CN114401121A - Application program login method and device, electronic equipment and readable storage medium - Google Patents

Application program login method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN114401121A
CN114401121A CN202111620652.1A CN202111620652A CN114401121A CN 114401121 A CN114401121 A CN 114401121A CN 202111620652 A CN202111620652 A CN 202111620652A CN 114401121 A CN114401121 A CN 114401121A
Authority
CN
China
Prior art keywords
virtual
account
virtual account
login
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111620652.1A
Other languages
Chinese (zh)
Inventor
林晓春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202111620652.1A priority Critical patent/CN114401121A/en
Publication of CN114401121A publication Critical patent/CN114401121A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure provides an application program login method, an application program login device, electronic equipment and a readable storage medium, and relates to the technical field of computers, in particular to the technical field of application programs. The specific implementation scheme is as follows: responding to a virtual login operation triggered by a user in a non-login state, and generating a virtual login request, wherein the virtual login request carries account identification information for generating an account identification of a virtual account and authority level information for specifying an authority level of the virtual account; sending the virtual login request to a server so that the server determines a virtual account based on the account identification information and the permission level information and returns the virtual account to the terminal equipment; and receiving the virtual account returned by the server, and logging in the virtual account. In the scheme, the virtual account is provided, so that the user can use the complete function of the application program after logging in the virtual account, the requirement that the user uses the complete function of the application program in a non-logging state is met, and the use experience of the user is improved.

Description

Application program login method and device, electronic equipment and readable storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an application login method, an application login device, an electronic device, and a readable storage medium.
Background
With the rapid popularization of terminal devices, application programs running on the terminal devices are more and more abundant.
Generally, when using an application, a user needs to perform a login operation before using the full function of the application. However, in the unregistered state, the user may have a requirement for using the complete function of the application program, and how to satisfy the requirement for using the complete function of the application program in the unregistered state becomes a technical problem to be solved urgently.
Disclosure of Invention
In order to solve at least one of the above defects, the present disclosure provides an application program login method, an application program login device, an electronic device, and a readable storage medium.
According to a first aspect of the present disclosure, there is provided an application login method, the method including:
responding to a virtual login operation triggered by a user in a non-login state, and generating a virtual login request, wherein the virtual login request carries account identification information for generating an account identification of a virtual account and authority level information for specifying an authority level of the virtual account;
sending the virtual login request to a server so that the server determines a virtual account based on the account identification information and the permission level information and returns the virtual account to the terminal equipment;
and receiving the virtual account returned by the server, and logging in the virtual account.
According to a second aspect of the present disclosure, there is provided another application login method, the method including:
when a virtual login request sent by a terminal device is received, determining a virtual account based on account identification information and permission level information carried in the virtual login request, wherein the virtual login request is generated by the terminal device in response to a virtual login operation triggered by a user in a non-login state, the account identification information is used for generating an account identification of the virtual account, and the permission level information is used for specifying the permission level of the virtual account;
and returning the virtual account to the terminal equipment so that the terminal equipment logs in the virtual account.
According to a third aspect of the present disclosure, there is provided an application login apparatus, the apparatus comprising:
the virtual login request generation module is used for responding to a virtual login operation triggered by a user in a non-login state and generating a virtual login request, wherein the virtual login request carries account identification information used for generating an account identification of a virtual account and permission level information used for specifying the permission level of the virtual account;
the virtual login request sending module is used for sending a virtual login request to the server so that the server determines a virtual account based on the account identification information and the permission level information and returns the virtual account to the terminal equipment;
and the virtual login module is used for receiving the virtual account returned by the server and logging in the virtual account.
According to a fourth aspect of the present disclosure, there is provided another application login apparatus, including:
the virtual account determining module is used for determining a virtual account based on account identification information and permission level information carried in a virtual login request when the virtual login request sent by the terminal equipment is received, wherein the virtual login request is generated by the terminal equipment in response to a virtual login operation triggered by a user in a non-login state, the account identification information is used for generating an account identification of the virtual account, and the permission level information is used for specifying the permission level of the virtual account;
and the virtual account number returning module is used for returning the virtual account number to the terminal equipment so as to log the terminal equipment in the virtual account number.
According to a fifth aspect of the present disclosure, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the application login method.
According to a sixth aspect of the present disclosure, there is provided a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the above-described application login method.
According to a seventh aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the above-described application login method.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a schematic diagram of a program home page of an application program in a first scenario for a user using the application program in an unregistered state;
FIG. 2 is a schematic diagram of a program home page of an application program in a second scenario for a user using the application program in an unregistered state;
FIG. 3 is a schematic diagram of a login interface popped up when a user uses a function related to an account operation for a second scenario in which the user uses an application in an unregistered state;
fig. 4 is a flowchart illustrating an application login method according to an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of a program home page of an application provided by an embodiment of the present disclosure;
fig. 6 is a flowchart illustrating another application login method according to an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of various login states provided by embodiments of the present disclosure;
fig. 8 is a schematic structural diagram of an application login apparatus according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of another application program login device provided in the embodiment of the present disclosure;
fig. 10 is a block diagram of an electronic device for implementing an application login method of an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
At present, most of application programs except a few tool type application programs have account login functions. These applications provide two solutions for the use of users in the unregistered state: the first scheme is to prohibit the user from using any function of the application program in the non-login state; the second solution is to allow the user to use only some of the functions unrelated to account operation in the unregistered state.
A schematic diagram of a program home page of an application program of the first scheme is shown in fig. 1. As shown in fig. 1, virtual buttons such as "login", "logout", and "new user registration" are provided in the program homepage, and the user can perform a login operation by clicking the "login" virtual button, an operation of logout of the application program by clicking the "logout" virtual button, and a registration operation by clicking the "new user registration" virtual button. In the first scheme, the user can use the functions of the application only after the login operation is completed.
A schematic diagram of the program home page of the application program of the second scheme is shown in fig. 2. As shown in fig. 2, virtual buttons such as "login", "trial", and "new user registration" are provided in the program homepage, and the user can perform login operation by clicking the "login" virtual button, and can enter a trial state by clicking the "trial" virtual button, and at this time, the user can use part of the functions of the application program. The user may perform a registration operation by clicking a "new user registration" virtual button.
In the second scheme, in the trial state, the user can only use part of functions of the application program, such as browsing, forwarding and the like, and the functions related to account operation, such as praise, comment, collection and the like, cannot be used by the user.
A diagram of a login interface popped up when a user uses a function related to an account operation in the second scenario is shown in fig. 3. As shown in fig. 3, virtual buttons such as "login", "continue trial", and "new user registration" are provided in the login interface, and the user can perform login operation by clicking the "login" virtual button, and then can use the full functions of the application program. The user may continue to try out portions of the functionality of the application by clicking on the "continue to try out" virtual button. The user may perform a registration operation by clicking a "new user registration" virtual button.
When the user uses the function related to the account operation, a login interface as shown in fig. 3 pops up, and the user can continue to use the account operation after logging in. If the login interface pops up frequently, the use experience of the user is affected.
The application program login method, device, electronic device and readable storage medium provided by the embodiments of the present application aim to solve at least one of the above technical problems in the prior art.
Fig. 4 shows a flowchart of an application login method provided in an embodiment of the present disclosure, and as shown in fig. 4, the method mainly includes:
step S410: responding to a virtual login operation triggered by a user in a non-login state, and generating a virtual login request, wherein the virtual login request carries account identification information for generating an account identification of a virtual account and authority level information for specifying an authority level of the virtual account;
step S420: sending the virtual login request to a server so that the server determines a virtual account based on the account identification information and the permission level information and returns the virtual account to the terminal equipment;
step S430: and receiving the virtual account returned by the server, and logging in the virtual account.
In the disclosed embodiments, the application may provide a virtual login state, so that the user can use all functions of the application in the virtual login state. The virtual account is an account used by the user in the virtual login state, and the user can use functions related to account operation, such as praise, comment, collection and the like, based on the virtual account.
The user can trigger the virtual login operation in the non-login state, so that the terminal equipment generates a virtual login request and sends the virtual login request to the server. The virtual login request carries account identification information and authority level information. The server can determine the account identification of the virtual account based on the account identification information, and determine the authority level information of the virtual account based on the authority level information, so as to complete the operation of determining the virtual account.
After the server determines the virtual account, the server can return the virtual account to the terminal device, the terminal device can log in to the virtual account and then enter a virtual login state, and at this time, the user can experience all functions of the application program.
The method provided by the embodiment of the disclosure generates a virtual login request by responding to a virtual login operation triggered by a user in a non-login state, wherein the virtual login request carries account identification information for generating an account identification of a virtual account and permission level information for specifying a permission level of the virtual account, and the virtual login request is sent to a server so that the server determines the virtual account based on the account identification information and the permission level information; and receiving the virtual account returned by the server, and logging in the virtual account. In the scheme, the virtual account is provided, so that the user can use the complete function of the application program after logging in the virtual account, the requirement that the user uses the complete function of the application program in a non-logging state is met, and the use experience of the user is improved.
In the embodiment of the disclosure, the user can use the complete function of the application program in the virtual login state, and the login interface cannot be popped up when the function related to account operation is used, so that the influence on the use experience of the user due to frequent popping of the login interface is avoided.
In the embodiment of the present disclosure, multiple permission levels may be set, and account configurations with different permission levels have different functional permissions, for example: the accounts with different permission levels may correspond to different upper limit numbers of the daily issue, for example: accounts with high permission levels can use artificial intelligence to assist in authoring.
The user can select the permission level when the virtual account number is selected, so that the function corresponding to the permission level is tried out. The virtual accounts with different permission levels are provided for the user to try out, so that the user can experience permission changes with different permission levels, and the user can select permission levels meeting the requirements of the user.
In the embodiment of the disclosure, because the terminal device automatically generates the virtual login request carrying the account identification information and the permission level information, the user does not need to manually set a user name (namely, an account identification) and a password, and the server does not need to verify the account password, the operation of determining the virtual account can be rapidly completed, the operation of the user is facilitated, and the registration and login processes are faster.
In an optional manner of the present disclosure, the virtual login operation includes:
triggering operation of a target virtual login control in the displayed at least one virtual login control by a user;
generating a virtual login request, comprising:
acquiring authority level information corresponding to the target virtual login control;
a virtual login request is generated based on the permission level information.
In the embodiment of the disclosure, a plurality of virtual login controls can be displayed in a program homepage of an application program, and each virtual login control can correspond to different authority level information. For example, the virtual login control may display information such as "virtual login-level 1", "virtual login-level 2", and the like, where level 1 and level 2 are authority level information.
The user can select a virtual login control corresponding to the required experience authority level from a plurality of virtual login controls displayed in a program homepage of the application program, namely a target virtual login control, and the virtual login operation is completed by clicking the target virtual login control. The terminal device can generate the virtual login request based on the permission level information corresponding to the acquired target virtual login control.
In an optional mode of the present disclosure, the method further includes:
and sending the operation data of the user in the login state of the virtual account to the server so that the server stores the operation data in association with the virtual account.
In the embodiment of the present disclosure, the operation data in the virtual login state may include operation data related to account operation, such as operation data corresponding to operation of like, comment, collection, or may not include operation data related to account operation, such as operation data corresponding to operation of browsing.
And the operation data in the virtual login state can be sent to the server to be stored in association with the virtual account. The operation data in the virtual login state can be used as temporary data, stored in an independent temporary database table and not associated with the operation data of the real account.
When the user views the related data of the virtual account, such as viewing praise and the like, the terminal device may request the server for the related data of the virtual account.
In an optional mode of the present disclosure, the method further includes:
and if the login operation of the real account is triggered by the login state of the user in the virtual account, generating a real login request and sending the virtual login request to the server.
In the embodiment of the disclosure, a user can trigger login operation on a real account in a virtual login state, and then submits login information such as the real account and a login password to login to the real account.
In an optional manner of the present disclosure, the account identification information includes a device identification of the terminal device.
In this embodiment of the present disclosure, the account identification information may be a device identification of the terminal device. In actual use, the device identifier may be directly used as an account identifier of the virtual account, or the device identifier may be converted into the account identifier of the virtual account based on a predetermined rule. The account identification of the virtual account is generated based on the equipment identification of the terminal equipment, so that the virtual account can be identified through the equipment identification, the association between the virtual account and the terminal equipment can be established, and the management of the virtual account is facilitated.
As an example, a schematic diagram of a program home page of an application provided by the embodiment of the present disclosure is shown in fig. 5. As shown in fig. 5, virtual buttons such as "login", "deep experience", and "new user registration" are provided in the program homepage, and the user can perform login operation by clicking the "login" virtual button, perform virtual login operation by clicking the "deep experience", and then enter a virtual login state. The method comprises the steps of logging in within 24 hours and recovering experience data, namely prompting a user to dump operation data (experience data) in a virtual login state into operation data of a real account if the user logs in to the real account within 24 hours.
Fig. 6 shows a flowchart of another application login method provided in the embodiment of the present disclosure, and as shown in fig. 6, the method mainly includes:
step S610: when a virtual login request sent by a terminal device is received, determining a virtual account based on account identification information and permission level information carried in the virtual login request, wherein the virtual login request is generated by the terminal device in response to a virtual login operation triggered by a user in a non-login state, the account identification information is used for generating an account identification of the virtual account, and the permission level information is used for specifying the permission level of the virtual account;
step S620: and returning the virtual account to the terminal equipment so that the terminal equipment logs in the virtual account.
In the disclosed embodiments, the application may provide a virtual login state, so that the user can use all functions of the application in the virtual login state. The virtual account is an account used by the user in the virtual login state, and the user can use functions related to account operation, such as praise, comment, collection and the like, based on the virtual account.
The user can trigger the virtual login operation in the non-login state, so that the terminal equipment generates a virtual login request and sends the virtual login request to the server. The virtual login request carries account identification information and authority level information. The server can determine the account identification of the virtual account based on the account identification information, and determine the authority level information of the virtual account based on the authority level information, so as to complete the operation of determining the virtual account.
After the server determines the virtual account, the server can return the virtual account to the terminal device, the terminal device can log in to the virtual account and then enter a virtual login state, and at this time, the user can experience all functions of the application program.
According to the method provided by the embodiment of the disclosure, when a virtual login request sent by a terminal device is received, a virtual account is determined based on account identification information and permission level information carried in the virtual login request, the virtual login request is generated by the terminal device in response to a virtual login operation triggered by a user in a non-login state, the account identification information is used for generating an account identification of the virtual account, the permission level information is used for specifying the permission level of the virtual account, and the virtual account is returned to the terminal device so that the terminal device can log in the virtual account. In the scheme, the virtual account is provided, so that the user can use the complete function of the application program after logging in the virtual account, the requirement that the user uses the complete function of the application program in a non-logging state is met, and the use experience of the user is improved.
In the embodiment of the disclosure, the user can use the complete function of the application program in the virtual login state, and the login interface cannot be popped up when the function related to account operation is used, so that the influence on the use experience of the user due to frequent popping of the login interface is avoided.
In the embodiment of the present disclosure, multiple permission levels may be set, and account configurations with different permission levels have different functional permissions, for example: the accounts with different permission levels may correspond to different upper limit numbers of the daily issue, for example: accounts with high permission levels can use artificial intelligence to assist in authoring.
The user can select the permission level when the virtual account number is selected, so that the function corresponding to the permission level is tried out. The virtual accounts with different permission levels are provided for the user to try out, so that the user can experience permission changes with different permission levels, and the user can select permission levels meeting the requirements of the user.
In the embodiment of the disclosure, because the terminal device automatically generates the virtual login request carrying the account identification information and the permission level information, the user does not need to manually set a user name (namely, an account identification) and a password, and the server does not need to verify the account password, the operation of determining the virtual account can be rapidly completed, the operation of the user is facilitated, and the registration and login processes are faster.
In an optional manner of the present disclosure, determining a virtual account based on account identification information and permission level information carried in a virtual login request includes:
determining whether a historical virtual account with the same account identification as the virtual account exists or not based on account identification information carried in the virtual login request;
the virtual account number is determined based on whether a historical virtual account number exists that is the same as the account number identification of the virtual account number.
In the embodiment of the present disclosure, the history virtual account may be a virtual account that has been logged in, and the server may temporarily store the history virtual account, for example, store the virtual account and associated operation data within a preset time limit, as the history virtual account.
The account identification information can be used to determine the account identification of the virtual account, and thus it can be determined whether there is a historical virtual account that is the same as the account identification of the virtual account based on the account identification information. The virtual account number may then be determined based on whether there is a historical virtual account number with the same account number identity as the virtual account number.
In an optional manner of the present disclosure, determining a virtual account number based on whether the virtual account number has the same authority level as a historical virtual account number includes:
if no historical virtual account with the same account identification as the virtual account exists, establishing the virtual account based on the account identification information and the permission level information;
if a historical virtual account with the same account identification as the virtual account exists, determining whether the virtual account has the same authority level as the historical virtual account or not based on the authority level information, and determining the virtual account based on whether the virtual account has the same authority level as the historical virtual account or not.
In the embodiment of the present disclosure, if there is no historical virtual account with the same account identification as the virtual account, it may be considered that there is no historical virtual account with the same virtual account to be created currently, and at this time, the virtual account may be created based on the account identification information and the permission level information.
If a historical virtual account with the same account identification as the virtual account exists, whether the virtual account has the same authority level as the historical virtual account can be determined based on the authority level information, and the virtual account is determined based on whether the virtual account has the same authority level as the historical virtual account.
In an optional manner of the present disclosure, determining a virtual account number based on whether the virtual account number has the same authority level as a historical virtual account number includes:
if the virtual account number and the historical virtual account number have the same authority level, taking the historical virtual account number as the virtual account number;
and if the virtual account and the historical virtual account do not have the same authority level, creating the virtual account based on the account identification information and the authority level information.
In the embodiment of the present disclosure, under the condition that the account id of the virtual account is the same as that of the historical virtual account, if the virtual account and the historical virtual account have the same authority level, the historical virtual account and the historical virtual account may be considered as the same account, and the current virtual account is logged in and used within a preset time limit, so that the historical virtual account may be used as the virtual account.
Under the condition that the account identifications of the virtual account and the historical virtual account are the same, if the permission levels of the virtual account and the historical virtual account are different, the historical virtual account and the historical virtual account are not the same, and the virtual account can be created based on the account identification information and the permission level information.
In an optional mode of the present disclosure, the method further includes:
and if the user logs in to the real account in the login state of the virtual account, binding the operation data associated with the virtual account logged in through the terminal equipment with the real account.
In the embodiment of the disclosure, a user can log in to a real account in a login state of a virtual account, the real account and the virtual account which are logged in through the same terminal device can be regarded as having an association relationship, and then operation data associated with the virtual account which is logged in through the same terminal device is bound with the real account, so that temporary operation data is dumped into normal operation data.
In an optional mode of the present disclosure, the method further includes:
and if the operation data associated with the virtual account is not bound with the real account within the preset time limit, deleting the virtual account and the operation data associated with the virtual account.
In this embodiment of the disclosure, the operation data associated with the virtual account may be stored for a preset time limit, for example, 24 hours, and the operation data associated with the virtual account may be deleted if the operation data associated with the virtual account is not bound to the real account within the preset time limit.
As an example, a schematic diagram of various login states provided by embodiments of the present disclosure is shown in fig. 7.
As shown in fig. 7, the login state may include an unregistered state, a pseudo login state (i.e., a virtual login state), and a login state.
The account information, namely related information related to account operation, includes account information of a real account and account information of non-account information. The account information of the real account and the account information of the non-account information are stored independently. Non-account information, i.e. related information not related to account operations.
In this example, only non-account information can be acquired in the unregistered state. And the non-account information and the account information of the virtual account can be acquired in the pseudo login state. The non-account information and the account information can be acquired in the login state.
The operation data generated in the login state is stored as normal data. And the operation data generated in the pseudo login state is stored as temporary data, and if the operation data is logged in the real account in time after the use result, the temporary data is dumped into normal data. If the temporary data is not logged in for more than 24 hours (namely, a preset period), the temporary data is deleted due to expiration.
Based on the same principle as the method shown in fig. 4, fig. 8 shows a schematic structural diagram of an application login apparatus provided by the embodiment of the present disclosure, and as shown in fig. 8, the application login apparatus 80 may include:
a virtual login request generating module 810, configured to generate a virtual login request in response to a virtual login operation triggered by a user in a non-login state, where the virtual login request carries account id information for generating an account id of a virtual account and permission level information for specifying a permission level of the virtual account;
a virtual login request sending module 820, configured to send a virtual login request to a server, so that the server determines a virtual account based on the account identification information and the permission level information, and returns the virtual account to the terminal device;
the virtual login module 830 is configured to receive a virtual account returned by the server, and log in to the virtual account.
According to the device provided by the embodiment of the disclosure, a virtual login request is generated by responding to a virtual login operation triggered by a user in a non-login state, the virtual login request carries account identification information for generating an account identification of a virtual account and authority level information for specifying the authority level of the virtual account, and the virtual login request is sent to a server so that the server determines the virtual account based on the account identification information and the authority level information; and receiving the virtual account returned by the server, and logging in the virtual account. In the scheme, the virtual account is provided, so that the user can use the complete function of the application program after logging in the virtual account, the requirement that the user uses the complete function of the application program in a non-logging state is met, and the use experience of the user is improved.
Optionally, the virtual login operation includes:
triggering operation of a target virtual login control in the displayed at least one virtual login control by a user;
the virtual login request generation module is specifically configured to, when generating a virtual login request:
acquiring authority level information corresponding to the target virtual login control;
a virtual login request is generated based on the permission level information.
Optionally, the apparatus further comprises:
and the operation data storage module is used for sending the operation data of the user in the login state of the virtual account to the server so as to enable the server to store the operation data and the virtual account in a correlation manner.
Optionally, the apparatus further comprises:
and the real login module is used for generating a real login request and sending the virtual login request to the server when the login operation of the real account is triggered by the login state of the user in the virtual account.
Optionally, the account identification information includes a device identification of the terminal device.
It is understood that the above modules of the application login apparatus in the embodiment of the present disclosure have functions of implementing the corresponding steps of the application login method in the embodiment shown in fig. 4. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above. The modules can be software and/or hardware, and each module can be implemented independently or by integrating a plurality of modules. For the functional description of each module of the application program login apparatus, reference may be specifically made to the corresponding description of the application program login method in the embodiment shown in fig. 4, which is not described herein again.
Based on the same principle as the method shown in fig. 6, fig. 9 shows a schematic structural diagram of another application login device provided by the embodiment of the present disclosure, and as shown in fig. 9, the application login device 90 may include:
a virtual account determining module 910, configured to determine, when a virtual login request sent by a terminal device is received, a virtual account based on account identification information and permission level information carried in the virtual login request, where the virtual login request is generated by the terminal device in response to a virtual login operation triggered by a user in a non-login state, the account identification information is used to generate an account identification of the virtual account, and the permission level information is used to specify a permission level of the virtual account;
the virtual account returning module 920 is configured to return the virtual account to the terminal device, so that the terminal device logs in to the virtual account.
According to the device provided by the embodiment of the disclosure, when a virtual login request sent by a terminal device is received, a virtual account is determined based on account identification information and permission level information carried in the virtual login request, the virtual login request is generated by the terminal device in response to a virtual login operation triggered by a user in a non-login state, the account identification information is used for generating an account identification of the virtual account, the permission level information is used for specifying the permission level of the virtual account, and the virtual account is returned to the terminal device so that the terminal device can log in the virtual account. In the scheme, the virtual account is provided, so that the user can use the complete function of the application program after logging in the virtual account, the requirement that the user uses the complete function of the application program in a non-logging state is met, and the use experience of the user is improved.
Optionally, when determining the virtual account based on the account identification information and the permission level information carried in the virtual login request, the virtual account determining module is specifically configured to:
determining whether a historical virtual account with the same account identification as the virtual account exists or not based on account identification information carried in the virtual login request;
the virtual account number is determined based on whether a historical virtual account number exists that is the same as the account number identification of the virtual account number.
Optionally, when determining the virtual account based on whether there is a historical virtual account with the same account identifier as the virtual account, the virtual account determining module is specifically configured to:
if no historical virtual account with the same account identification as the virtual account exists, establishing the virtual account based on the account identification information and the permission level information;
if a historical virtual account with the same account identification as the virtual account exists, determining whether the virtual account has the same authority level as the historical virtual account or not based on the authority level information, and determining the virtual account based on whether the virtual account has the same authority level as the historical virtual account or not.
Optionally, when determining the virtual account based on whether the virtual account has the same authority level as the historical virtual account, the virtual account determining module is specifically configured to:
if the virtual account number and the historical virtual account number have the same authority level, taking the historical virtual account number as the virtual account number;
and if the virtual account and the historical virtual account do not have the same authority level, creating the virtual account based on the account identification information and the authority level information.
Optionally, the apparatus further comprises:
and the operation data binding module is used for binding the operation data associated with the virtual account logged in through the terminal equipment with the real account when the user logs in to the real account in the login state of the virtual account.
Optionally, the apparatus further comprises:
and the operation data deleting module is used for deleting the virtual account and the operation data associated with the virtual account when the operation data associated with the virtual account is not bound with the real account within a preset time limit.
It is understood that the above modules of the application login apparatus in the embodiment of the present disclosure have functions of implementing the corresponding steps of the application login method in the embodiment shown in fig. 6. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above. The modules can be software and/or hardware, and each module can be implemented independently or by integrating a plurality of modules. For the functional description of each module of the above application program login apparatus, reference may be specifically made to the corresponding description of the application program login method in the embodiment shown in fig. 6, and details are not described here again.
In the technical scheme of the disclosure, the collection, storage, use, processing, transmission, provision, disclosure and other processing of the personal information of the related user are all in accordance with the regulations of related laws and regulations and do not violate the good customs of the public order.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
The electronic device includes: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the application program login method provided by the embodiment of the disclosure.
Compared with the prior art, the electronic equipment generates a virtual login request by responding to a virtual login operation triggered by a user in a non-login state, wherein the virtual login request carries account identification information for generating an account identification of a virtual account and authority level information for specifying the authority level of the virtual account, and the virtual login request is sent to a server so that the server determines the virtual account based on the account identification information and the authority level information; and receiving the virtual account returned by the server, and logging in the virtual account. In the scheme, the virtual account is provided, so that the user can use the complete function of the application program after logging in the virtual account, the requirement that the user uses the complete function of the application program in a non-logging state is met, and the use experience of the user is improved.
The readable storage medium is a non-transitory computer readable storage medium storing computer instructions for causing a computer to execute the application login method provided by the embodiment of the present disclosure.
Compared with the prior art, the readable storage medium generates a virtual login request in response to a virtual login operation triggered by a user in a non-login state, wherein the virtual login request carries account identification information for generating an account identification of a virtual account and permission level information for specifying the permission level of the virtual account, and the virtual login request is sent to a server so that the server determines the virtual account based on the account identification information and the permission level information; and receiving the virtual account returned by the server, and logging in the virtual account. In the scheme, the virtual account is provided, so that the user can use the complete function of the application program after logging in the virtual account, the requirement that the user uses the complete function of the application program in a non-logging state is met, and the use experience of the user is improved.
The computer program product comprises a computer program which, when executed by a processor, implements an application login method as provided by embodiments of the present disclosure.
Compared with the prior art, the computer program product generates a virtual login request by responding to a virtual login operation triggered by a user in a non-login state, wherein the virtual login request carries account identification information used for generating an account identification of a virtual account and authority level information used for specifying the authority level of the virtual account, and the virtual login request is sent to a server so that the server determines the virtual account based on the account identification information and the authority level information; and receiving the virtual account returned by the server, and logging in the virtual account. In the scheme, the virtual account is provided, so that the user can use the complete function of the application program after logging in the virtual account, the requirement that the user uses the complete function of the application program in a non-logging state is met, and the use experience of the user is improved.
FIG. 10 illustrates a schematic block diagram of an example electronic device 2000 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 10, the electronic device 2000 includes a computing unit 2010, which may perform various appropriate actions and processes in accordance with a computer program stored in a Read Only Memory (ROM)2020 or a computer program loaded from a storage unit 2080 into a Random Access Memory (RAM) 2030. In the RAM 2030, various programs and data required for the operation of the device 2000 can also be stored. The computing unit 2010, ROM 2020, and RAM 2030 are coupled to each other via bus 2040. An input/output (I/O) interface 2050 is also connected to bus 2040.
Various components in device 2000 are connected to I/O interface 2050, including: an input unit 2060 such as a keyboard, a mouse, or the like; an output unit 2070 such as various types of displays, speakers, and the like; a storage unit 2080 such as a magnetic disk, an optical disk, and the like; and a communication unit 2090, such as a network card, modem, wireless communication transceiver, etc. The communication unit 2090 allows the device 2000 to exchange information/data with other devices over a computer network, such as the internet, and/or various telecommunication networks.
Computing unit 2010 may be a variety of general purpose and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 2010 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, or the like. The computing unit 2010 executes the application login method provided in the embodiment of the present disclosure. For example, in some embodiments, execution of the application login methods provided in embodiments of the present disclosure may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as the storage unit 2080. In some embodiments, some or all of the computer program may be loaded onto and/or installed onto the device 2000 via the ROM 2020 and/or the communication unit 2090. When the computer program is loaded into RAM 2030 and executed by computing unit 2010, one or more steps of the application login method provided in embodiments of the present disclosure may be performed. Alternatively, in other embodiments, the computing unit 2010 may be configured in any other suitable manner (e.g., by way of firmware) to perform the application login methods provided in embodiments of the present disclosure.
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel or sequentially or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (20)

1. An application login method, comprising:
responding to a virtual login operation triggered by a user in a non-login state, and generating a virtual login request, wherein the virtual login request carries account identification information used for generating an account identification of a virtual account and authority level information used for specifying an authority level of the virtual account;
sending the virtual login request to a server so that the server determines the virtual account based on the account identification information and the permission level information and returns the virtual account to the terminal equipment;
and receiving the virtual account returned by the server, and logging in the virtual account.
2. The method of claim 1, wherein the virtual login operation comprises:
triggering operation of a target virtual login control in the displayed at least one virtual login control by a user;
the generating of the virtual login request comprises:
acquiring authority level information corresponding to the target virtual login control;
and generating a virtual login request based on the permission level information.
3. The method of claim 1 or 2, further comprising:
and sending the operation data of the user in the login state of the virtual account to the server so that the server stores the operation data in association with the virtual account.
4. The method of any of claims 1-3, further comprising:
and if the user triggers the login operation of the real account in the login state of the virtual account, generating a real login request and sending the virtual login request to a server.
5. The method according to any one of claims 1-4, wherein the account identification information comprises a device identification of the terminal device.
6. An application login method, comprising:
when a virtual login request sent by a terminal device is received, determining a virtual account based on account identification information and permission level information carried in the virtual login request, wherein the virtual login request is generated by the terminal device in response to a virtual login operation triggered by a user in a non-login state, the account identification information is used for generating an account identification of the virtual account, and the permission level information is used for specifying a permission level of the virtual account;
and returning the virtual account to the terminal equipment so that the terminal equipment logs in the virtual account.
7. The method of claim 6, wherein the determining the virtual account based on the account identification information and the permission level information carried in the virtual login request comprises:
determining whether a historical virtual account with the same account identification as the virtual account exists or not based on account identification information carried in the virtual login request;
determining the virtual account number based on whether a historical virtual account number with the same account number identification as the virtual account number exists.
8. The method of claim 7, wherein determining the virtual account number based on whether there is a historical virtual account number with the same account number identity as the virtual account number comprises:
if no historical virtual account with the same account identification as the virtual account exists, establishing the virtual account based on the account identification information and the permission level information;
if a historical virtual account with the same account identification as that of the virtual account exists, determining whether the virtual account has the same authority level as that of the historical virtual account based on the authority level information, and determining the virtual account based on whether the virtual account has the same authority level as that of the historical virtual account.
9. The method of claim 8, the determining the virtual account number based on whether the virtual account number has the same level of permission as the historical virtual account number, comprising:
if the virtual account number and the historical virtual account number have the same authority level, taking the historical virtual account number as the virtual account number;
and if the virtual account and the historical virtual account do not have the same authority level, creating the virtual account based on the account identification information and the authority level information.
10. The method according to any one of claims 6-9, further comprising:
and if the user logs in to a real account in the login state of the virtual account, binding operation data associated with the virtual account logged in through the terminal equipment with the real account.
11. The method according to any one of claims 6-10, further comprising:
and if the operation data associated with the virtual account is not bound with the real account within a preset time limit, deleting the virtual account and the operation data associated with the virtual account.
12. An application login apparatus comprising:
the virtual login request generation module is used for responding to a virtual login operation triggered by a user in a non-login state and generating a virtual login request, wherein the virtual login request carries account identification information used for generating an account identification of a virtual account and authority level information used for appointing an authority level of the virtual account;
a virtual login request sending module, configured to send the virtual login request to a server, so that the server determines the virtual account based on the account identification information and the permission level information, and returns the virtual account to a terminal device;
and the virtual login module is used for receiving the virtual account returned by the server and logging in the virtual account.
13. The apparatus of claim 12, wherein the virtual login operation comprises:
triggering operation of a target virtual login control in the displayed at least one virtual login control by a user;
the virtual login request generation module is specifically configured to, when generating a virtual login request:
acquiring authority level information corresponding to the target virtual login control;
and generating a virtual login request based on the permission level information.
14. The apparatus of claim 12 or 13, further comprising:
and the operation data storage module is used for sending the operation data of the user in the login state of the virtual account to the server so as to enable the server to store the operation data and the virtual account in a correlation manner.
15. An application login apparatus comprising:
the virtual account determining module is used for determining a virtual account based on account identification information and permission level information carried in a virtual login request when the virtual login request sent by a terminal device is received, wherein the virtual login request is generated by the terminal device in response to a virtual login operation triggered by a user in a non-login state, the account identification information is used for generating an account identification of the virtual account, and the permission level information is used for specifying the permission level of the virtual account;
and the virtual account number returning module is used for returning the virtual account number to the terminal equipment so as to enable the terminal equipment to log in the virtual account number.
16. The apparatus according to claim 15, wherein when determining the virtual account based on the account identification information and the permission level information carried in the virtual login request, the virtual account determination module is specifically configured to:
determining whether a historical virtual account with the same account identification as the virtual account exists or not based on account identification information carried in the virtual login request;
determining the virtual account number based on whether a historical virtual account number with the same account number identification as the virtual account number exists.
17. The apparatus of claim 15 or 16, further comprising:
and the operation data binding module is used for binding the operation data associated with the virtual account logged in through the terminal equipment with the real account when the user logs in to the real account in the login state of the virtual account.
18. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-11.
19. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-11.
20. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1-11.
CN202111620652.1A 2021-12-27 2021-12-27 Application program login method and device, electronic equipment and readable storage medium Pending CN114401121A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111620652.1A CN114401121A (en) 2021-12-27 2021-12-27 Application program login method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111620652.1A CN114401121A (en) 2021-12-27 2021-12-27 Application program login method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN114401121A true CN114401121A (en) 2022-04-26

Family

ID=81229359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111620652.1A Pending CN114401121A (en) 2021-12-27 2021-12-27 Application program login method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN114401121A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024001255A1 (en) * 2022-06-27 2024-01-04 聚好看科技股份有限公司 User equipment, and reward benefit data processing method
CN117807568A (en) * 2024-01-03 2024-04-02 深圳云达腾华信息技术有限公司 Installation permission control method and device based on Linux operating system, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138924A (en) * 2015-08-19 2015-12-09 网易传媒科技(北京)有限公司 Method and device for storing application operation information without login
CN105939362A (en) * 2016-06-27 2016-09-14 乐视控股(北京)有限公司 User account management method and device
CN111163049A (en) * 2019-11-26 2020-05-15 全球创新网络香港有限公司 Platform docking and authentication method and system
CN111212082A (en) * 2019-01-11 2020-05-29 深圳联合产权交易所股份有限公司 Resource value evaluation user management method based on cloud platform and related product
CN113360868A (en) * 2021-06-29 2021-09-07 平安普惠企业管理有限公司 Application program login method and device, computer equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138924A (en) * 2015-08-19 2015-12-09 网易传媒科技(北京)有限公司 Method and device for storing application operation information without login
CN105939362A (en) * 2016-06-27 2016-09-14 乐视控股(北京)有限公司 User account management method and device
CN111212082A (en) * 2019-01-11 2020-05-29 深圳联合产权交易所股份有限公司 Resource value evaluation user management method based on cloud platform and related product
CN111163049A (en) * 2019-11-26 2020-05-15 全球创新网络香港有限公司 Platform docking and authentication method and system
CN113360868A (en) * 2021-06-29 2021-09-07 平安普惠企业管理有限公司 Application program login method and device, computer equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024001255A1 (en) * 2022-06-27 2024-01-04 聚好看科技股份有限公司 User equipment, and reward benefit data processing method
CN117807568A (en) * 2024-01-03 2024-04-02 深圳云达腾华信息技术有限公司 Installation permission control method and device based on Linux operating system, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107390983B (en) Service instruction execution method, client and storage medium
CN112911013A (en) Cloud application processing method and device, computer equipment and storage medium
CN114328132A (en) Method, device, equipment and medium for monitoring state of external data source
CN115688133A (en) Data processing method, device, equipment and storage medium
CN114401121A (en) Application program login method and device, electronic equipment and readable storage medium
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
CN112965799A (en) Task state prompting method and device, electronic equipment and medium
CN117040799A (en) Page interception rule generation and page access control method and device and electronic equipment
CN114389969B (en) Method and device for testing client, electronic equipment and storage medium
CN112925623B (en) Task processing method, device, electronic equipment and medium
CN114091909A (en) Collaborative development method, system, device and electronic equipment
CN115062304A (en) Risk identification method and device, electronic equipment and readable storage medium
CN113778713A (en) Service function authorization method, device, equipment and storage medium
CN113703793A (en) Application installation method, device, equipment and medium for cloud mobile phone
CN111176982A (en) Test interface generation method and device
CN116432169B (en) Automatic task permission control method, system and equipment based on sharing strategy
CN114428646B (en) Data processing method and device, electronic equipment and storage medium
CN115840604B (en) Data processing method, device, electronic equipment and computer readable storage medium
CN116738470B (en) User identity association method and device, electronic equipment and storage medium
CN115080003A (en) Zero code platform operation method and device, electronic equipment and storage medium
CN117556116A (en) Method and device for processing request information, electronic equipment and storage medium
CN113536292A (en) Cloud mobile phone application starting control method, related device and computer program product
CN116436883A (en) Method, device, electronic equipment and readable storage medium for link transmission
CN115202538A (en) Menu configuration method and device, electronic equipment and storage medium
CN114564133A (en) Application program display method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination