CN114640880B - Account login control method, device and medium - Google Patents

Account login control method, device and medium Download PDF

Info

Publication number
CN114640880B
CN114640880B CN202011370994.8A CN202011370994A CN114640880B CN 114640880 B CN114640880 B CN 114640880B CN 202011370994 A CN202011370994 A CN 202011370994A CN 114640880 B CN114640880 B CN 114640880B
Authority
CN
China
Prior art keywords
login
terminal
application program
application
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011370994.8A
Other languages
Chinese (zh)
Other versions
CN114640880A (en
Inventor
俄万有
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202011370994.8A priority Critical patent/CN114640880B/en
Publication of CN114640880A publication Critical patent/CN114640880A/en
Application granted granted Critical
Publication of CN114640880B publication Critical patent/CN114640880B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/4363Adapting the video stream to a specific local network, e.g. a Bluetooth® network
    • H04N21/43637Adapting the video stream to a specific local network, e.g. a Bluetooth® network involving a wireless protocol, e.g. Bluetooth, RF or wireless LAN [IEEE 802.11]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Computer Graphics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides an account login control method, an account login control device and a medium, relates to the technical field of computers, and is used for improving the safety of an account login control mode. The method comprises the following steps: calling a communication module in the first terminal through an application program, and establishing a short-distance communication link with the second terminal; receiving a login request sent by a second terminal based on a short-distance communication link; in response to a confirmation operation for the login request, displaying the login state of the application program as the target account number in which the application program is logged in; when the short-distance communication link is disconnected, the login state of the application program is displayed as that the target account number exits the login application program.

Description

Account login control method, device and medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, an apparatus, and a medium for controlling account login.
Background
With the continuous development of smart devices, most application service providers develop application versions that can run in smart devices, for example, users can install video applications on smart televisions and use video services provided by the video applications. Typically, for the same video application, the account number registered by the user on the video application is generic to the video application on the mobile phone and the smart television.
At present, the mode of logging in an account number on an intelligent television is generally as follows: after the user logs in the account through the mobile phone, the user can scan the two-dimensional code corresponding to the video application on the intelligent television through the mobile phone to carry out login authorization of the intelligent television so as to realize synchronous login of the account on the intelligent television. However, the login mode requires the user to log out the logged-in account on the smart television manually, and if the user does not log out the account in time, the risk of account leakage may exist. Therefore, the current account login control method is not high in safety.
Disclosure of Invention
The embodiment of the application provides an account login control method, an account login control device and a medium, which are used for improving the security of an account login control mode.
In one aspect, an account login control method is provided and applied to a first terminal, and the method includes:
calling a communication module of the first terminal through an application program running on the first terminal, and establishing a short-distance communication link with a second terminal;
receiving a login request of a second terminal based on a target account number based on the short-distance communication link;
in response to a confirmation operation for the login request, displaying a login state of the application program as the target account number is logged in the application program;
And when the short-distance communication link is disconnected, displaying the login state of the application program as that the target account number is logged out of the application program.
On the other hand, an account login control method is provided, which is applied to a second terminal and comprises the following steps:
when the first terminal is monitored to call broadcast information sent by a communication module of the first terminal through an application program, a connection request is sent to the first terminal, and a short-distance communication link is established with the first terminal;
acquiring login information, wherein the login information is used for logging in the application program by utilizing a target account;
based on the short-range communication link, the login information is sent to a first terminal, so that the first terminal can execute the following operations: according to the login information, displaying the login state of the application program in the first terminal as that the target account number logs in the application program, and displaying the login state of the application program as that the target account number exits from logging in the application program when the short-distance communication link is disconnected.
The embodiment of the application provides an account login control device, which comprises:
the communication module is used for calling the communication module of the first terminal through an application program running on the first terminal and establishing a short-distance communication link with the second terminal;
The receiving and transmitting module is used for receiving a login request of the second terminal based on the target account number based on the short-distance communication link;
and the display module is used for responding to the confirmation operation of the login request, displaying the login state of the application program as the login of the application program by the target account, and displaying the login state of the application program as the login of the application program by the target account when the short-distance communication link is disconnected.
The embodiment of the application provides an account login control device, which comprises:
the receiving and transmitting module is used for transmitting a connection request to the first terminal when monitoring that the first terminal calls the broadcast information transmitted by the communication module of the first terminal through an application program;
the establishing module is used for establishing a short-distance communication link with the first terminal;
the acquisition module is used for acquiring login information, wherein the login information is used for logging in the application program by utilizing a target account;
the receiving and transmitting module is used for transmitting the login information to a first terminal based on the short-distance communication link so as to enable the first terminal to execute the following operations: according to the login information, displaying the login state of the application program in the first terminal as that the target account number logs in the application program, and displaying the login state of the application program as that the target account number exits from logging in the application program when the short-distance communication link is disconnected.
An embodiment of the present application provides a computer device, including:
at least one processor, and
a memory communicatively coupled to the at least one processor;
the memory stores instructions executable by the at least one processor, and the at least one processor implements the account login control method according to any one of the preceding claims by executing the instructions stored by the memory.
The embodiment of the application provides a storage medium, wherein computer instructions are stored in the storage medium, and when the computer instructions run on a computer, the computer is caused to execute the account login control method according to any one of the above.
Due to the adoption of the technical scheme, the embodiment of the application has at least the following technical effects:
in the embodiment of the application, when the account is required to be logged in on the application program of the first terminal, the login information can be acquired from the second terminal through the short-distance communication link, the application program of the first terminal logs in the corresponding account according to the login information, and when the short-distance communication link between the application program of the first terminal and the second terminal is detected to be disconnected, the logged-in account is automatically logged out, so that the safety of an account login mechanism is improved, and the login control mode can ensure the safety of the account even if the account is logged in a public place. In addition, in the embodiment of the application program login account, when the application program of the first terminal logs in the account, login information is obtained from the second terminal based on the short-distance communication link, the short-distance communication and the internet communication are two independent communication modes, and the existing login mode is mostly based on internet communication to transmit the login information, so that the login information is transmitted based on the short-distance communication mode in the embodiment of the application program to be relatively isolated from the outside, and the risk of leakage of the login information is reduced.
Drawings
Fig. 1A is an exemplary illustration of an application scenario of an account login control method provided in an embodiment of the present application;
fig. 1B is a schematic diagram of an application scenario of an account login control method according to an embodiment of the present application;
FIG. 1C is a block diagram of a login control system according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a method for controlling account login according to an embodiment of the present application;
fig. 3 is a flowchart two of an account login control method provided in an embodiment of the present application;
FIG. 4 is a schematic diagram of interactions between the various devices of FIG. 1A;
fig. 5 is an exemplary diagram of an interface displayed after a first terminal provided in an embodiment of the present application is started;
fig. 6A is an exemplary diagram of a bluetooth function authorization interface displayed by a second terminal according to an embodiment of the present application;
fig. 6B is an exemplary diagram of a connection request confirmation interface displayed by the second terminal according to the embodiment of the present application;
fig. 7 is a schematic diagram of interface change in a process of requesting login authorization from a third party platform by a second terminal according to an embodiment of the present application;
FIG. 8 is a diagram illustrating an exemplary interface of historical usage information and personal information of a user displayed by each terminal according to an embodiment of the present application;
FIG. 9 is a schematic diagram of interaction between the devices in FIG. 1B according to an embodiment of the present application;
Fig. 10 is a schematic structural diagram of an account login control device according to an embodiment of the present application;
fig. 11 is a schematic structural diagram ii of an account login control device according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a computer device according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of a second embodiment of a computer device.
Detailed Description
For a better understanding of the technical solutions provided by the embodiments of the present application, the following detailed description will be given with reference to the accompanying drawings and specific embodiments.
In order to facilitate a better understanding of the technical solutions of the present application, the following description refers to the terms related to the present application.
Short-range communication link: refers to links established based on short-range communication protocols, such as bluetooth communication links, wireless fidelity (Wireless Fidelity, wifi) communication links, or near field communication (Near Field Communication, NFC) communication links, etc.
Third party platform: and may also be referred to as a third party open platform. In the software industry and networks, it is meant that a software system, by exposing its application programming interfaces (Application Programming Interface, APIs) or functions (functions), allows an external program to add functionality to or use resources of the software system without requiring modification of the source code of the software system. In the internet era, services of websites are packaged into a series of easily-identified data interfaces of computers and are opened for developers to use, the behavior is called an Open API, and a platform providing the Open API is called an Open platform. The third party platform is mainly used for providing a corresponding authorization mechanism for logging in other applications.
Device characteristic value: the device characteristic value is used for representing a relevant parameter of the device, and in the embodiment of the application, the device characteristic value may include a unique application identifier corresponding to an application installed in the device. The device characteristic value may also include a device unique identification of the device. The device unique identification may be, for example, the model number of the device in which the device is employed, or a line and channel representation of the device. The production line comprises production merchants of intelligent equipment, and channels refer to channels through which equipment passes from the production field to the consumption field.
User identification (Vuid): the method is characterized in that the background is used for distributing unique user identification for each account. When information corresponding to the account is stored in the background, the user identifier may be used as an index to store the information, and correspondingly, when information of a certain account is searched, the information may also be searched based on the user identifier.
Authorized user unique identification (openID): the third party platform is used for distributing unique user identification for authorized users corresponding to websites or applications, and the websites or applications can store the unique identification of the authorized users so as to facilitate the identification of the users when the users log in next time.
Formal authorization credential (access token): also known as interface call credentials, or as user tickets. The client obtains from the third party platform and may access the third party platform through the formal authorization credential.
Taking the example that a user logs in a mobile phone and a video application on an intelligent television, the following describes the related technology:
in the related technology, a user logs in an account number on a video application of a mobile phone, opens the video application on the smart television, and scans a two-dimensional code presented on the video application in the smart television by using the video application which is logged in on the mobile phone. After the mobile phone scans the two-dimension code, the user clicks to confirm the authorized login, the video application of the mobile phone sends an authentication message to the background, and the background authentication is successful. The background control logs in the account number on the video application of the intelligent television.
However, in the login mode, when the user does not use the application program of the smart television, the user is required to manually log out the logged-in account number on the video application of the smart television, otherwise, the video application of the smart television can continuously keep the account number online. In real life, a user may log in an account at an intelligent device in a public place, and once the user does not log out of the account in time, account leakage may be caused. For example, when a user stays in a hotel, the user wants to watch a television through the smart television of the hotel, and after the user logs in an account on a video application of the smart television, if the user does not log out of the logged-in account, the problem of account information leakage may be caused.
In view of this, the embodiment of the present application provides an account login control method, and the following describes the design ideas related to the embodiment of the present application:
in the embodiment of the application, by means of the respective short-distance communication functions of the two terminals, a short-distance communication link can be established between the first terminal and the second terminal. After both establish a short-range communication link, the user may log into the target account number at the second terminal. After the second terminal successfully logs in the target account, the login information is sent to the first terminal through the short-distance communication link, and the first terminal logs in the target account on the corresponding application program based on the login information. After the first terminal logs in the target account, the first terminal monitors the heartbeat of the terminal. The logged-in target account number is automatically exited upon detecting a disconnection of the short-range communication link with the second terminal.
In the embodiment of the application, the first terminal can acquire login information from the second terminal through the short-distance communication link to realize automatic login. After the first terminal determines that the short-distance communication link with the second terminal is disconnected after logging in, the logged-in target account can be timely logged out, so that the safety of the account is ensured. In addition, the second terminal and the first terminal generally have a short-distance communication function, so that hardware modification of the second terminal and the first terminal is not needed, and implementation cost of the scheme is reduced.
Based on the design concept, the application scenario of the account login control method in the embodiment of the present application is described below.
A first possible application scenario:
referring to fig. 1A, an example of an application scenario of an account login control method provided in an embodiment of the present application is shown. The application scenario diagram includes a first terminal 110, a first application 111 running in the first terminal 110, a second terminal 120, a second application 121 running in the second terminal 120, a first server 130, and a third party platform 140.
The first application 111 and the second application 121 may be the same application, which may be any type of application, such as a video application, an instant messaging application, a short video application, a social application, a gaming application, etc. The first server 130 is a background server corresponding to the first application 111, and since the first application 111 and the second application 121 are both for the same application, the first server 130 is a background server corresponding to the first application 111 and the second application 121, that is, the first server 130 may be used to support the respective functions of the first application 111 and the second application 121.
The first application 111 and the second application 121 may be different applications, but have the same function, for example, the first application 111 and the second application 121 may both run a video application, or may both run an instant messaging application, a short video application, a social application, a game application, and the like. When the first application 111 and the second application 121 are different applications, the corresponding background servers may still be the same server, or may be different servers.
In fig. 1A, the third party platform 140 is represented by a background server corresponding to another application. The other applications refer to applications other than the first application, and for convenience of description, other applications installed in the second terminal 120 corresponding to the third party platform 140 may also be referred to as third party applications.
When the first application 111 and the second application 121 are logged in to the account, the first application may be logged in by means of the account of the third party platform 140. However, before the third party platform 140 provides the service for the first application 111, the first application 111 needs to register with the third party platform 140, and the following is an example of the manner in which the first application 111 registers with the third party platform 140:
For example, after the first application program is developed, the third party platform 140 may request to register the first application program 111, the third party platform 140 may assign a unique application identifier to the first application program 111 and generate an application interface key for the first application program 111, the first server 130 pre-stores a unique application identifier (appID) and an application interface key (appsecret) corresponding to the first application program 111, and when the subsequent first application program 111 and the second application program 121 need to log in the account number, an authorization credential may be requested from the third party platform according to the unique application identifier and the application interface key, so as to log in the first application program 111 using the account number on the third party platform.
In a first specific application scenario among the first possible application scenarios: with continued reference to fig. 1A, the second application 121 is a sub-application provided in the third party application 122 corresponding to the third party platform 140, for example, the second application 121 is an applet embedded in the third party application 122.
After the first application 111 and the second application 121 establish the short-range communication link, the first application 111 may request authorization credentials from the third party platform 140 through the second application 121 to enable logging in the target account number on the first application 111. Since the second application 121 is embedded in the third party application 122, the second application 121 may directly obtain the target account number corresponding to the third party application 122, thereby requesting the authorization credential from the third party platform 140 according to the related information of the first application 111.
In a second specific application scenario among the first possible application scenarios: with continued reference to fig. 1A, the second application 121 is a program preinstalled in the second terminal 120, or a web page version of the program.
In this case, when the first application 111 may request the authorization credential from the third party platform 140 through the second application 121, the second application 121 cannot directly obtain the target account number corresponding to the third party platform 140, and thus needs to obtain the related information of the target account number through the related operation of the user, and further request the authorization credential from the third party platform 140 according to the related information of the target account number and the related information of the first application 111.
In a second possible application scenario:
referring to fig. 1B, an application scenario of the account login control method in the embodiment of the present application is illustrated, where the application scenario includes a first terminal 110, a second terminal 120, a first application 111 running in the first terminal 110, a second application 121 running in the second terminal 120, and a first server 130.
Unlike the first possible application scenario, in the second possible application scenario, the user may register the target account directly on the first server 130, in which case the second terminal 120 does not need to obtain login information via the third party platform 140. Therefore, after the second terminal 120 logs in the target account on the second application 121, login information required by the first application 111 to log in the target account is directly obtained from the first server 130, the login information is sent to the first application 111 through the short-distance communication link, and the first application 111 may request to log in the target account from the first server 130 according to the login information sent by the second application 121, so as to implement the login of the target account.
It should be noted that, unless otherwise specified, the application may be an application pre-installed in the device, or an application embedded in a third party application, or a web page application, and the application is not limited to a specific type of application. The terminal can be a smart phone, a tablet computer, a notebook computer, a desktop computer, an intelligent wearable device, an intelligent watch, an intelligent television, an intelligent projector, an intelligent television box, an intelligent desk lamp, an intelligent air conditioner or vehicle-mounted equipment and the like. The first terminal 110 and the second terminal 120 are two terminals. The first server 130 and the third party platform 140 may be independent physical servers, or may be a server cluster or a distributed system formed by a plurality of physical servers, or may be cloud servers for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
To illustrate the functions of the respective devices in fig. 1A to 1B, the following describes the functions of the respective devices in conjunction with the architecture diagram of the login control system shown in fig. 1C:
1. Application layer: for providing an interface for interaction with a user, for supporting login authentication with clients on other devices, etc., for initiating a request to the next layer according to the user's corresponding operation.
The first application 111 running in the first terminal 110 and the second application 121 running in the second terminal 120 are located at the application layer. The first application 111 has integrated therein a user login authentication module with a short range communication link. The second application 121 has integrated therein a user login authentication management module supporting short-range communication. The user login authentication module is used for completing login authentication with other clients based on short-distance communication so as to realize login of corresponding accounts on the clients borne by the user login authentication module.
For example, when the user needs to log in the target account, a connection request is initiated through the second application 121 of the second terminal 120, so that a short-distance communication connection is established with the first application 111 of the first terminal 110, and further login authentication interaction is completed based on the short-distance communication, so that the target account is logged in the first application 111.
2. Access layer 131: and the system is used for receiving various requests initiated by the application layer.
When the first application 111 or the second application 121 interacts with the first server 130, a corresponding request may be sent to the access layer 131, and the access layer 131 receives various requests sent by the application layer and requests a corresponding module in the first server 130 to process. For example, the access layer 131 may receive a login authentication request, a user ticket refresh request, a user personal information query request, or a user video play request sent by the application layer.
3. Logic layer: for implementing the functionality of the first server 130 to handle various types of requests.
The logic layers include a login logic module 132, a ticket refreshing module 133, and other logic modules 134. In particular implementations, each module may be implemented by a service in first server 130 or may be implemented by a process of first server 130.
The login logic module 132 is configured to provide login service, login renewal service, login service, and the like. The login service generates or obtains, for example, a user identification and formal authorization credentials (accesskey) of the user, etc. The login renewal service obtains valid formal authorization credentials and session information (vcession) during a credential refresh period, for example, through a refresh interface (refresh interface). The log-out service clears the log-in information of the user, sets the user ticket to invalid, and the like. The refresh logic system, for example, generates and verifies the user ticket, and refreshes the user ticket before it expires.
Storage layer: for being responsible for storing traffic data.
The storage layer includes an account number storage module 135, a ticket storage module 136, and a user information storage module 137. The account storage module 135 is used for storing and maintaining account information of the user, such as a corresponding relationship between various information such as an unique identifier (openid) of an authorized user corresponding to the user identifier, a mobile phone number, and the like. The ticket storage module 136 is configured to store ticket information of the user, such as generation time of the formal authorization credential, status of the formal authorization credential, and the like. The user information storage module 137 is used to store service user personal information. User personal information such as user nicknames and user avatars.
The following describes the overall concept of the account login control method according to the embodiment of the present application in combination with a flowchart of the account login control method shown in fig. 2.
The first terminal and the second terminal can be various intelligent devices, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, an intelligent wearable device, an intelligent watch, an intelligent television, an intelligent projector, an intelligent television box, an intelligent desk lamp, an intelligent air conditioner or vehicle-mounted device, and the like. In the embodiment of the present application shown in fig. 2 below, the first terminal 110 is a smart tv, and the second terminal 120 is a mobile phone for example.
An example description of the account login control method in fig. 2 is as follows:
s201, the first terminal 110 establishes a short-range communication link with the second terminal 120 through the first application 111.
In the embodiment of the present application, when the distance between the first terminal 110 and the second terminal 120 is smaller, a short-range communication link may be established between the first application 111 and the second terminal 120, so as to facilitate subsequent interaction based on the short-range communication link.
For example, taking the first terminal 110 as an intelligent television and the second terminal as a mobile phone as an example, a user starts a bluetooth module in a video application or a game application of the intelligent television, the intelligent television starts the bluetooth module in the video application of the intelligent television in response to the starting operation of the user, and sends broadcasting information, such as broadcasting bluetooth signals, the user opens a bluetooth function on the mobile phone in a hotel, and the mobile phone can search for the intelligent television, so that bluetooth connection with the intelligent television is established.
S202, the first terminal 110 receives, through the first application 111, the login request sent by the second terminal 120 based on the short-range communication link.
After establishing the short-range communication link with the first terminal 110, the second terminal 120 may send a login request to the first terminal 110, where the login request is used to inform the first application 111 in the first terminal 110 that the target account is ready to be logged in, so that the first application 111 enters an account login ready state.
S203, the first terminal 110 displays the login status of the first application 111 as the target account number in which the first application 111 is logged in, in response to the confirmation operation for the login request.
The first terminal 110 may acquire login information from the second terminal 120 in response to a confirmation operation performed by the user on the first terminal 110 or in response to a confirmation operation performed by the user on the second terminal 120.
The login information is information required for logging in the target account number on the first application 111, the second terminal 120 may be to obtain the login information from the third party platform 140, or the second terminal 120 may be to obtain the login information from the first server 130, or the second terminal 120 may be cached login information. After the first terminal establishes a short-range communication link with the second terminal 120 through the first application 111, the second application 121 may send the login information to the first application 111 through the short-range communication link, and the first application 111 may receive the login information.
After the first application program 111 obtains the login information, the target account number can be automatically logged in according to the login information, for example, the login information includes related information of the target account number, and after the first application program 111 obtains the login information, the corresponding information is directly displayed.
Alternatively, the first application 111 interacts with the first server 130 after obtaining the login information to achieve the login target account.
S204, when the short-distance communication link is disconnected, the first terminal 110 displays the login state of the application program as the login application program of the target account exit.
After logging in the target account, the first application 111 may monitor the heartbeat information of the second terminal 120, and may automatically log out of the logged-in target account once detecting that the short-range communication link therebetween is broken. For example, the first application 111 may request the first server 130 to exit the login target account, or for example, the first application 111 directly deletes the obtained login information.
In this embodiment of the present application, after the first application 111 establishes a short-distance communication link with the second terminal 120, the first application 111 may use the second terminal 120 as an access node, directly obtain login information from the second terminal 120, and implement login, and after detecting that the short-distance communication with the second terminal 120 is disconnected, automatically log out, so as to ensure account security. That is, after the short-distance communication connection is disconnected, the user does not need to manually withdraw, so that the user can be prevented from forgetting to withdraw and divulging the secret.
The following describes a process of executing the account login control method by the second terminal 120 according to the embodiment of the present application with reference to a flowchart of the account login control method shown in fig. 3.
S301, when the second terminal 120 detects that the first terminal 110 invokes the broadcast information sent by the communication module in the first terminal 110 through the application program, it sends a connection request to the first terminal 110, and establishes a short-distance communication link with the first terminal 110.
For details of establishing the short-range communication link, reference may be made to the foregoing discussion, and details are not repeated here.
S302, the second terminal 120 acquires login information.
The login information is used for logging in the target account on the first client, and specific content of the login information may refer to the content discussed above, which is not described herein again. The manner in which the second terminal 120 obtains the login information may refer to the foregoing discussion, and will not be described herein.
S303, the second terminal 120 transmits login information to the first terminal 110 based on the short-range communication link.
The second terminal 120 sends the login information to the first client, so that the first client can log in the target account on the first client according to the login information, and log out the target account logged in the first application 111 of the first terminal 110 when the short-distance communication link is disconnected. The content related to the login target account and the logout target account may refer to the content discussed above, and will not be described herein.
In addition, the second terminal 120 may implement the corresponding steps discussed above, which are not described herein.
In order to more clearly describe the account login control method according to the embodiment of the present application, the account login control method according to the embodiment of the present application is described below based on application scenarios discussed in fig. 1A and 1C:
referring to fig. 4, an exemplary diagram of interaction between each device in fig. 1A is shown, where each device interacts with each other to implement a login control method in an embodiment of the present application, and the interaction process specifically includes:
it should be noted that, in the embodiment of the present application shown in fig. 4 below, the first terminal 110 is a smart tv, and the second terminal 120 is a mobile phone for example.
The interaction diagram in fig. 4 is described in detail below:
s401, the first terminal 110 invokes the communication module in the first terminal 110 through the first application 111 to send a broadcast message.
The first application 111 may integrate a communication module with a short-range communication function, and after the first application 111 is started, the communication module may be called, the short-range communication function is automatically started, and the broadcast message starts to be sent to the outside within a preset range. The broadcast message carries a device identification, such as a device name, of the first terminal 110. The preset range in which the first application 111 transmits the broadcast message is related to the communication range supported by the short-range communication function, and the present application is not particularly limited. Taking short-range communication as an example of bluetooth communication, the first application 111 turns on the bluetooth function, and can start transmitting a broadcast signal within 15 meters centered on the first application 111 through bluetooth.
Alternatively, the first application 111 invokes a communication module built into the first terminal 110 to send a broadcast message.
For example, the first application 111 may be started in response to a first start operation of the first application 111 by the user, and after the start, the communication module in the first terminal 110 is pulled up, and the short-range communication function is started. Alternatively, the first application 111 may be preset with a switch key for controlling the communication module, and after the user clicks the switch key, the first application 111 starts the short-distance communication function in response to a start operation of the user on the switch key.
For example, referring to fig. 5 (1) which is an interface displayed after the smart device is started, in fig. 5, a first terminal is taken as a smart tv, a second terminal is taken as a mobile phone, in fig. 5 (1), the smart tv is installed with an application a and an application B, after the user clicks an application icon 301 shown in the application a, the application a is an application identifier 501 of the first application 111, which corresponds to that the user performs a first start operation of the first application 111, the first application 111 responds to the first start operation, and the smart tv displays the interface of the first application 111 shown in fig. 5 (2) and starts to send a broadcast signal.
S402, the second terminal 120 starts the device search.
In a first specific application scenario among the first possible application scenarios: the second terminal 120 is started in response to a user's opening operation for the second application 121 in the third party application, and the second application 121 is started.
In a second specific application scenario among the first possible application scenarios: the second application 121 is started in response to a click operation of an application icon of the second application 121 by a user.
The second application 121 may be integrated with a function supporting short-range communication, which the second application 121 initiates. Alternatively, the second terminal 120 is generally short-range communication capable, so that the second application 121 may pull up the short-range communication function in the second terminal 120 when the second application needs to use the short-range communication function. Alternatively, the second terminal 120 is typically short-range communication enabled, so the second terminal 120 directly enables the short-range communication.
For example, after the second application 121 is started, the second application 121 may automatically start the short-range communication function, or the second application 121 starts the short-range communication function in response to an authorized use operation of the short-range communication function by the user, for example, after the second application 121 is started, a short-range communication function authorization interface is displayed, and the second application 121 starts the short-range communication function in response to an authorized use operation of the short-range communication function authorization interface by the user.
Alternatively, the second application 121 enables the short-range communication function by default. After the second application 121 enables the short-range communication function, the second application 121 may search for devices within a preset range using the short-range communication function. The preset range may refer to the content discussed above, and will not be repeated here.
For example, referring to fig. 6A, after the second application 121 is started, the second application 121 displays a bluetooth function starting authorization interface as shown in fig. 6A, where the bluetooth function starting authorization interface includes bluetooth function prompting information for prompting a user whether to start a bluetooth function, and a confirm button 601 and a cancel button 602 for indicating to start the bluetooth function. After the user clicks the confirm button 601, the second application 121 enables the bluetooth function in response to the authorized use operation corresponding to the authorized use operation. Alternatively, after the user clicks the cancel button 602, which corresponds to performing a cancel authorized use operation, the second application 121 does not enable the bluetooth function in response to the cancel authorized use operation.
S403, the second terminal 120 initiates a connection request.
As discussed in the foregoing S401, the first application 111 transmits a broadcast message to the outside, and the short-range communication can support communication within a preset range, and devices within the preset range of the first application 111 can each receive the broadcast message transmitted by them. Therefore, after the second application 121 opens the short-range communication function, and when the second application 121 is within the preset range of the first application 111, the second application 121 may receive the broadcast message of the first application 111, and parse the device identifier of the first terminal 110 according to the broadcast message.
Further, the second application 121 may initiate a connection request to the first application 111 in response to the connection operation, or the second application 121 may automatically initiate a connection request to the first application 111 when searching the first terminal 110. The connection request is for requesting connection of the smart device. The connection request may carry a device identification of the terminal device.
For example, after the second application 121 searches the first application 111, the second application 121 may display a connection request confirm interface for requesting whether to connect the device identified by the device, the connection request confirm interface including a connection prompt message, a confirm connection key, and a cancel connection key. The connection prompt message is used to prompt the user whether to connect to the first application 111. After the user performs a click operation on the confirm connection key, the second application 121 initiates a connection request to the first application 111 in response to the click operation. After the user performs a click operation on the cancel connection key, the second application 121 may cancel initiation of the connection request to the first application 111 in response to the click operation.
When the second application 121 searches for a plurality of smart devices at the same time, the connection request confirmation interface may further include a search device list including a device identification of each smart device searched for by the second application 121. The second application 121 initiates a connection request to the smart device selected by the user in response to the connection operation performed by the user for any smart device in the search device list.
For example, continuing to use the example of fig. 5, please refer to fig. 6B, which is an exemplary diagram of a connection request confirmation interface displayed by the second application 121 in the mobile phone, where the exemplary diagram includes a connection prompt message, and the mobile phone specifically includes a "whether to connect to TV-1" as shown in fig. 6B, and the interface diagram further includes a confirm connection key 603 and a cancel connection key 604, and after the user clicks the confirm connection key 603 in the mobile phone, the second application 121 initiates a connection request to the smart TV corresponding to TV-1 in response to the clicking operation.
S404, the first terminal 110 returns the device characteristic value to the second terminal 120.
After the first application 111 receives the connection request transmitted by the second application 121, the device characteristic value of the first terminal 110 may be transmitted to the second application 121. The content of the device characteristic values may be referred to in the foregoing discussion, and will not be described in detail herein. After the first application 111 feeds back the device characteristic value to the second application 121, a short-range communication link is formally established between the first application 111 and the second application 121. In the embodiment of the present application, the first application 111 returns the device feature value to the second application 121, so that the subsequent second application 121 can request the authorization credential from the third party platform 130 based on the device feature value.
The portions of S401 to S404 are optional, for example, when a short-range communication link has been established between the first application program 111 and the second application program 121 in preparation for login of the target account on the first application program 111, the portions of S401 to S404 do not need to be performed.
S405, the second terminal 120 initiates a login request to the first terminal 110.
The second application 121 may send a login request to the first application 111 based on the short-range communication link, the login request being used to inform the first application 111 that the target account is ready to be logged in, so that the first application 111 enters the account login ready state.
S406, the first terminal 110 listens for the login synchronization message.
After the first terminal 110 receives the login request through the first application 111, it is determined that the second application 121 is ready to login to the target account, at this time, the first application 111 enters a ready state, starts monitoring for a login message on the short-range communication link, and prepares to receive the login information at any time.
It should be noted that, S405 to S406 are optional steps, and in the embodiment shown in S405 to S406, the second terminal 120 timely notifies the first application program 111 to enter the account login ready state, so that the first application program 111 can monitor login information in real time, and avoid missing the login information subsequently sent by the second terminal 120.
S407, the second terminal 120 requests login authorization from the third party platform 140.
Since the first application 111 has been previously registered with the third party platform 140, the second terminal 120 may log in through the second application 121 through the target account number on the third party platform 140, and thus the second terminal 120 may request the third party platform 140 to log in to the first application with the target account number in the third party platform through the second application 121. For example, the second terminal 120 may request login authorization from the third party platform through the second application 121 through a login interface corresponding to the third party platform. The request login authorization is specifically for requesting login to the first application using the target account number of the third party platform.
Specifically, the second terminal 120 may respond to the login operation through the second application 121, and display a login interface, where the login interface includes a third party platform identifier corresponding to the third party platform 140, and the third party platform identifier is, for example, one or two of an application icon or an application name corresponding to the third party platform.
S408, the third party platform 140 requests the user confirmation from the second application 121.
The second terminal 120 may display an authorized login interface through the second application 121 in response to a confirmation operation for a login request performed on the login interface for the third party platform identifier.
In the first possible sub-scenario corresponding to the foregoing, the second terminal 120 may directly obtain the target account corresponding to the third party platform through the second application 121, so the authorized login interface may specifically include an authorized login prompt message, a confirm authorized login key, a cancel authorized login key, and the like. The second terminal 120 may request login authorization from the third party platform 140 through the second application 121 in response to a clicking operation of the confirm authorized login button.
In a second possible sub-scenario corresponding to the foregoing, the second terminal 120 may not be able to obtain the target account number corresponding to the third party platform through the second application 121, so that the authorized login interface includes an input key of account number information, and the second terminal 120 may respond to an input operation performed on the input key through the second application 121, which is equivalent to performing a confirmation operation for a login request, and request login authorization from the third party platform 140.
For example, continuing to use the example of fig. 6B, please refer to fig. 7, in which the mobile phone is an example of an interface process of requesting login authorization from the third party platform, when the user does not login, the mobile phone may display an interface shown in (1) in fig. 7 through the second application 121, after the user clicks the personal page key 701, the mobile phone may display a login interface shown in (2) in fig. 7 through the second application 121, and the login interface displays a third party platform identifier 702, specifically, a "second application login" and a "third application login" shown in (2) in fig. 7.
For the first possible first specific application scenario, when the mobile phone may be embedded in the third party application through the second application 121, after the user clicks the third application to log in, the third party application may pull the account information of the user, so as to display the authorized login interface shown in fig. 7 (3), and after the user clicks the confirm authorized login key 703 shown in fig. 7 (3), the confirmation operation is equivalent.
For the second possible second specific application scenario, after the user clicks the third party platform identifier 702, the mobile phone may display the authorized login interface shown in (4) in fig. 7 through the second application 121, and when the user scans the two-dimensional code 704 shown in (4) in fig. 7, the user is equivalent to inputting account information, that is, performing a confirmation operation.
S409, the second terminal 120 may send a user confirmation to the third party platform 140 through the second application 121.
The second terminal 120 may respond to the confirmation authorization login operation through the second application 121, confirm authorization to login to the first application using the target account number of the third party platform 140, and may send a user confirmation to the third party platform 140 through the second application 121, where the user confirmation is used to indicate that the user determines to login to the first application through the target account number of the third party platform 140, and the user confirmation may carry account number information of the target account number of the third party platform 140, where the account number information includes an account number and a corresponding login password. After the second terminal 120 may send the user confirmation through the second application 121, it may jump to the interface corresponding to the first application.
S410, the third party platform 140 returns the temporary authorization credential to the second terminal 120.
After the third party platform 140 receives the user confirmation, the account information sent by the second terminal 120 may be verified, and after the verification is successful, a temporary authorization credential may be returned to the second terminal 120.
S411, the second terminal 120 feeds back the unique application identifier and the temporary authorization credential to the login logic module 132 to request the login service.
S412, the login logic module 132 requests the login information verification from the third party platform 140 with the unique application identification, the temporary authorization credential, and the application interface key.
The login logic 132 may search for an application interface key corresponding to the unique application identifier according to the unique application identifier to obtain the application interface key. In turn, the login logic 132 requests the third party platform 140 via the application interface key, the unique application identification, and the temporary authorization credential.
S413, the third party platform 140 returns the authorized user unique identification, the formal authorization credential, and the credential refresh period to the login logic module 132.
The formal authorization credential has a credential validity period, and the credential refresh period corresponds to a credential refresh interface, and the duration of the credential refresh period is generally longer than the credential validity period. For example, the validity period of the formal authorization credential is two hours, and the credential refresh period is one month.
As one example, the third party platform 140 may return the authorized user unique identification and the formal authorization credential to the login logic module 132.
S414, the login logic module 132 queries the account storage system 135 for the user according to the authorized user unique identifier.
The login logic module 132 may request the account storage module 135 to feed back the user identifier according to the unique identifier of the authorized user, and if the user is logged into the first application 111 for the first time, the account storage module 135 may assign a new user identifier to the user. If the user is not logged into the first application 111 for the first time, the account storage module 135 may look up a user identification corresponding to the unique identification of the authorized user from the pre-stored information.
S415, the account number storage module 135 returns the user identification to the login logic module 132.
S416, the login logic module 132 exchanges the video ticket for the ticket refreshing module 133 according to the user identification.
S417, the ticket refreshing module 133 returns session information and session validity period to the login logic module 132.
After the ticket refreshing module 133 receives the user identifier fed back by the login logic module 132, the ticket refreshing module 133 may return session information and session validity period corresponding to the user identifier to the login logic module 132.
S418, the login logic module 132 requests the user personal information from the user information storage module 137 according to the user identification, the authorized user unique identification, and the formal authorization credential.
The user information storage module 137 may query the user for historical usage information on the first application 111, such as videos that the user has previously viewed, based on the user identification, taking the first application as a video application for example.
S419, the third party platform 140 requests the user personal information from the third party platform 140 according to the unique identification of the authorized user and the formal authorization credential.
The third party platform 140 may request user personal information from the third party platform 140 based on the authorized user unique identification and the formal authorization credentials, where the user personal information is personal information related to the target account number, such as a nickname and an avatar of the target account number.
S420, the third party platform 140 returns the user personal information to the user information storage module 137.
After receiving the unique authorized user identifier and the formal authorization credential, the third party platform 140 may authenticate the user identity according to the unique authorized user identifier and the formal authorization credential, and if the authentication is passed, return the user personal information to the user information storage module 137.
The user information storage module 137 receives the user personal information returned by the third party platform 140, and can store the user personal information in association with the user identifier.
S421, the user information storage module 137 returns the user personal information to the login logic module 132.
S422, the login logic module 132 returns login information to the second terminal 120.
The login logic module 132 combines the user personal information, history use information, authorized user unique identification, formal authorization credentials, credential refreshing interface, session information, etc. after obtaining these information, obtains login information, and returns the login information to the second terminal 120.
S423, the second terminal 120 transmits login information to the first terminal 110.
After the second terminal 120 receives the login information, the login information is transmitted to the first terminal 110 based on the short-range communication link.
S424, the first application 111 sends an account login request to the login logic module 132.
The first application 111 sends an account login request to the login logic module 132, where the account login request may carry formal authorization credentials.
S425, the login logic module 132 sends a response of successful account login to the first application 111.
The login logic module 132 verifies the identity of the first application program 111 according to the account login request, and after the verification is successful, sends a response of successful account login to the first application program 111, so as to realize that the target account is logged in on the first application program 111, that is, the login state of the first application program 111 is displayed as the target account to log in the first application program 111.
Further, after the first application program 111 logs in the target account, user personal information and history use information in the login information may be displayed on a corresponding interface according to the login information. For example, the first application 111 presents the user personal information, history use information, and the like on the personal information interface.
As an embodiment, after the second application 121 logs in the target account, the personal information and the historical usage information of the user in the login information may also be displayed on the corresponding interface.
Continuing with the example of fig. 7, please refer to (1) in fig. 8, which shows the user personal information and the historical usage information of the second application 121 after logging in the target account. In fig. 8, (2) shows that the first application 111 has logged in the target account, and then the login status of the target account is logged in, and further shows user personal information of the target account, such as a user nickname and a user head portrait of the target account shown in fig. 8, (2), and history use information, such as movie C and movie D in the viewing history shown in fig. 8, (2).
S426, the first terminal 110 logs in the state synchronously with the second terminal 120.
After the first terminal 110 logs in the target account, the login state of the target account is fed back to the second terminal 120, so as to indicate that the second terminal 120 has logged in the target account.
S427, the first terminal 110 listens to the heartbeat of the second terminal 120.
S428, the second terminal 120 transmits heartbeat information to the first terminal 110.
The second terminal 120 may send the heartbeat probe packet to the first terminal 110 via a short-range communication link, either periodically or aperiodically. If the short-range communication link between the first terminal 110 and the second terminal 120 is normal, the first terminal 110 can timely receive heartbeat information fed back by the second terminal 120, and the first terminal 110 can return a heartbeat feedback packet to the second terminal 120 to indicate that the short-range communication link between the two is normal.
S429, the second terminal 120 transmits the updated formal authorization credential and session information to the first terminal 110.
Because the validity period of the formal authorization credential is too long, once the formal authorization credential is revealed, the security of the account is affected, so in the embodiment of the present application, the validity period of the formal authorization credential is smaller than the credential refreshing period, and when the validity period of the credential exceeds the credential refreshing period, the second terminal 120 may send the updated formal authorization credential to the first terminal 110 in time through the credential refreshing interface, thereby keeping the first application 111 of the first terminal 110 on line with the login of the target account.
Specifically, when the short-distance communication link between the second terminal 120 and the first terminal 110 is normal, the second terminal 120 may update the formal authorization credential according to the credential refreshing interface, and similarly, the second terminal 120 may selectively update the session information and send the updated formal authorization credential and the updated session information to the first terminal 110.
S430, the first terminal 110 requests the login logic module 132 to keep account login.
The first terminal 110 may send an account holding request to the login logic module 132 through the first application 111 according to the updated formal authorization credential.
S431, the login logic module 132 sends an account holding response to the first terminal 110.
When the login logic module 132 confirms that the updated formal authorization credential is valid, it confirms that the identity of the first terminal 110 is legal, so as to keep the login state of the target account on the first application 111, that is, the login state of the first application 111 is still displayed as if the target account is logged in to the first application 111.
S429 to S431 are optional parts. In the embodiment shown in S429 to S431, the second terminal 120 does not directly send the formal authorization credential valid for a long time to the first terminal 110, but after a certain time interval, synchronously refreshes the formal authorization credential to the first terminal 110, so that on one hand, the first terminal 110 can be ensured to keep account login in the credential refreshing period, and on the other hand, the security problem caused by the overlong valid period of the formal authorization credential can be avoided.
S432, when the first terminal 110 detects that the short-range communication link is disconnected, an account exit request is generated.
When the first terminal 110 does not monitor the heartbeat information of the second terminal 120 for more than a preset duration, or when the number of times that the first terminal 110 fails to monitor the heartbeat signal exceeds a preset threshold, the first terminal 110 determines that the short-distance communication link with the second terminal 120 is disconnected, so that the first terminal 110 can generate an account exit request, where the account exit request is used for requesting to exit from a currently logged-in target account.
S434, the first terminal 110 sends an account exit request to the login logic module 132.
S435, the first terminal 110 receives the account exit response fed back by the login logic module 132.
Meanwhile, the first terminal 110 sets the login state of the target account to be invalid through the first application 111, and deletes session information related to the target account and user personal information of the target account.
S436, the second terminal 120 reestablishes the short-range communication link with the first terminal 110.
For example, the distance between the second terminal 120 and the first terminal 110 is again within the preset range, and the short-range communication link between the second terminal 120 and the first terminal 110 may be re-established. The manner of establishing the short-range communication link may refer to the contents of the foregoing steps S401 to S404, and will not be described herein.
S437, the second terminal 120 transmits the login state information to the first terminal 110.
When the short-range communication link between the second terminal 120 and the first terminal 110 is broken, the second terminal 120 still retains the login state information of the user, maintains the normal login state refresh process of the user, and may also start the login state retention timer, for example, the timer is 24 hours. The duration of the login state holding timer corresponds to the session validity period of the session information.
When the second terminal 120 reestablishes the short-range communication link with the first terminal 110 before the timer expires, the second terminal 120 may delete the timer. The second terminal 120 synchronizes the login status information to the first terminal 110 through a short-range communication link. The login status information is used to indicate that the second application 121 in the second terminal 120 is currently logged into the target account. After the first terminal 110 obtains the login state information, a request is initiated to the user information storage module 137, so as to obtain the personal information of the user and update the login state of the user, thereby realizing the login state automatic continuous login of the target account on the first application program 111.
When the login state maintaining timer expires, the second terminal 120 does not reestablish the short-range communication link with the first terminal 110, and the first terminal 110 no longer supports the login state duration, so that the login state of the user expires.
S438, the first terminal 110 sends a user personal information request to the user information storage module 137.
After the second terminal 120 obtains the login state information, the user personal information may be requested from the user information storage module 137 according to the login state information.
S439, the user information storage module 137 returns the user personal information to the first terminal 110.
S440, the first terminal 110 logs in the target account number and displays the personal information of the user.
The content of logging in the target account number and displaying the personal information of the user can refer to the content discussed above, and will not be repeated here.
S436 to S440 are optional parts. In the embodiment of S436 to S440, the second terminal 120 may actively synchronize login status information with the first terminal 110 during the session validity period, so as to implement automatic continuous login of the target account by the first application 111 in the first terminal 110 in time, so as to simplify the process of logging in the target account on the first application 111.
As an embodiment, when the credential refreshing period expires, the first application 111, the second terminal 120, and the first server 130 may delete the pre-stored login information of the target account, so as to avoid disclosure of the login information.
In the embodiment shown in fig. 4, the second application 121 in the second terminal 120 may obtain part of the information in the login information from the third party platform 140 and obtain part of the information in the login information from the first server 130, so that the information is combined and sent to the first terminal 110 through the short-distance communication link, so that the first terminal 110 can automatically log in the target account, and also can automatically log out of the target account after the short-distance communication link is disconnected, thereby ensuring the security of the target account. In addition, the second terminal 120 can directly log in the target account by means of the login information in the third party platform 140, so that the user is prevented from registering the account in the first application, and the operation of the user is simplified.
Based on the application scenarios shown in fig. 1B and fig. 1C, the account login control method according to the embodiment of the present application is described below. Referring to fig. 9, an interaction diagram between each device in fig. 1B is shown, where the interaction process specifically includes:
the interaction diagram in fig. 9 is described in detail below:
s901, the first terminal 110 transmits a broadcast message.
The first terminal 110 invokes the communication module to send a broadcast message through the first application, where the broadcast message may refer to the foregoing discussion, and will not be described herein.
S902, the second terminal 120 starts a device search.
S903, the second terminal 120 initiates a connection request to the first terminal 110.
The connection request may refer to what has been discussed in the foregoing, and will not be described in detail here.
S904, the first terminal 110 returns the device characteristic value to the second terminal 120.
The device characteristic value here may specifically comprise a unique device identification of the first terminal 110.
S905, the second terminal 120 initiates a login request to the first terminal 110.
The login request may refer to the content discussed above, and will not be described here again.
S906, the first terminal 110 listens for the login synchronization message.
S907, the second terminal 120 transmits account information to the first server 130.
Specifically, the second terminal 120 obtains the account number and the account number password of the target account number input by the user in response to the login input operation, and the second terminal 120 sends account number information to the first server 130 to request to login the target account number on the second application of the second terminal 120. The account information comprises an account number and an account number password which are input by a user.
S908, the first server 130 verifies the account information.
After receiving the account information, the first server 130 verifies whether the account information is legal, and if so, S909 is executed, that is, a response of successful account login is sent to the second terminal 120.
S909, the first server 130 transmits a response of successful account login to the second terminal 120.
S905 to S909 are optional parts, for example, the second terminal 120 may have logged in the target account in advance, and need not execute this part.
S910, the second terminal 120 requests the first server 130 to authorize the login.
In S904, the second terminal 120 obtains the device characteristic value of the first terminal 110, and thus may request authorization to log in to the first terminal 110 from the first server 130.
S911, the first server 130 generates login information.
The first server 130 verifies the device feature value of the first terminal 110, and generates corresponding login information for the device feature value, where the login information may refer to the content discussed above, and will not be described herein.
S912, the first server 130 transmits the login information to the second terminal 120.
S913, the second terminal 120 transmits the login information to the first terminal 110.
The second terminal 120 may transmit login information to the first terminal 110 based on the short-range communication link.
S914, the first terminal 110 sends the login information to the first server 130.
S915, the first server 130 transmits an account login success response to the first terminal 110.
S916, the short-distance communication link is disconnected, and an account exit request is generated.
S917, the first terminal 110 sends an account exit request to the first server 130.
S918, the first server 130 returns an account exit response to the first terminal 110.
As an embodiment, when the login information includes the formal authorization credential and the credential refreshing interface, if the credential of the formal authorization credential is valid and the credential refreshing period of the credential refreshing interface is not out of date, the second terminal 120 may send the updated formal authorization credential to the first terminal 110, and the first terminal 110 may maintain online login of the target account according to the updated formal authorization credential. The relevant content of the online login of the first terminal 110 for keeping the target account number may refer to the content discussed above, and will not be described herein.
As an embodiment, when the login information includes session information and a session validity period, after the short-range communication link between the second terminal 120 and the first terminal 110 is disconnected, and after the short-range communication link between the first terminal 110 and the second terminal 120 is established again, the login state information may be sent to the first terminal 110 during the session validity period, so that the second terminal 120 may re-login to the target account. The content of the first terminal 110 re-logging into the target account may refer to the content discussed above, and will not be described herein.
In the embodiment shown in fig. 9, after the second terminal 120 logs in the target account, the second terminal may request login information required by the first terminal 110 from the first server 130, and send the login information to the first terminal 110 through a short-range communication link.
Based on the same inventive concept, an embodiment of the present application provides an account login control device, where the device may be used to implement the functions of the first terminal discussed above, referring to fig. 10, where the device includes:
the communication module 1001 is configured to invoke, by an application running on the first terminal, the communication module of the first terminal, and establish a short-distance communication link with the second terminal;
A transceiver module 1002, configured to receive a login request of the second terminal based on the target account number based on the short-range communication link;
a display module 1003, configured to display a login status of the application program as a target account number logged in the application program in response to a confirmation operation for the login request, and display the login status of the application program as a target account number logged out of the application program when the short-range communication link is disconnected.
In a possible embodiment, the device pre-stores a unique application identifier allocated by the third party platform for the first application, and the display module 1003 is specifically configured to:
transmitting the unique application identifier to the second terminal so that the second terminal performs the following operations:
according to the unique application identifier, a temporary authorization credential required by logging in an application program by utilizing a target account number is requested to be obtained from a third party platform, and according to the temporary authorization credential and the unique application identifier, a formal authorization credential is obtained from the third party platform, so that login information containing the formal authorization credential is generated;
receiving login information sent by a second terminal;
and displaying the login state of the application program as the target account number according to the login information, and logging in the application program.
In one possible embodiment, the login information further includes a credential validity period of the formal authorization credential and a credential refresh period of the formal authorization credential, where the credential validity period is smaller than the credential refresh period, and the display module 1003 is specifically configured to:
Requesting a first server corresponding to an application program to log in a target account according to login information;
when a response of successful account login fed back by the first server is received, displaying the login state of the application program as that the target account logs in the application program;
if the valid period of the certificate exceeds the timeout period, and the certificate refreshing period is in, receiving an updated formal authorization certificate sent by the second terminal;
requesting to keep the target account login from the first server according to the updated formal authorization credential;
and when receiving the response of the account login maintenance fed back by the first server, displaying the login state of the application program as the target account login of the application program.
In a possible embodiment, the login information further comprises: historical use information of the target account number in the first application association and user personal information corresponding to the target account number in the third party platform; the display module 1003 is further configured to:
and displaying the login state of the application program as the historical use information and the user personal information on the interface corresponding to the application program after the target account number logs in the application program according to the login information.
In one possible embodiment, the display module is specifically configured to:
When the short-distance communication link is disconnected, an account exit request is sent to a first server corresponding to the application program, so that the first server executes exit operation of the target account;
and receiving an account exit response fed back by the first server, displaying the login state of the application program as the login state of the target account exit login application program, and deleting the historical use information and the user personal information.
In a possible embodiment, the login information further includes session information and session validity period of the session information, and the display module 1003 is further configured to:
after the login state of the application program is displayed as the target account number which exits the login application program when the short-distance communication link is disconnected, if the short-distance communication link is established again with the second terminal within the effective period of the session, and login state information is acquired from the second terminal based on the session information;
and displaying the login state of the application program as the target account number to exit the login application program according to the login state information.
It should be noted that the apparatus shown in fig. 10 may also be used to implement the account login control method discussed above, which is not described herein.
Based on the same inventive concept, the embodiment of the present application provides an account login control device, where the setting of the device is equivalent to setting the second terminal 120 discussed above, referring to fig. 11, the device includes:
The transceiver module 1101 is configured to send a connection request to the first terminal when it is monitored that the first terminal invokes, through an application program, broadcast information sent by the communication module of the first terminal;
an establishing module 1102, configured to establish a short-distance communication link with a first terminal;
the obtaining module 1103 is configured to obtain login information, where the login information is used to login an application program by using a target account;
the transceiver module 1101 is configured to send login information to the first terminal based on the short-range communication link, so that the first terminal performs the following operations: according to the login information, displaying the login state of the application program in the first terminal as the login of the target account number and displaying the login state of the application program as the login of the target account number when the short-distance communication link is disconnected.
In one possible embodiment, the obtaining module 1103 is specifically configured to:
requesting, from a third party platform, obtaining temporary authorization credentials to login to a target account on an application;
requesting to obtain a formal authorization credential from a third party platform according to the temporary authorization credential and the unique application identifier, and generating login information containing the formal authorization credential; the unique application identification is obtained from the first terminal based on the short-range communication link, and the unique application identification is an identification distributed to the application program by the third-party platform.
In one possible embodiment, the obtaining module 1103 is specifically configured to:
transmitting the temporary authorization credential and the unique application identifier to a first server corresponding to the application program, so that the first server performs the following operations: obtaining an application interface key corresponding to the unique application identifier, and requesting to obtain a formal authorization credential from a third-party open platform according to the application interface key, the unique application identifier and the temporary authorization credential;
a formal authorization credential is obtained from a first server.
In one possible embodiment, the obtaining module 1103 is further configured to:
acquiring historical use information of a target account in an application program from a first server corresponding to the application program; the method comprises the steps of,
obtaining user personal information of a target account number from a first server; the personal information of the user is obtained by the first server according to the request of the formal authorization credential to the third party platform;
the transceiver 1101 is further configured to send the historical usage information and the user personal information to the first terminal, so that the first terminal displays the historical usage information and the user personal information on an interface corresponding to the application program respectively.
In a possible embodiment, the login information further includes a credential validity period of the formal authorization credential and a credential refresh period of the formal authorization credential, the credential validity period being smaller than the credential refresh period, and the transceiver module 1101 is further configured to:
If the valid period of the certificate is exceeded, but in the certificate refreshing period, the updated formal authorization certificate is sent to the first terminal, so that the first terminal executes the following operations: and according to the updated formal authorization credentials, requesting the first server to maintain the login state of the target account, and displaying the login state of the application program of the first terminal as the login state of the target account to log in the application program when receiving the response of the account login maintenance fed back by the first server.
In a possible embodiment, the login information further includes session information and session validity period of the session information, and the transceiver module 1101 is further configured to:
after the login information is sent to the first terminal based on the short-distance communication link, if the short-distance communication link between the first terminal and the first terminal is disconnected and the short-distance communication link is established with the first terminal again within the session validity period, the login state information of the target account is sent to the first terminal through the session information, so that the first terminal redisplays the login state of the application program of the first terminal as the login state of the target account according to the login state information.
It should be noted that the apparatus shown in fig. 11 may also be used to implement the account login control method discussed above, which is not described herein.
Based on the same inventive concept, embodiments of the present application provide a computer device, which corresponds to the first terminal discussed above, referring to fig. 12, and includes a processor 1201 and a memory 1202.
The processor 1201 may be a central processing unit (central processing unit, CPU), or a digital processing unit or the like. The specific connection medium between the memory 1202 and the processor 1201 is not limited in this embodiment. In the embodiment of the present application, the memory 1202 and the processor 1201 are connected through the bus 1203 in fig. 12, the bus 1203 is shown with a thick line in fig. 12, and the connection manner between other components is only schematically illustrated, which is not limited to the embodiment. The bus 1203 may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, only one thick line is shown in fig. 12, but not only one bus or one type of bus.
The memory 1202 may be a volatile memory (RAM), such as a random-access memory (RAM); the memory 1202 may also be a non-volatile memory (non-volatile memory), such as a read-only memory, a flash memory (flash memory), a Hard Disk Drive (HDD) or a Solid State Drive (SSD), or the memory 1202 may be any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited thereto. Memory 1202 may be a combination of the above.
A processor 1201 for executing any of the account login control methods discussed above when invoking a computer program stored in the memory 1202.
Based on the same inventive concept, embodiments of the present application provide a computer device, which corresponds to the second terminal discussed above, referring to fig. 13, and includes a processor 1301 and a memory 1302.
Processor 1301 may be a central processing unit (central processing unit, CPU), or a digital processing unit or the like. The specific connection medium between the memory 1302 and the processor 1301 is not limited in the embodiments of the present application. In the embodiment of the present application, the memory 1302 and the processor 1301 are connected through the bus 1303 in fig. 13, the bus 1303 is indicated by a thick line in fig. 13, and the connection manner between other components is only schematically illustrated, but not limited to. The bus 1303 may be classified into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 13, but not only one bus or one type of bus.
The memory 1302 may be a volatile memory (RAM), such as a random-access memory (RAM); the memory 1302 may also be a non-volatile memory (non-volatile memory), such as a read-only memory, a flash memory (flash memory), a Hard Disk Drive (HDD) or a Solid State Drive (SSD), or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited thereto. Memory 1302 may be a combination of the above.
Processor 1301 is configured to execute any of the account login control methods discussed above when invoking a computer program stored in memory 1302.
Based on the same inventive concept, the embodiments of the present application provide a storage medium storing computer instructions that, when executed on a computer, cause the computer to perform any one of the account login control methods discussed above. The storage medium is a computer storage medium.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Based on the same inventive concept, embodiments of the present application provide a computer program product comprising computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the account login control method.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware associated with program instructions, where the foregoing program may be stored in a computer readable storage medium, and when executed, the program performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, or the like, which can store program codes.
Alternatively, the integrated units described above may be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partly contributing to the prior art, and the computer software product may be stored in a storage medium, and include several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, ROM, RAM, magnetic or optical disk, or other medium capable of storing program code.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to cover such modifications and variations.

Claims (15)

1. An account login control method is characterized by being applied to a first terminal, and comprises the following steps:
calling a communication module of the first terminal through an application program running on the first terminal, and establishing a short-distance communication link with a second terminal;
receiving a login request of a second terminal based on a target account number based on the short-distance communication link;
in response to a confirmation operation for the login request, displaying a login state of the application program as the target account number is logged in the application program;
when the short-distance communication link is disconnected, displaying the login state of the application program as that the target account number is logged out of the application program;
the application program is configured with a unique application identifier distributed to the application program by a third party platform; displaying the login state of the application program as the target account number logs in the application program comprises the following steps:
Transmitting the unique application identifier to the second terminal so that the second terminal can execute the following operations:
according to the unique application identifier, a temporary authorization credential required by logging in the application program by utilizing the target account number is requested to be obtained from the third party platform, and according to the temporary authorization credential and the unique application identifier, a formal authorization credential is obtained from the third party platform, login information containing the formal authorization credential is generated, the login information also comprises a credential validity period of the formal authorization credential and a credential refreshing period of the formal authorization credential, and the credential validity period is smaller than the credential refreshing period;
receiving the login information sent by the second terminal;
requesting a first server corresponding to the application program to log in the target account according to the login information;
when a response of successful account login fed back by the first server is received, displaying the login state of the application program as that the target account logs in the application program;
if the valid period of the certificate is exceeded and the certificate refreshing period is within, receiving an updated formal authorization certificate sent by the second terminal;
Requesting to keep the target account login from the first server according to the updated formal authorization credential;
when receiving a response of account login maintenance fed back by the first server, displaying the login state of the application program as that the target account logs in the application program;
and deleting the login information if the credential refreshing period exceeds the period.
2. The method of claim 1, wherein the login information further comprises: historical use information of the target account number in the application program association and user personal information corresponding to the target account number in the third-party platform;
and displaying the login state of the application program as the target account number after the application program is logged in according to the login information, wherein the method further comprises the following steps:
and respectively displaying the history use information and the user personal information on an interface corresponding to the application program.
3. The method of claim 2, wherein the displaying the login status of the application as the target account exiting the login of the application when the short-range communication link is broken comprises:
When the short-distance communication link is disconnected, an account exit request is sent to a first server corresponding to the application program, so that the first server executes the exit operation of the target account;
and receiving an account exit response fed back by the first server, displaying the login state of the application program as the login state of the target account exit to the application program, and deleting the historical use information and the user personal information.
4. The method of claim 1 or 2, wherein the login information further includes session information and a session validity period of the session information, and after displaying the login status of the application as the target account number exits logging into the application when the short-range communication link is disconnected, the method further comprises:
if the session is in the validity period, reestablishing a short-distance communication link with the second terminal, and acquiring login state information from the second terminal based on the session information;
and displaying the login state of the application program as the login state of the target account number exiting the login of the application program according to the login state information.
5. An account login control method applied to a second terminal is characterized by comprising the following steps:
When the first terminal is monitored to call broadcast information sent by a communication module of the first terminal through an application program, a connection request is sent to the first terminal, and a short-distance communication link is established with the first terminal;
acquiring login information, wherein the login information is used for logging in the application program by utilizing a target account;
based on the short-range communication link, the login information is sent to a first terminal, so that the first terminal can execute the following operations: according to the login information, displaying the login state of the application program in the first terminal as that the target account number logs in the application program, and displaying the login state of the application program as that the target account number exits from logging in the application program when the short-distance communication link is disconnected;
the application program is configured with a unique application identifier distributed to the application program by a third party platform; displaying the login state of the application program as the target account number logs in the application program comprises the following steps:
receiving the unique application identification from the first terminal;
according to the unique application identifier, a temporary authorization credential required by logging in the application program by utilizing the target account number is requested to be obtained from the third party platform, and according to the temporary authorization credential and the unique application identifier, a formal authorization credential is obtained from the third party platform, login information containing the formal authorization credential is generated, the login information also comprises a credential validity period of the formal authorization credential and a credential refreshing period of the formal authorization credential, and the credential validity period is smaller than the credential refreshing period;
If the valid period of the certificate is exceeded, but in the certificate refreshing period, the updated formal authorization certificate is sent to the first terminal, so that the first terminal performs the following operations: requesting to maintain the login state of the target account number to a first server corresponding to the application program according to the updated formal authorization credential, and displaying the login state of the application program of the first terminal as the login state of the target account number to log in the application program when receiving an account number login maintenance response fed back by the first server;
and deleting the login information if the credential refreshing period exceeds the period.
6. The method of claim 5, wherein the obtaining login information comprises:
requesting, from a third party platform, obtaining temporary authorization credentials to log in to the target account on the application;
requesting to obtain a formal authorization credential from the third party platform according to the temporary authorization credential and the unique application identifier, and generating login information containing the formal authorization credential; the unique application identification is obtained from the first terminal based on the short-range communication link, and the unique application identification is an identification allocated to the application program by the third party platform.
7. The method of claim 6, wherein said requesting a formal authorization credential from the third party platform based on the temporary authorization credential and a unique application identification comprises:
transmitting the temporary authorization credential and the unique application identifier to a first server corresponding to the application program, so that the first server performs the following operations: obtaining an application interface key corresponding to the unique application identifier, and requesting to obtain a formal authorization credential from the third party platform according to the application interface key, the unique application identifier and the temporary authorization credential;
the formal authorization credential is obtained from the first server.
8. The method of any of claims 5-7, wherein the obtaining login information further comprises:
acquiring historical use information of the target account in the application program from a first server corresponding to the application program; the method comprises the steps of,
obtaining user personal information of the target account number from the first server; the user personal information is obtained by the first server according to the formal authorization credentials;
Based on the short-range communication link, the login information is sent to a first terminal, and the method further comprises the following steps:
and sending the history use information and the user personal information to the first terminal so that the first terminal can respectively display the history use information and the user personal information on an interface corresponding to the application program.
9. The method of any of claims 5-7, wherein the login information further comprises session information and a session validity period of the session information, the method further comprising, after transmitting the login information to the first terminal based on the short-range communication link:
if the short-distance communication link between the first terminal and the first terminal is disconnected and the short-distance communication link is re-established with the first terminal in the session validity period, the login state information of the target account is sent to the first terminal through the session information, so that the first terminal re-displays the login state of the application program of the first terminal as the login state of the target account according to the login state information.
10. An account login control device, which is applied to a first terminal, the device comprising:
The communication module is used for calling the communication module of the first terminal through an application program running on the first terminal and establishing a short-distance communication link with the second terminal;
the receiving and transmitting module is used for receiving a login request of the second terminal based on the target account number based on the short-distance communication link;
the display module is used for responding to the confirmation operation of the login request, displaying the login state of the application program as the login of the application program by the target account, and displaying the login state of the application program as the login of the application program by the target account when the short-distance communication link is disconnected;
the application program is configured with a unique application identifier distributed to the application program by a third party platform; displaying the login state of the application program as the target account number logs in the application program comprises the following steps:
transmitting the unique application identifier to the second terminal so that the second terminal can execute the following operations:
according to the unique application identifier, a temporary authorization credential required by logging in the application program by utilizing the target account number is requested to be obtained from the third party platform, and according to the temporary authorization credential and the unique application identifier, a formal authorization credential is obtained from the third party platform, login information containing the formal authorization credential is generated, the login information also comprises a credential validity period of the formal authorization credential and a credential refreshing period of the formal authorization credential, and the credential validity period is smaller than the credential refreshing period;
Receiving the login information sent by the second terminal;
requesting a first server corresponding to the application program to log in the target account according to the login information;
when a response of successful account login fed back by the first server is received, displaying the login state of the application program as that the target account logs in the application program;
if the valid period of the certificate is exceeded and the certificate refreshing period is within, receiving an updated formal authorization certificate sent by the second terminal;
requesting to keep the target account login from the first server according to the updated formal authorization credential;
when receiving a response of account login maintenance fed back by the first server, displaying the login state of the application program as that the target account logs in the application program;
and deleting the login information if the credential refreshing period exceeds the period.
11. The apparatus of claim 10, wherein the login information further comprises: historical use information of the target account number in the application program association and user personal information corresponding to the target account number in the third-party platform;
And displaying the login state of the application program according to the login information, wherein the display module is further used for:
and respectively displaying the history use information and the user personal information on an interface corresponding to the application program.
12. The apparatus of claim 11, wherein the display module is further to:
when the short-distance communication link is disconnected, an account exit request is sent to a first server corresponding to the application program, so that the first server executes the exit operation of the target account;
and receiving an account exit response fed back by the first server, displaying the login state of the application program as the login state of the target account exit to the application program, and deleting the historical use information and the user personal information.
13. An account login control device, which is applied to a second terminal, the device comprising:
the receiving and transmitting module is used for transmitting a connection request to the first terminal when monitoring that the first terminal calls the broadcast information transmitted by the communication module of the first terminal through an application program;
The establishing module is used for establishing a short-distance communication link with the first terminal;
the acquisition module is used for acquiring login information, wherein the login information is used for logging in the application program by utilizing a target account;
the receiving and transmitting module is used for transmitting the login information to a first terminal based on the short-distance communication link so as to enable the first terminal to execute the following operations: according to the login information, displaying the login state of the application program in the first terminal as that the target account number logs in the application program, and displaying the login state of the application program as that the target account number exits from logging in the application program when the short-distance communication link is disconnected;
the application program is configured with a unique application identifier distributed to the application program by a third party platform; displaying the login state of the application program as the target account number logs in the application program comprises the following steps:
receiving the unique application identification from the first terminal;
according to the unique application identifier, a temporary authorization credential required by logging in the application program by utilizing the target account number is requested to be obtained from the third party platform, and according to the temporary authorization credential and the unique application identifier, a formal authorization credential is obtained from the third party platform, login information containing the formal authorization credential is generated, the login information also comprises a credential validity period of the formal authorization credential and a credential refreshing period of the formal authorization credential, and the credential validity period is smaller than the credential refreshing period;
If the valid period of the certificate is exceeded, but in the certificate refreshing period, the updated formal authorization certificate is sent to the first terminal, so that the first terminal performs the following operations: requesting to maintain the login state of the target account number to a first server corresponding to the application program according to the updated formal authorization credential, and displaying the login state of the application program of the first terminal as the login state of the target account number to log in the application program when receiving an account number login maintenance response fed back by the first server;
and deleting the login information if the credential refreshing period exceeds the period.
14. The apparatus of claim 13, wherein the acquisition module is specifically configured to:
requesting, from a third party platform, obtaining temporary authorization credentials to log in to the target account on the application;
requesting to obtain a formal authorization credential from the third party platform according to the temporary authorization credential and the unique application identifier, and generating login information containing the formal authorization credential; the unique application identification is obtained from the first terminal based on the short-range communication link, and the unique application identification is an identification allocated to the application program by the third party platform.
15. A storage medium storing computer instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 4 or 5 to 9.
CN202011370994.8A 2020-11-30 2020-11-30 Account login control method, device and medium Active CN114640880B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011370994.8A CN114640880B (en) 2020-11-30 2020-11-30 Account login control method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011370994.8A CN114640880B (en) 2020-11-30 2020-11-30 Account login control method, device and medium

Publications (2)

Publication Number Publication Date
CN114640880A CN114640880A (en) 2022-06-17
CN114640880B true CN114640880B (en) 2023-06-30

Family

ID=81945362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011370994.8A Active CN114640880B (en) 2020-11-30 2020-11-30 Account login control method, device and medium

Country Status (1)

Country Link
CN (1) CN114640880B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5923756A (en) * 1997-02-12 1999-07-13 Gte Laboratories Incorporated Method for providing secure remote command execution over an insecure computer network
WO2006129404A1 (en) * 2005-05-31 2006-12-07 Sharp Kabushiki Kaisha Contents reproduction device, method for providing service-related information, service-related information providing device, and service providing system
CN103731424A (en) * 2013-12-30 2014-04-16 优视科技有限公司 Network data transmitting method, device and system
CN105939353A (en) * 2016-06-10 2016-09-14 北京数盾信息科技有限公司 Security management and information feedback system based on GDOI protocol
CN106303599A (en) * 2016-08-11 2017-01-04 腾讯科技(深圳)有限公司 A kind of information processing method, system and server
WO2017152820A1 (en) * 2016-03-11 2017-09-14 腾讯科技(深圳)有限公司 Client login method and device, and storage medium
WO2018113690A1 (en) * 2016-12-23 2018-06-28 腾讯科技(深圳)有限公司 Login authorisation method and apparatus, and login method and apparatus
CA3031896A1 (en) * 2018-01-31 2019-07-31 Comcast Cable Communications, Llc Managing encryption keys for content
CN110324276A (en) * 2018-03-28 2019-10-11 腾讯科技(深圳)有限公司 A kind of method, system, terminal and electronic equipment logging in application
CN110650158A (en) * 2019-10-25 2020-01-03 深圳市公网时代科技有限公司 Device and method for automatically logging in and logging out through mobile terminal control platform
CN111526111A (en) * 2019-02-02 2020-08-11 腾讯科技(深圳)有限公司 Control method, device and equipment for logging in light application and computer storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5923756A (en) * 1997-02-12 1999-07-13 Gte Laboratories Incorporated Method for providing secure remote command execution over an insecure computer network
WO2006129404A1 (en) * 2005-05-31 2006-12-07 Sharp Kabushiki Kaisha Contents reproduction device, method for providing service-related information, service-related information providing device, and service providing system
CN103731424A (en) * 2013-12-30 2014-04-16 优视科技有限公司 Network data transmitting method, device and system
WO2017152820A1 (en) * 2016-03-11 2017-09-14 腾讯科技(深圳)有限公司 Client login method and device, and storage medium
CN105939353A (en) * 2016-06-10 2016-09-14 北京数盾信息科技有限公司 Security management and information feedback system based on GDOI protocol
CN106303599A (en) * 2016-08-11 2017-01-04 腾讯科技(深圳)有限公司 A kind of information processing method, system and server
WO2018113690A1 (en) * 2016-12-23 2018-06-28 腾讯科技(深圳)有限公司 Login authorisation method and apparatus, and login method and apparatus
CA3031896A1 (en) * 2018-01-31 2019-07-31 Comcast Cable Communications, Llc Managing encryption keys for content
CN110324276A (en) * 2018-03-28 2019-10-11 腾讯科技(深圳)有限公司 A kind of method, system, terminal and electronic equipment logging in application
CN111526111A (en) * 2019-02-02 2020-08-11 腾讯科技(深圳)有限公司 Control method, device and equipment for logging in light application and computer storage medium
CN110650158A (en) * 2019-10-25 2020-01-03 深圳市公网时代科技有限公司 Device and method for automatically logging in and logging out through mobile terminal control platform

Also Published As

Publication number Publication date
CN114640880A (en) 2022-06-17

Similar Documents

Publication Publication Date Title
US20100071056A1 (en) Method and system for multi-protocol single logout
CN112380511B (en) Account control method, device, equipment and computer readable storage medium
KR101960062B1 (en) Content Sharing Method and Device Thereof
US20130018948A1 (en) Method and system for use in providing network services interchange
US20150188983A1 (en) Dynamically launching a server-based application on a mobile device
US10165392B2 (en) Access of virtual resources based on a contextual frame of reference
KR20160014038A (en) Synchronizing device association data among computing devices
US20180307566A1 (en) Method and apparatus for subscriber management
US20200228611A1 (en) System and method for coupling two separate applications to an application session within a serverless infrastructure
KR20130026609A (en) Apparatus and method for providing multimedia cloud service associated with social network service in multimedia cloud system
US20220158949A1 (en) Enterprise business mobile dashboard
WO2021102691A1 (en) Resource subscription method and apparatus, computer device, and storage medium
CN111405016A (en) User information acquisition method and related equipment
WO2017219587A1 (en) Master-slave device switching method, slave device, management server, and storage medium
CN114760112A (en) Wireless local area network-oriented intelligent household equipment network access method, system, equipment and storage medium
CN114844663A (en) Desktop sharing method, system, storage medium and equipment
CN112583866A (en) Sharing method and device of intelligent household electrical appliance, electronic equipment and medium
WO2016062114A1 (en) Information processing method, epg server and client
CN114640880B (en) Account login control method, device and medium
JP2017097652A (en) Management system, communication system, communication control method, and program
US20230353805A1 (en) Methods, systems, and media for presenting media content items using multiple devices
US20130308633A1 (en) Determining A Location Address For Shared Data
JP2017098780A (en) Management system, communication system, communication control method, and program
CN113332710A (en) Game account login method and device, electronic equipment and storage medium
US9232281B2 (en) Communication management apparatus, terminal, communication management system, communication management method, program, and information storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40070946

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant