein the login permission information is used for enabling the second terminal to log in the target account, enabling the second terminal to log in the contact person identifier based on the field content, and reading and displaying account information of the visible contact person and interactive data between the target account person and the visible contact person from the information database.
In one embodiment, a computer device applied to a second terminal is provided, and includes a memory and a processor, wherein the memory stores a computer program, and the processor implements the following steps when executing the computer program:
sending a login request carrying a login account to a first terminal, wherein the first terminal logs in a target account which is the same as the login account;
receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and logging in the target account based on the login permission information, and displaying information corresponding to the contact person identification.
In one embodiment, a computer readable storage medium is provided for a second terminal, having a computer program stored thereon, which when executed by a processor, performs the steps of:
sending a login request carrying a login account to a first terminal, wherein the first terminal logs in a target account which is the same as the login account;
receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to the visible contact person; the visible contact is determined by the first terminal responding to the selection operation of the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and logging in the target account based on the login permission information, and displaying information corresponding to the contact person identification.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An account login method is applied to a first terminal logged in with a target account, and comprises the following steps:
receiving a login request of a second terminal, wherein a login account carried in the login request is the same as the target account;
displaying a candidate shared contact tag corresponding to the target account;
responding to the selection operation of the candidate shared contact tag, and determining that the second terminal logs in the visible contact of the target account;
and feeding back login permission information to the second terminal, wherein the login permission information carries a contact person identifier corresponding to the visible contact person, and the login permission information is used for enabling the second terminal to log in the target account and displaying information corresponding to the contact person identifier.
2. The method of claim 1, wherein displaying the candidate shared contact tab corresponding to the target account number comprises:
when the second terminal is judged to be an authorized terminal based on the authorized terminal identification associated with the target account, displaying a candidate shared contact tag corresponding to the target account;
when the second terminal is judged to be an unauthorized terminal based on the authorized terminal identification associated with the target account, displaying terminal information corresponding to the second terminal and a login confirmation entry;
and responding to the login confirmation operation aiming at the login confirmation entry, and displaying a candidate shared contact tag corresponding to the target account.
3. The method according to claim 1, wherein after receiving the login request of the second terminal, the method further comprises:
displaying selection labels, wherein the selection labels comprise labels corresponding to the sharing contact person confirmation and the sharing contact person cancellation respectively;
when the selection tag corresponding to the share canceling contact is triggered, determining that the visible contact of the second terminal for logging in the target account is empty;
the displaying of the candidate shared contact tag corresponding to the target account comprises:
and when the selection tag corresponding to the sharing contact is triggered, displaying a candidate sharing contact tag corresponding to the target account.
4. The method of claim 3, further comprising:
when the selection tag corresponding to the sharing contact person is triggered, displaying a full selection tag, wherein the full selection tag is a tag associated with all candidate sharing contact person tags corresponding to the target account;
and responding to the selected operation of the all-selected label, and determining that the visible contact persons of the second terminal for logging in the target account are all the candidate sharing contact persons.
5. The method of claim 1, further comprising:
adding a contact identification of the visible contact to a target field associated with an information database; the information database stores account information of each contact corresponding to the target account and interaction data between the target account and each contact;
the feeding back the login permission information to the second terminal includes:
and based on the target field, generating login permission information carrying field content in the target field and feeding the login permission information back to the second terminal, wherein the login permission information is used for enabling the second terminal to log in the target account, enabling the second terminal to log in the target account based on the contact person identification in the field content, and reading and displaying account information of the visible contact person and interactive data between the target account and the visible contact person from the information database.
6. An account login method is applied to a second terminal, and comprises the following steps:
sending a login request carrying a login account to a first terminal, wherein the first terminal logs in a target account which is the same as the login account;
receiving login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to a visible contact person; the visible contact is determined by the first terminal responding to the operation of selecting the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and logging in the target account based on the login permission information, and displaying information corresponding to the contact person identification.
7. An account login device, which is applied to a first terminal logged in with a target account, the device comprising:
the login request receiving module is used for receiving a login request of a second terminal, and a login account carried in the login request is the same as the target account;
the contact tag display module is used for displaying a candidate shared contact tag corresponding to the target account;
the contact person determining module is used for responding to the selection operation of the candidate shared contact person label and determining the visible contact person of the second terminal for logging in the target account;
and the login information feedback module is used for feeding login permission information back to the second terminal, wherein the login permission information carries a contact person identifier corresponding to the visible contact person, and the login permission information is used for enabling the second terminal to log in the target account and displaying information corresponding to the contact person identifier.
8. An account login device, applied to a second terminal, the device comprising:
a login request sending module, configured to send a login request carrying a login account to a first terminal, where the first terminal logs in a target account that is the same as the login account;
the login information receiving module is used for receiving the login permission information fed back by the first terminal based on the login request; the login permission information carries a contact person identifier corresponding to a visible contact person; the visible contact is determined by the first terminal responding to the operation of selecting the candidate shared contact label; the candidate shared contact tag corresponds to the target account;
and the account login module is used for logging in the target account based on the login permission information and displaying information corresponding to the contact person identification.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN202110742199.5A 2021-06-30 2021-06-30 Account login method and device, computer equipment and storage medium Active CN113595871B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110742199.5A CN113595871B (en) 2021-06-30 2021-06-30 Account login method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110742199.5A CN113595871B (en) 2021-06-30 2021-06-30 Account login method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113595871A true CN113595871A (en) 2021-11-02
CN113595871B CN113595871B (en) 2022-10-14

Family

ID=78245608

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110742199.5A Active CN113595871B (en) 2021-06-30 2021-06-30 Account login method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113595871B (en)

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072103A (en) * 2007-03-09 2007-11-14 腾讯科技(深圳)有限公司 Method and system for multi-account log-in instant communication software
CN101252548A (en) * 2008-01-28 2008-08-27 北京亿企通信息技术有限公司 Method for multi-point login in instant communicating tools
CN102025648A (en) * 2009-09-16 2011-04-20 腾讯科技(深圳)有限公司 Instant messaging method and server
CN102368764A (en) * 2011-09-10 2012-03-07 上海量明科技发展有限公司 Method for carrying out communication through multiple points of presence, system and client thereof
CN102394861A (en) * 2011-09-02 2012-03-28 何劲 Method convenient for user to simultaneously use micorblog by multi accounts
CN102752313A (en) * 2012-07-18 2012-10-24 北京开心人信息技术有限公司 Method and device for creating multiple identities in instant messaging means for users
CN102882762A (en) * 2011-07-11 2013-01-16 腾讯科技(深圳)有限公司 Method and system for synchronizing chat status information in multiple pages
CN103067257A (en) * 2012-12-14 2013-04-24 腾讯科技(深圳)有限公司 Method and server and system for achieving data mutual communication in social networking service
CN103248723A (en) * 2013-04-10 2013-08-14 腾讯科技(深圳)有限公司 Determination method and device for IP address area
CN103297410A (en) * 2012-03-05 2013-09-11 盛大计算机(上海)有限公司 Account intercommunication system and using method thereof
US20140136638A1 (en) * 2012-11-12 2014-05-15 Tencent Technology (Shenzhen) Company Limited Method and apparatus for message synchronization in instant messaging applications
CN103812755A (en) * 2012-11-12 2014-05-21 腾讯科技(深圳)有限公司 Message synchronization method and device in instant messaging application
CN104077123A (en) * 2013-12-11 2014-10-01 腾讯科技(深圳)有限公司 Interface display method, device, terminal and server
US20150288761A1 (en) * 2012-12-24 2015-10-08 Tencent Technology (Shenzhen) Company Limited Data Sharing Method, Client And System
CN105656948A (en) * 2016-03-30 2016-06-08 北京小米移动软件有限公司 Account login method and device
CN106970742A (en) * 2017-03-27 2017-07-21 广州华多网络科技有限公司 The message prompt method and device of a kind of social networking application
CN111355681A (en) * 2018-12-04 2020-06-30 中兴通讯股份有限公司 Address book-based authentication method, terminal device, server and storage medium
CN112073289A (en) * 2019-06-10 2020-12-11 腾讯科技(深圳)有限公司 Instant messaging control method and device
CN112883366A (en) * 2021-03-29 2021-06-01 口碑(上海)信息技术有限公司 Account sharing login method, device, system, electronic equipment and storage medium
CN113037615A (en) * 2021-03-27 2021-06-25 北京合力金智科技发展有限公司 Intelligent communication system

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072103A (en) * 2007-03-09 2007-11-14 腾讯科技(深圳)有限公司 Method and system for multi-account log-in instant communication software
CN101252548A (en) * 2008-01-28 2008-08-27 北京亿企通信息技术有限公司 Method for multi-point login in instant communicating tools
CN102025648A (en) * 2009-09-16 2011-04-20 腾讯科技(深圳)有限公司 Instant messaging method and server
CN102882762A (en) * 2011-07-11 2013-01-16 腾讯科技(深圳)有限公司 Method and system for synchronizing chat status information in multiple pages
CN102394861A (en) * 2011-09-02 2012-03-28 何劲 Method convenient for user to simultaneously use micorblog by multi accounts
CN102368764A (en) * 2011-09-10 2012-03-07 上海量明科技发展有限公司 Method for carrying out communication through multiple points of presence, system and client thereof
CN103297410A (en) * 2012-03-05 2013-09-11 盛大计算机(上海)有限公司 Account intercommunication system and using method thereof
CN102752313A (en) * 2012-07-18 2012-10-24 北京开心人信息技术有限公司 Method and device for creating multiple identities in instant messaging means for users
US20140136638A1 (en) * 2012-11-12 2014-05-15 Tencent Technology (Shenzhen) Company Limited Method and apparatus for message synchronization in instant messaging applications
CN103812755A (en) * 2012-11-12 2014-05-21 腾讯科技(深圳)有限公司 Message synchronization method and device in instant messaging application
CN103067257A (en) * 2012-12-14 2013-04-24 腾讯科技(深圳)有限公司 Method and server and system for achieving data mutual communication in social networking service
US20150288761A1 (en) * 2012-12-24 2015-10-08 Tencent Technology (Shenzhen) Company Limited Data Sharing Method, Client And System
CN103248723A (en) * 2013-04-10 2013-08-14 腾讯科技(深圳)有限公司 Determination method and device for IP address area
CN104077123A (en) * 2013-12-11 2014-10-01 腾讯科技(深圳)有限公司 Interface display method, device, terminal and server
CN105656948A (en) * 2016-03-30 2016-06-08 北京小米移动软件有限公司 Account login method and device
CN106970742A (en) * 2017-03-27 2017-07-21 广州华多网络科技有限公司 The message prompt method and device of a kind of social networking application
CN111355681A (en) * 2018-12-04 2020-06-30 中兴通讯股份有限公司 Address book-based authentication method, terminal device, server and storage medium
CN112073289A (en) * 2019-06-10 2020-12-11 腾讯科技(深圳)有限公司 Instant messaging control method and device
CN113037615A (en) * 2021-03-27 2021-06-25 北京合力金智科技发展有限公司 Intelligent communication system
CN112883366A (en) * 2021-03-29 2021-06-01 口碑(上海)信息技术有限公司 Account sharing login method, device, system, electronic equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JEHN-RUEY JIANG等: "Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social Networks", 《 2010 IEEE 16TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS》 *
穆传鑫: "基于XMPP协议与混合加密的即时通讯系统研究与实现", 《 中国优秀硕士论文电子期刊网》 *
马鸣等: "用户账号分权限的社交登录隐私保护平台", 《信息网络安全》 *

Also Published As

Publication number Publication date
CN113595871B (en) 2022-10-14

Similar Documents

Publication Publication Date Title
WO2019015516A1 (en) Methods and apparatus for authentication of joint account login
CN104239804A (en) Data protecting method and device
CN113553572B (en) Resource information acquisition method, device, computer equipment and storage medium
CN108418797B (en) Webpage access method and device, computer equipment and storage medium
KR102535312B1 (en) Information processing method, information processing device, program and information processing terminal
CN112073289B (en) Instant messaging control method and device
CN110177039B (en) Message sharing method and device, computer equipment and storage medium
CN103036852B (en) A kind of method and device realizing network entry
CN114266033A (en) Verification code generation method and device, verification code login system and electronic equipment
CN113411284A (en) Account binding method and device, computer equipment and storage medium
CN112560006A (en) Single sign-on method and system under multi-application system
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN113595871B (en) Account login method and device, computer equipment and storage medium
CN112637167A (en) System login method and device, computer equipment and storage medium
CN112016122A (en) Webpage data processing method and device, computer equipment and storage medium
CN110247879B (en) Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system
CN112543194B (en) Mobile terminal login method and device, computer equipment and storage medium
KR20130134932A (en) Method for producing an encrypted file and decrypting the encrypted file, computer readable recording medium a program for implementing the methods
CN113297559B (en) Single sign-on method and device, computer equipment and storage medium
CN111193694B (en) Application authorization management method, terminal and medium based on dual-system operating environment
JP7354860B2 (en) Information processing device, information processing system, and information processing program
CN113873450A (en) Short message configuration method and device, computer equipment and storage medium
CN111740980B (en) Method and device for logging in application, mobile terminal and storage medium
CN115935347A (en) Clipboard protection method, clipboard protection device, clipboard protection equipment and storage medium
CN111770132A (en) Work order downloading method, work order uploading method, device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant