CN113839931A - Login method, computer device and storage medium - Google Patents

Login method, computer device and storage medium Download PDF

Info

Publication number
CN113839931A
CN113839931A CN202111043319.9A CN202111043319A CN113839931A CN 113839931 A CN113839931 A CN 113839931A CN 202111043319 A CN202111043319 A CN 202111043319A CN 113839931 A CN113839931 A CN 113839931A
Authority
CN
China
Prior art keywords
account
login
equipment
target device
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111043319.9A
Other languages
Chinese (zh)
Other versions
CN113839931B (en
Inventor
韦翠芙
廖雪松
秦海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Aipu Road Network Technology Co Ltd
Original Assignee
Guangzhou Aipu Road Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Aipu Road Network Technology Co Ltd filed Critical Guangzhou Aipu Road Network Technology Co Ltd
Priority to CN202111043319.9A priority Critical patent/CN113839931B/en
Publication of CN113839931A publication Critical patent/CN113839931A/en
Application granted granted Critical
Publication of CN113839931B publication Critical patent/CN113839931B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Abstract

The invention discloses a login method, a computer device and a storage medium, wherein the login method comprises the steps of obtaining login requests and priorities of first equipment, obtaining the number and the priorities of second equipment, controlling the lower-level target equipment to log out of a first account, controlling the first equipment to log in the first account and the like when the number of the second equipment reaches a limit threshold and the lower-level target equipment is detected. According to the invention, by setting the priorities of the first equipment and the second equipment, the first equipment can easily and successfully log in the first account under the condition that a large number of second equipment log in the first account, the influence on the use of the logged equipment and the logged-in equipment caused by setting the timeout duration and the like is avoided, the requirements of different aspects such as the technology or resource limitation of the server can be considered, and the application flexibility under the environment of a single account and multiple equipment can be widened. The invention is widely applied to the technical field of computers.

Description

Login method, computer device and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a login method, a computer device and a storage medium.
Background
In applications such as databases, operation and maintenance, internet video and music, etc., it is usually necessary to log in an account using a device such as a mobile phone, a tablet computer or a dedicated terminal, and an operator opens corresponding use function rights to the device according to the account logged in by the device, and performs operations such as information management and cost management. From a convenience perspective, operators typically allow multiple different devices to log into the same account at the same time; from a resource saving and business interest perspective, operators generally limit the number of devices that log into the same account at the same time. In the prior art that multiple devices log in the same account, the number of the devices logging in the same account at the same time is simply limited, the use of other accounts is influenced due to the fact that some accounts still maintain the login state under the condition that account functions are not used due to the fact that the devices are forgotten to log out or cannot log out due to network disconnection, and the like.
Disclosure of Invention
In order to solve the above technical problem, an object of the present invention is to provide a login method, a computer device, and a storage medium.
In one aspect, an embodiment of the present invention includes a login method, including:
acquiring a login request and priority of first equipment; the login request is used for requesting to login a first account;
acquiring the number and the priority of the second equipment; the second device is a device which is logged in the first account;
when the number of the second devices reaches a limit threshold and at least one low-level target device is detected from each second device, controlling the low-level target device to log out of the first account and controlling the first device to log in the first account; the low-level target device is a second device having a lower priority than the first device.
Further, when the number of the second devices reaches a limit threshold, the login method further includes:
when the low-level target device is not detected from the second devices, the login state of the second devices to the first account is maintained, and the login request of the first device is rejected.
Further, when the number of the second devices reaches a limit threshold, the login method further includes:
forwarding the login request to at least one of the flat target devices when the low-level target device is not detected from each of the second devices but at least one flat target device is detected from each of the second devices; the level target device is a second device with the same priority as the first device;
when the fact that the horizontal target device accepts the login request is detected, the horizontal target device accepting the login request is controlled to log out of the first account, and the first device is controlled to log in the first account.
Further, when the number of the second devices reaches a limit threshold, the login method further includes:
forwarding the login request to at least one of the flat target devices when the low-level target device is not detected from each of the second devices but at least one flat target device is detected from each of the second devices; the level target device is a second device with the same priority as the first device;
when detecting that the flat target equipment accepts the login request, controlling the flat target equipment accepting the login request to share with the first equipment to log in the first account.
Further, the controlling the flat target device accepting the login request shares login with the first device to the first account includes:
controlling the level target device accepting the login request to log out of the first account, and controlling the first device to log in the first account;
establishing a remote shared control connection between the first device and the flat target device accepting the login request; or
Maintaining a login status of the flat target device accepting the login request to the first account;
establishing a remote shared control connection between the first device and the flat target device accepting the login request; or
Maintaining a login status of the flat target device accepting the login request to the first account;
controlling the first device to log in the first account;
acquiring a first function permission set of the first account;
opening a first part of function authority to the first equipment, and opening a second part of function authority to the flat target equipment which receives the login request; the first part of function permission and the second part of function permission are respectively subsets of the first function permission set.
Further, the login method further comprises:
and when the number of the second equipment does not reach the limit threshold value, maintaining the login state of each second equipment to the first account, and controlling the first equipment to log in the first account.
Further, after controlling the low-level target device to log out of the first account, the login method further comprises:
controlling the low-level target device to log in a second account; the second account has a second set of functional permissions, the first account has a first set of functional permissions, and the second set of functional permissions is a subset of the first set of functional permissions.
Further, the login method further comprises:
and when the first device is detected to log out of the first account, controlling the low-level target device to switch from logging in the second account to logging in the first account.
In another aspect, an embodiment of the present invention further includes a computer apparatus, including a memory and a processor, where the memory is used to store at least one program, and the processor is used to load the at least one program to execute the login method according to the present invention.
In another aspect, the present invention further includes a storage medium having stored therein processor-executable instructions, which when executed by a processor, are used to perform the login method of the present invention.
The invention has the beneficial effects that: according to the login method in the embodiment, by setting the priorities of the first equipment and the second equipment, the first equipment can easily and successfully log in the first account under the condition that a large number of second equipment log in the first account, the influence on the use of the logged-in equipment and the logged-in equipment caused by setting the timeout duration and the like is avoided, the requirements of different aspects such as the technology of a server or resource limitation can be considered, and the application flexibility in the single-account and multi-equipment environment can be widened.
Drawings
FIG. 1 is a flowchart of a login method in an embodiment.
Detailed Description
The embodiment includes a login method, and referring to fig. 1, the login method includes the following steps:
s1, acquiring a login request and a priority of first equipment;
s2, acquiring the number and the priority of second equipment;
and S3, when the number of the second devices reaches a limit threshold value and at least one low-level target device is detected from each second device, controlling the low-level target device to log out of the first account and controlling the first device to log in the first account.
In this embodiment, the login method may be applied to the occasions where the account needs to be logged in, such as a database, a network video service, a network music service, a communication service, online shopping, and online games, and the steps in the login method may be executed by a server operated by a provider of these services. In the steps of the login method, the "first device" may refer to a device that has not logged into the first account before the login method is performed, and the "second device" may refer to one or more devices that have logged into the first account before the login method is performed. The "first device" and the "second device" may be terminals such as a mobile phone or a tablet computer used by the user of the service.
In each step of the login method, the process of "controlling the first device to log in the first account" may be executed in the server, for example, the first device sends a login request to the server, where the login request includes information such as an account number and a password of the first account, and the server adds information for recording a login state of the first device to the first account from its own recording area, so that the first device may be controlled to log in the first account, and after the login is successful, the server may not need to communicate with the first device, and may also send feedback information to the first device to prompt that the first device has logged in. The login and logout procedures of other devices may also be performed using similar procedures.
In this embodiment, different devices may be identified by an IP address, or may be identified by a MAC address, an IMEI, and an ICCID, and specifically, the example of identifying different devices by an IP address is described. Before executing the steps in the login method, a first account may be created by an administrator of the server and assigned a series of IP whitelists with the same or different priorities, and for a logged-in second device or a first device requesting login, a query may be made in the IP whitelist through its IP address to determine the priority of this device.
In step S1, the server receives the login request of the first device, and queries the priority of the first device. In step S2, the server counts the total number of all the second devices in the logged-in device list stored in the server, and queries the priority of each second device.
In step S3, the server may set a limit threshold, which limits the total number of devices logged into the first account within the same time period to not exceed, based on technical limitations or commercial interest considerations.
In step S3, if the number of the second devices reaches the limit threshold, it indicates that the total number of devices logged into the first account in the same period has reached the upper limit. The server compares the priority of each second device with the priority of the first device, marks a second device having a lower priority than the first device as a low-level target device when the second device is found to exist, and specifically may stop the comparison of the priorities after a low-level target device is found. The server controls the lower-level target device to log out of the first account, so that the total number of devices logging in the first account in the same time period is lower than the upper limit, the server controls the first device to log in the first account, the total number of devices logging in the first account in the same time period does not exceed the upper limit, and the technical or resource limit of the server or the commercial benefit of a server user can be met. By setting the priorities of the first device and the second device, for example, the priority of the first device is higher than the priority of part of the second device, so that the first device can easily and successfully log in the first account under the condition that a large number of second devices log in the first account, the influence on the use of the logged-in device and the logged-in device caused by setting the timeout duration and the like is avoided, and the requirements of different aspects such as technical or resource limitation of a server or commercial benefits of a server user can be considered. The second device may be used as a device for routine maintenance or routine use and the first device may be used as a device for emergency use or special use, thereby broadening the application flexibility in a single account, multi-device environment.
Referring to fig. 1, in case the number of second devices reaches the limit threshold, the login method further comprises the steps of:
and S4, when the low-level target equipment is not detected from the second equipment, maintaining the login state of the second equipment to the first account, and rejecting the login request of the first equipment.
In step S4, if the priorities of all the second devices, that is, the devices that have logged into the first account, are not lower than the priority of the first device, then the low-level target device does not exist in each second device, and therefore the steps of controlling the low-level target device to log out of the first account and controlling the first device to log into the first account cannot be performed. Since the server maintains the login status of each second device to the first account and rejects the login request of the first device, each second device still logs in the first account after step S4 is executed, and the first device does not log in the first account.
Step S4 realizes, together with steps S1-S3, that the devices are managed by priority, so that the urgency of use of the devices can be arranged according to the priority of the devices.
Referring to fig. 1, in case the number of second devices does not reach the limit threshold, the login method further comprises the steps of:
and S5, when the number of the second equipment does not reach the limit threshold value, maintaining the login state of each second equipment to the first account, and controlling the first equipment to log in the first account.
In step S5, if the number of the second devices does not reach the limit threshold, it indicates that the total number of the devices logged into the first account in the same time period does not reach the upper limit of the server, so the server may directly allow the first device to log into the first account without comparing the priority level relationship between the first device and the second device.
Referring to fig. 1, in case the number of second devices reaches the limit threshold, the login method further comprises the steps of:
s6, when the low-level target equipment is not detected from the second equipment, but at least one level target equipment is detected from the second equipment, forwarding a login request to the at least one level target equipment;
and S7, when detecting that the level target equipment accepts the login request, controlling the level target equipment accepting the login request to log out of the first account, and controlling the first equipment to log in the first account.
In step S6, in the case where the server does not detect a low-level target device from among the second devices, that is, all the second devices have priorities not lower than that of the first device, the server compares the priorities of the second devices with the priority of the first device, and when a second device having the same priority as that of the first device is found, marks this second device as a low-level target device, specifically, the detection of a low-level target device may be performed at the same time as the detection of the low-level target device.
In step S6, the server may detect one or more flat target devices, and the server may forward the login request of the first device to one or more of the flat target devices. After the flat target device receives the login request, information indicating acceptance or rejection of the login request of the first device may be fed back to the server. The level target device accepts the login request of the first device and indicates that the level target device is willing to log out of the first account, so that the total number of devices which log in the first account in the same time period is lower than the upper limit of the server, and the first device logs in the first account. In step S7, the server may control the hierarchical target device that accepts the login request to log out of the first account, and control the first device to log in to the first account.
If no flat target device accepts the first device's login request, i.e., all flat target devices reject the first device's login request, indicating that no flat target device is willing to log out of the first account, then the server keeps each second device continuing to log into the first account, rejecting the first device's login request, in order to keep the total number of devices logged into the first account within the same time period not exceeding the server's upper limit.
By performing steps S6 and S7, interactivity between the logged-in device and the logged-out device can be increased, thereby increasing the login success rate of the first device.
Referring to fig. 1, in case the number of second devices reaches the limit threshold, the login method further comprises the steps of:
s8, when the low-level target equipment is not detected from the second equipment, but at least one level target equipment is detected from the second equipment, forwarding a login request to the at least one level target equipment; the level target device is a second device with the same priority as the first device;
and S9, when detecting that the level target equipment accepts the login request, controlling the level target equipment accepting the login request to share the login first account with the first equipment.
Steps S8-S9 correspond to alternative steps to steps S6-S7, wherein the principle of step S8 is the same as that of step S6, all of which are to detect a flat target device. In step S9, the hierarchical target device that received the login request is controlled not to log out of the first account as in step S7, but to share the login first account with the first device, so that both the hierarchical target device that received the login request and the first device can use the function of the first account.
Specifically, the step of controlling the level target device accepting the login request to share the login first account with the first device includes the following steps:
S901A, controlling the level target device which receives the login request to log out of the first account, and controlling the first device to log in the first account;
S902A, establishing remote sharing control connection between the first device and the level target device which receives the login request.
Specifically, the step of controlling the flat target device accepting the login request to share the login first account with the first device may further include the steps of:
S901B, maintaining the login state of the level target device which receives the login request to the first account;
and S901B, establishing a remote sharing control connection between the first device and the level target device which receives the login request.
Steps S901A-S902A and steps S901B-S902B both implement sharing of the first account between the level target device accepting the login request and the first device by establishing a remote sharing control connection between the first device and the level target device accepting the login request. Specifically, in step S901A, the first account is logged out by the hierarchical target device accepting the login request, the hierarchical target device accepting the login request is taken over by the first device to log in the first account, and in step S902A, the desktop may be shared by the first device to the hierarchical target device accepting the login request, and partial control is opened to the hierarchical target device accepting the login request, so that the hierarchical target device accepting the login request can use the first account through the first device. In step S901B, the hierarchical target device that accepts the login request still keeps logging in to the first account, and the first device does not log in to the first account, in step S902B, the hierarchical target device that accepts the login request may share the desktop with the first device, and open partial control to the first device, so that the first device can use the first account through the hierarchical target device that accepts the login request.
Specifically, the step of controlling the level target device accepting the login request to share the login first account with the first device includes the following steps:
S901C, maintaining the login state of the level target device which receives the login request to the first account;
S902C, controlling the first equipment to log in the first account;
S903C, acquiring a first function permission set of a first account;
S904C, opening the first part of function authority to the first device, and opening the second part of function authority to the level target device which receives the login request; the first part of function authority and the second part of function authority are respectively subsets of the first function authority set.
In steps S901C-S904C, step S901C allows the flat target device accepting the login request to continue to log in to the first account, and step S902C allows the first device to log in to the first account. In step S903C, a first function permission set of the first account is obtained, specifically, the service provider may set the first function permission set of the first account in the server, for example, the provider of the network video service may set the first function permission set of the first account to include advertisement-free video, advance on demand, pop-up video, upload video, and the like. The server divides the first function permission set into a first part of function permissions and a second part of function permissions, for example, the two function permissions of advertisement-free video watching and advance video on demand are divided into the first part of function permissions, the two function permissions of bullet-sending and video uploading are divided into the second part of function permissions, the first part of function permissions are opened to the first device, and the second part of function permissions are opened to the level target device which receives the login request.
By executing steps S901C-S904C, although both the hierarchical target device and the first device that accepted the login request are logged in the first account, and the total upper limit of the devices logged in the first account in the same period of time is broken, by assigning the function of the first account to the hierarchical target device and the first device that accepted the login request, it is possible to avoid overloading the server that serves the hierarchical target device and the first device that accepted the login request, and it is possible to equivalently maintain the total upper limit of the devices logged in the first account in the same period of time.
Referring to fig. 1, after controlling the low-level target device to log out of the first account, the login method further includes the steps of:
and S10, controlling the low-level target equipment to log in a second account.
In this embodiment, after controlling the low-level target device to log out of the first account, the server may control the low-level target device to log in to the second account, and provide the function authority of the second account to the low-level target device. And the second function permission set of the second account is a subset of the first function permission set of the first account. For example, if the first set of function permissions possessed by the first account is set to include advertisement-free video, advanced video on demand, pop-up screen, upload video, etc., then the second set of function permissions possessed by the second account may be set to include advertisement-free video, advanced video on demand, pop-up screen, etc.
By executing step S10, it is possible to avoid the lower-level target device from being disabled after logging out of the first account, and by limiting the second function right opened to the second account, it is possible to avoid overloading the server that provides services to the lower-level target device, which is equivalent to maintaining the upper limit of the total number of devices that log in to the first account within the same period of time.
Referring to fig. 1, the login method further includes the steps of:
s11, when the fact that the first device logs out of the first account is detected, the low-level target device is controlled to be switched from logging in the second account to logging in the first account.
The server may keep a regular check whether the first device is logged out of the first account. When detecting that the first device logs in the first account, the number of the devices which have logged in the first account is lower than the total upper limit of the devices which log in the first account in the same time period, the server may control the low-level target device to switch from logging in the second account to logging in the first account, that is, recover the logging in of the low-level target device to the first account, so that the low-level target device can enjoy the complete function permission of the first account.
The qos parameter allocation method in the present embodiment may be implemented by writing a computer program for implementing the qos parameter allocation method in the present embodiment, writing the computer program into a computer device or a storage medium, and executing the qos parameter allocation method in the present embodiment when the computer program is read out and run, thereby achieving the same technical effects as the qos parameter allocation method in the embodiment.
While the preferred embodiments of the present invention have been illustrated and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
It should be noted that, unless otherwise specified, when a feature is referred to as being "fixed" or "connected" to another feature, it may be directly fixed or connected to the other feature or indirectly fixed or connected to the other feature. Furthermore, the descriptions of upper, lower, left, right, etc. used in the present disclosure are only relative to the mutual positional relationship of the constituent parts of the present disclosure in the drawings. As used in this disclosure, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. In addition, unless defined otherwise, all technical and scientific terms used in this example have the same meaning as commonly understood by one of ordinary skill in the art. The terminology used in the description of the embodiments herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this embodiment, the term "and/or" includes any combination of one or more of the associated listed items.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element of the same type from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present disclosure. The use of any and all examples, or exemplary language ("e.g.," such as "or the like") provided with this embodiment is intended merely to better illuminate embodiments of the invention and does not pose a limitation on the scope of the invention unless otherwise claimed.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner, according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, operations of processes described in this embodiment can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described in this embodiment (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optically read and/or write storage medium, RAM, ROM, or the like, such that it may be read by a programmable computer, which when read by the storage medium or device, is operative to set up and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described in this embodiment includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein.
A computer program can be applied to input data to perform the functions described in the present embodiment to convert the input data to generate output data that is stored to a non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and any modifications, equivalent substitutions, improvements, etc. within the spirit and principle of the present invention should be included in the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.

Claims (10)

1. A login method, comprising:
acquiring a login request and priority of first equipment; the login request is used for requesting to login a first account;
acquiring the number and the priority of the second equipment; the second device is a device which is logged in the first account;
when the number of the second devices reaches a limit threshold and at least one low-level target device is detected from each second device, controlling the low-level target device to log out of the first account and controlling the first device to log in the first account; the low-level target device is a second device having a lower priority than the first device.
2. The login method according to claim 1, wherein when the number of the second devices reaches a limit threshold, the login method further comprises:
when the low-level target device is not detected from the second devices, the login state of the second devices to the first account is maintained, and the login request of the first device is rejected.
3. The login method according to claim 1, wherein when the number of the second devices reaches a limit threshold, the login method further comprises:
forwarding the login request to at least one of the flat target devices when the low-level target device is not detected from each of the second devices but at least one flat target device is detected from each of the second devices; the level target device is a second device with the same priority as the first device;
when the fact that the horizontal target device accepts the login request is detected, the horizontal target device accepting the login request is controlled to log out of the first account, and the first device is controlled to log in the first account.
4. The login method according to claim 2 or 3, wherein when the number of the second devices reaches a limit threshold, the login method further comprises:
forwarding the login request to at least one of the flat target devices when the low-level target device is not detected from each of the second devices but at least one flat target device is detected from each of the second devices; the level target device is a second device with the same priority as the first device;
when detecting that the flat target equipment accepts the login request, controlling the flat target equipment accepting the login request to share with the first equipment to log in the first account.
5. The login method according to claim 4, wherein the controlling of the hierarchical target device accepting the login request to share the login with the first device to the first account comprises:
controlling the level target device accepting the login request to log out of the first account, and controlling the first device to log in the first account;
establishing a remote shared control connection between the first device and the flat target device accepting the login request;
or
Maintaining a login status of the flat target device accepting the login request to the first account;
establishing a remote shared control connection between the first device and the flat target device accepting the login request;
or
Maintaining a login status of the flat target device accepting the login request to the first account;
controlling the first device to log in the first account;
acquiring a first function permission set of the first account;
opening a first part of function authority to the first equipment, and opening a second part of function authority to the flat target equipment which receives the login request; the first part of function permission and the second part of function permission are respectively subsets of the first function permission set.
6. A login method according to any one of claims 1-3, wherein the login method further comprises:
and when the number of the second equipment does not reach the limit threshold value, maintaining the login state of each second equipment to the first account, and controlling the first equipment to log in the first account.
7. A login method according to any one of claims 1-3, wherein after controlling the low-level target device to log out of the first account, the login method further comprises:
controlling the low-level target device to log in a second account; the second account has a second set of functional permissions, the first account has a first set of functional permissions, and the second set of functional permissions is a subset of the first set of functional permissions.
8. The login method according to claim 7, wherein the login method further comprises:
and when the first device is detected to log out of the first account, controlling the low-level target device to switch from logging in the second account to logging in the first account.
9. A computer apparatus comprising a memory for storing at least one program and a processor for loading the at least one program to perform the method of any one of claims 1-8.
10. A storage medium having stored therein processor-executable instructions, which when executed by a processor, are configured to perform the method of any one of claims 1-8.
CN202111043319.9A 2021-09-07 2021-09-07 Login method, computer device and storage medium Active CN113839931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111043319.9A CN113839931B (en) 2021-09-07 2021-09-07 Login method, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111043319.9A CN113839931B (en) 2021-09-07 2021-09-07 Login method, computer device and storage medium

Publications (2)

Publication Number Publication Date
CN113839931A true CN113839931A (en) 2021-12-24
CN113839931B CN113839931B (en) 2022-06-28

Family

ID=78958533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111043319.9A Active CN113839931B (en) 2021-09-07 2021-09-07 Login method, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN113839931B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114139135A (en) * 2022-02-08 2022-03-04 深圳希施玛数据科技有限公司 Equipment login management method, device and storage medium
CN115001747A (en) * 2022-04-29 2022-09-02 北京奇艺世纪科技有限公司 Device control method, device, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130124447A (en) * 2012-05-06 2013-11-14 주식회사 씽크풀 Intelligent login authentication system and method thereof
CN105847277A (en) * 2016-04-29 2016-08-10 乐视控股(北京)有限公司 Service account share management method and system used for third party application
CN106453527A (en) * 2016-09-27 2017-02-22 北京小米移动软件有限公司 Account sharing method and equipment
CN113343217A (en) * 2021-07-05 2021-09-03 湖南快乐阳光互动娱乐传媒有限公司 Account login limiting method and device, storage medium and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130124447A (en) * 2012-05-06 2013-11-14 주식회사 씽크풀 Intelligent login authentication system and method thereof
CN105847277A (en) * 2016-04-29 2016-08-10 乐视控股(北京)有限公司 Service account share management method and system used for third party application
CN106453527A (en) * 2016-09-27 2017-02-22 北京小米移动软件有限公司 Account sharing method and equipment
CN113343217A (en) * 2021-07-05 2021-09-03 湖南快乐阳光互动娱乐传媒有限公司 Account login limiting method and device, storage medium and equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114139135A (en) * 2022-02-08 2022-03-04 深圳希施玛数据科技有限公司 Equipment login management method, device and storage medium
CN115001747A (en) * 2022-04-29 2022-09-02 北京奇艺世纪科技有限公司 Device control method, device, electronic device and storage medium
CN115001747B (en) * 2022-04-29 2024-03-01 北京奇艺世纪科技有限公司 Equipment control method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113839931B (en) 2022-06-28

Similar Documents

Publication Publication Date Title
WO2021051878A1 (en) Cloud resource acquisition method and apparatus based on user permission, and computer device
JP6895431B2 (en) Passwordless authentication for access control
US11283805B2 (en) Cloud device account configuration method, apparatus and system, and data processing method
CN113839931B (en) Login method, computer device and storage medium
US10158670B1 (en) Automatic privilege determination
US20170237729A1 (en) Securing user-accessed applications in a distributed computing environment
US20190253425A1 (en) Dynamic Passcodes in Association with a Wireless Access Point
US20170277910A1 (en) Application permission settings
US8640190B1 (en) Parental control policy generation
EP3047626A1 (en) Multiple resource servers with single, flexible, pluggable oauth server and oauth-protected restful oauth consent management service, and mobile application single sign on oauth service
US20230032802A1 (en) Methods and systems for connecting to a wireless network
US11470120B2 (en) Providing different levels of resource access to a computing device that is connected to a dock
CN112653681B (en) Multi-feature fusion user login access method, device and system
KR101887426B1 (en) Apparatus and method for ensuring privacy in contents sharing system
US10581923B2 (en) System and method for configuration of a connected device connection
US10657245B2 (en) Dynamically controlling access to devices
US20220232004A1 (en) Virtual session access management
WO2015017699A2 (en) Mobile device connection control for synchronization and remote data access
CN111274596B (en) Device interaction method, authority management method, interaction device and user side
CN108494749B (en) Method, device and equipment for disabling IP address and computer readable storage medium
CN103176987A (en) Method and device for controlling database access
US20200267146A1 (en) Network analytics for network security enforcement
US20170063862A1 (en) System and method for authentication
US20150341391A1 (en) Systems and methods for serving application specific policies based on dynamic context
US20210124463A1 (en) Enterprise workspace notifications service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant