CN114666082B - Login method, first terminal, second terminal, storage medium and login system - Google Patents

Login method, first terminal, second terminal, storage medium and login system Download PDF

Info

Publication number
CN114666082B
CN114666082B CN202011551081.6A CN202011551081A CN114666082B CN 114666082 B CN114666082 B CN 114666082B CN 202011551081 A CN202011551081 A CN 202011551081A CN 114666082 B CN114666082 B CN 114666082B
Authority
CN
China
Prior art keywords
terminal
information
server
account information
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011551081.6A
Other languages
Chinese (zh)
Other versions
CN114666082A (en
Inventor
郁清清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qwik Smart Technology Co Ltd
Original Assignee
Shanghai Qwik Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qwik Smart Technology Co Ltd filed Critical Shanghai Qwik Smart Technology Co Ltd
Priority to CN202011551081.6A priority Critical patent/CN114666082B/en
Publication of CN114666082A publication Critical patent/CN114666082A/en
Application granted granted Critical
Publication of CN114666082B publication Critical patent/CN114666082B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Abstract

The application relates to a login method applied between a first terminal and a second terminal, comprising the following steps: the first terminal displays a login code of a first application program; the method comprises the steps that a second terminal obtains account information of a first server to be sent, wherein the first server corresponds to a first application program, and the account information is account information of logging in a second application program; and when the account information is the information which cannot be identified by the first server, displaying the prompt information which cannot be identified. The application also provides a login method applied to the first terminal, a login method applied to the second terminal, the first terminal, the second terminal, a storage medium and a login system. When the account information of the second application program is the information which can not be identified by the first server or the first terminal corresponding to the first application program, the prompt information which can not be identified is displayed through the first terminal and/or the second terminal, so that misjudgment of a user on the reason of incapability of normally logging in is avoided, and the success rate and the efficiency of logging in can be further improved.

Description

Login method, first terminal, second terminal, storage medium and login system
Technical Field
The present application relates to the field of interaction technologies, and in particular, to a login method, a first terminal, a second terminal, a storage medium, and a login system.
Background
With the advancement of society, automobiles have been moved into thousands of households, and in order to facilitate user management and improve the accuracy of information pushing, etc., the automobiles often require users to perform login operations.
However, when a plurality of car owner users feed back to log in the personal center of the car by using the mobile phone micro-letter scanning code, the mobile phone end micro-letter scanning code is successfully logged in, but the car is still positioned on the two-dimension code interface where the scanning code is logged in, so that the car cannot enter the main interface, and the normal use of the car owners is affected. In view of the above problems, those skilled in the art have sought solutions.
The foregoing description is provided for general background information and does not necessarily constitute prior art.
Disclosure of Invention
The technical problem to be solved by the application is to provide a login method, a first terminal, a second terminal, a storage medium and a login system aiming at the defects of the prior art, so as to display prompt information which cannot be identified when account information comprises information which cannot be identified by a first server and/or the first terminal.
The application is realized in the following way:
on the one hand, the application provides a login method, which is applied between a first terminal and a second terminal and comprises the following steps: the first terminal displays a login code of a first application program; the second terminal obtains account information to be sent to a first server, wherein the first server corresponds to the first application program, and the account information is account information of logging in a second application program; when the account information comprises information which cannot be identified by the first server and/or the first terminal, the first terminal and/or the second terminal displays prompt information which cannot be identified.
In still another aspect, the present application further provides a login method, which is applied to a first terminal, including: displaying a login code, wherein the login code corresponds to a first application program; receiving account information of a second application program sent by a first server, wherein the first server corresponds to the first application program; and when the account information comprises information which cannot be identified by the first server and/or the first terminal, displaying the prompt information which cannot be identified.
In yet another aspect, the present application further provides a first terminal, including a first memory and a first processor, where the first memory stores a computer program; the first processor is configured to execute the computer program to implement the login method described above.
In still another aspect, the present application further provides a login method, which is applied to a second terminal, including: scanning a login code displayed by a first terminal, wherein the login code corresponds to a first application program; acquiring account information to be sent to a first server, wherein the first server corresponds to the first application program, and the account information is account information of logging in a second application program; and when the account information comprises information which cannot be identified by the first server and/or the first terminal, displaying the prompt information which cannot be identified.
In yet another aspect, the present application further provides a second terminal, including a second memory and a second processor, where the second memory stores a computer program; the second processor is configured to execute the computer program to implement the login method described above.
In yet another aspect, the present application further provides a storage medium, where a computer program is stored, where the computer program when executed by a processor implements the above-mentioned login method.
In still another aspect, the present application further provides a login system, including a first terminal and a second terminal; the first terminal displays a login code corresponding to a first application program; the second terminal obtains account information to be sent to a first server, wherein the first server corresponds to the first application program, and the account information is account information of logging in a second application program; the first terminal and/or the second terminal are/is further configured to display prompt information that cannot be identified when the account information includes information that cannot be identified by the first server and/or the first terminal.
According to the login method, the first terminal, the second terminal, the storage medium and the login system, when the account information of the second application program is the information which can not be identified by the first server or the first terminal corresponding to the first application program, the prompt information which can not be identified is displayed through the first terminal and/or the second terminal, so that misjudgment of a user on reasons of incapability of normal login is avoided, and the success rate and the efficiency of login can be further improved.
The foregoing and other objects, features and advantages of the application will be apparent from the following more particular description of preferred embodiments, as illustrated in the accompanying drawings.
Drawings
FIG. 1 is a flowchart of a login method according to a first embodiment of the present application;
fig. 2 is a schematic diagram of an application scenario of a login method according to an embodiment of the present application;
FIG. 3 is a flowchart of a login method according to a second embodiment of the present application;
FIG. 4 is a flowchart of a login method according to a third embodiment of the present application;
fig. 5 is a schematic structural diagram of a login system according to a fourth embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the described embodiments are merely some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a login method according to a first embodiment of the present application. The login method shown in fig. 1 is applied between a first terminal and a second terminal, wherein the first terminal can be, but not limited to, a vehicle-mounted terminal, and the second terminal can be, but not limited to, a mobile terminal such as a mobile phone or the like. Referring to fig. 1, the login method in this embodiment specifically includes the following steps:
step S11: the first terminal displays a login code for logging in a first application program;
specifically, the login code includes, but is not limited to, a two-dimensional code. The first application may be, for example, but not limited to, a blue applet or the like.
Step S12: the second terminal acquires account information to be sent to a first server, wherein the first server corresponds to a first application program, and the account information is account information for logging in a second application program;
in one embodiment, the second application and the first application are different applications, and the first application and the second application are associated by an association operation of a user. In order to better understand the steps, the following description will take the case that the first application program is the blue, the second application program is the WeChat, the first terminal is the vehicle-mounted terminal, and the second terminal is the mobile phone as an example, and the specific process of S11 is as follows: the vehicle-mounted terminal displays a login code of the login blue. The specific process in step S12 is that the user scans the login code on the mobile phone through the WeChat, or logs in the WeChat with the WeChat, so as to obtain the account information of the WeChat to be sent to the WeChat server. Of course, it will be understood by those skilled in the art that the first application program may also be the second application program, for example, the second terminal may directly scan the login code by using the blue application program.
Specifically, after the second terminal can scan the login code through a second application program such as a code scanning function of the WeChat, the account information of the WeChat is synchronized to the Ublue server through the Ublue applet.
The account information of the WeChat may include, but is not limited to, an account identifier of the WeChat, an account name of the WeChat, and the like.
Step S13: when the account information comprises information which cannot be identified by the first server and/or the first terminal, the first terminal and/or the second terminal display the prompt information which cannot be identified.
In particular, the unrecognizable information includes, but is not limited to, characters or the like that are unrecognizable.
Fig. 2 is a schematic application scenario diagram of a login method according to an embodiment of the application. As shown in fig. 2, when the first terminal 10, for example, the vehicle-mounted terminal, cannot recognize the account name of the first application program, for example, the WeChat, and the first server 20, for example, the blue server, can recognize the account information, for example, the WeChat account identifier and the WeChat account name (WeChat account nickname), in the WeChat, the blue server returns the user page information of the blue program corresponding to the WeChat account information to the second terminal 20 according to the WeChat account identifier, so that the second terminal 30, for example, the mobile phone, normally logs in the blue program interface, and the vehicle-mounted terminal cannot normally log in the blue program due to the fact that the first application program, for example, the account name in the WeChat cannot be recognized.
Specifically, the user page information of the fruit blue program includes, but is not limited to, for example, real-time speed of the vehicle, position information of the vehicle, and the like.
In an embodiment, whether the account information includes information that cannot be identified by the first server and/or the first terminal may, but is not limited to, feedback after the first server makes the determination, that is, step S13: when the account information comprises information which can not be identified by the first server and/or the first terminal, the first terminal and/or the second terminal display the prompt information which can not be identified comprises: the second terminal synchronizes account information of the second application program to the first server; the second terminal and/or the first terminal receives unidentifiable feedback information aiming at account information, which is sent by a first server; and the second terminal and/or the first terminal displays the unidentified prompt information according to the unidentified feedback information.
In other embodiments, the determination of whether the account information includes information unrecognizable by the first terminal may be, but is not limited to, performed by the first terminal itself. That is, step S13: when the account information comprises information which can not be identified by the first server and/or the first terminal, the first terminal and/or the second terminal display the prompt information which can not be identified comprises: when the first terminal judges that the account information comprises information which cannot be identified by the first terminal, the first terminal displays prompt information which cannot be identified.
In one embodiment, step S13: when the account information comprises information which can not be identified by the first server and/or the first terminal, the first terminal and/or the second terminal display the prompt information which can not be identified comprises: the first terminal and/or the second terminal highlights character information which cannot be identified in the account information; and/or the first terminal and/or the second terminal displays the characteristics of the characters recognizable by the first server and/or the characteristics of the characters unrecognizable by the first server. Specifically, for example, the first terminal, for example, the vehicle-mounted terminal displays character information such as "the account name in the account information cannot be recognized", or plays voice content such as "the account name in the account information cannot be recognized". Specifically, the first terminal displays the unrecognizable information for itself, and the second terminal displays the unrecognizable information for the first terminal, so that the user can obtain feedback information unrecognizable by the first terminal through any one of the first terminal and the second terminal.
In an embodiment, the login method further comprises:
the second terminal receives a modification instruction of account information aiming at a second application program;
the second terminal updates account information according to the modification instruction;
the second terminal synchronizes the updated account information to the first server, so that the first server sends the updated account information to the first terminal when identifying the updated account information;
and after receiving and identifying the updated account information, the first terminal displays the logged-in user page information.
Fig. 3 is a flowchart of a login method according to a second embodiment of the present application. As shown in fig. 3, the login method of the present embodiment may be applied to a first terminal, for example, a vehicle-mounted terminal, including:
step S31: displaying a login code, wherein the login code corresponds to the first application program;
specifically, when receiving the login instruction, the first terminal receives information of a login code, such as a two-dimensional code, sent by the first server, and then displays the login code, such as the two-dimensional code.
Step S32: receiving account information of a second application program sent by a first server, wherein the first server corresponds to the first application program;
in an embodiment, the second application program and the first application program are different application programs, and the first application program and the second application program are associated through an association operation of a user, for example, the user logs in a blue applet on a mobile phone through WeChat, etc., and of course, it is understood by those skilled in the art that the first application program may also be the second application program.
Step S33: and when the account information comprises information which cannot be identified by the first server and/or the first terminal, displaying the prompt information which cannot be identified.
Specifically, in an embodiment, if the first server can identify the account information and the first terminal cannot identify the account name (account nickname) in the account information, the first server pushes corresponding user page information to the first terminal according to the account identifier in the account information of the second application program, and when the first terminal receives the user page information, the first terminal cannot log in normally because the account name in the user page information cannot be identified.
Specifically, in an embodiment, the first terminal switches from displaying the login code to displaying the prompt information which cannot be identified. In other embodiments, the first terminal may display the login code and the unrecognizable prompt information simultaneously.
Fig. 4 is a flowchart of a login method according to a third embodiment of the present application. The login method shown in fig. 4 is applied to a second terminal, such as a mobile terminal including:
step S41: scanning a login code displayed by a first terminal, wherein the login code corresponds to a first application program;
step S42: acquiring account information to be sent to a first server, wherein the first server corresponds to a first application program, and the account information is account information of logging in a second application program;
step S43: and when the account information comprises information which cannot be identified by the first server and/or the first terminal, displaying the prompt information which cannot be identified.
Specifically, for example, when a special character exists in an account name of a first application program, such as a WeChat, the first terminal cannot identify account information of a second application program, such as an account name of the WeChat, and the first server, such as a blue server, can identify account information in the WeChat, such as a WeChat account identifier and a WeChat account name (WeChat account nickname), the blue server returns user page information of the blue program corresponding to the WeChat account information to the second terminal, such as a mobile phone and a vehicle-mounted terminal, according to the WeChat account identifier, the mobile phone normally logs in a blue applet interface, and the vehicle-mounted terminal cannot normally log in due to the fact that the account name of the first application program, such as the WeChat, cannot be identified. The blue server may, but is not limited to, directly send the user page information of the blue program to the vehicle-mounted terminal, or send the vehicle owner page information corresponding to the user page information of the blue program to the vehicle-mounted terminal through the vehicle background server.
In an embodiment, the second terminal displays the unidentifiable prompt information when determining that the first terminal cannot identify the account information of the second application. In other embodiments, the second terminal may also display the prompt information that cannot be identified when receiving the feedback information returned by the first server. The feedback information is used for feeding back account information that the first terminal cannot identify the second application program.
Fig. 5 is a schematic structural diagram of a login system according to a fourth embodiment of the present application. The login system comprises a first terminal 50 and a second terminal 60. The first terminal 50 shows a login code corresponding to the first application. The second terminal 60 obtains account information to be sent to a first server, where the first server corresponds to a first application program, and the account information is account information of logging in a second application program. The first terminal 50 and/or the second terminal 60 are further configured to display the unrecognizable prompt information when the account information includes information unrecognizable by the first server and/or the first terminal 50.
In an embodiment, the first terminal 50 is an in-vehicle terminal, and the second terminal 60 is a mobile terminal.
In yet another aspect, the present application further provides a first terminal 50, including a first memory and a first processor, wherein the first memory stores a computer program; the first processor is configured to execute the computer program to implement the login method as described in the claims.
In yet another aspect, the present application further provides a login method, applied to the second terminal 51, including: scanning a login code displayed by the first terminal 50, wherein the login code corresponds to the first application program; acquiring account information to be sent to a first server, wherein the first server corresponds to the first application program, and the account information is account information of logging in a second application program; and when the account information comprises information which cannot be identified by the first server and/or the first terminal 50, displaying the prompt information which cannot be identified.
In yet another aspect, the present application further provides a second terminal 51, including a second memory and a second processor, wherein the second memory stores a computer program; the second processor is configured to execute the computer program to implement the login method described above.
In yet another aspect, the present application further provides a storage medium, where a computer program is stored, where the computer program implements the above-mentioned login method when executed by a processor.
According to the login method, the first terminal, the second terminal, the storage medium and the login system, when the account information of the second application program is the information which is unrecognizable by the first server corresponding to the first application program or the first terminal, the first terminal and/or the second terminal is used for displaying the unrecognizable prompt information, so that misjudgment of a user on reasons of incapability of normal login is avoided (for example, the account names of small programs can synchronize WeChat account names in a WeChat code login process, due to the fact that special characters or expression symbols exist in the WeChat account names of the user, the vehicle cannot recognize the special characters, the vehicle cannot skip in code scanning login, and the vehicle and a mobile phone are not provided with any error to prompt the user, so that the user is easily guided to be a problem of vehicle fault).
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, element, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, element, or apparatus. Without further limitation, the element defined by the phrase "comprising one … …" does not exclude the presence of other identical elements in a process, method, article, element or apparatus that comprises the element, and furthermore, elements, features, elements, etc. that are identically named in different embodiments of the present application may have identical meanings, or may have different meanings, the particular meaning of which is to be determined by its interpretation in this particular embodiment or further context of this particular embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context. Furthermore, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, steps, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, steps, operations, elements, components, items, categories, and/or groups. The terms "or" and/or "as used herein are to be construed as inclusive, or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a, A is as follows; b, a step of preparing a composite material; c, performing operation; a and B; a and C; b and C; A. b and C). An exception to this definition will occur only when a combination of elements, functions, steps or operations are in some way inherently mutually exclusive.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather is intended to cover all modifications, equivalents, or alternatives falling within the spirit and principles of the application.

Claims (13)

1. A login method, applied between a first terminal and a second terminal, comprising:
the first terminal displays a login code for logging in a first application program;
the second terminal obtains account information to be sent to a first server, wherein the first server corresponds to the first application program, and the account information is account information of logging in a second application program;
when the account information comprises information which cannot be identified by the first server and/or the first terminal, the first terminal and/or the second terminal displays prompt information which cannot be identified.
2. The login method of claim 1, further comprising the steps of:
the second terminal receives a modification instruction of account information of the second application program;
the second terminal updates the account information according to the modification instruction;
the second terminal synchronizes the updated account information to the first server, so that the first server sends the updated account information to the first terminal when identifying the updated account information;
and after the first terminal receives and identifies the updated account information, displaying the logged-in user page information.
3. The login method according to claim 1, wherein when the account information includes information unrecognizable by the first server and/or the first terminal, the step of the first terminal and/or the second terminal displaying unrecognizable prompt information includes the steps of:
the second terminal synchronizes account information of logging in the second application program to the first server;
the second terminal and/or the first terminal receives unidentifiable feedback information which is sent by the first server and is aiming at the account information;
and the second terminal and/or the first terminal displays the unidentifiable prompt information according to the unidentifiable feedback information.
4. The login method according to claim 1, wherein when the account information includes information unrecognizable by the first server and/or the first terminal, the step of the first terminal and/or the second terminal displaying unrecognizable prompt information includes the steps of:
and when the first terminal judges that the account information comprises information which cannot be identified by the first terminal, displaying the prompt information which cannot be identified.
5. The login method according to claim 1, wherein when the account information includes information unrecognizable by the first server and/or the first terminal, the step of the first terminal and/or the second terminal displaying unrecognizable prompt information includes the steps of:
the first terminal and/or the second terminal highlights character information which cannot be identified in the account information; and/or
The first terminal and/or the second terminal displays the character characteristics which can be identified by the first server and/or the character characteristics which cannot be identified by the first server.
6. The login method of claim 1, further comprising the steps of:
and when the account information is the information which can be identified by the first server and the first terminal, switching from displaying the login code to displaying login success information.
7. A login method applied to a first terminal, comprising:
displaying a login code, wherein the login code corresponds to a first application program;
receiving account information of a second application program sent by a first server, wherein the first server corresponds to the first application program;
and when the account information comprises information which cannot be identified by the first server and/or the first terminal, displaying the prompt information which cannot be identified.
8. A first terminal comprising a first memory and a first processor, wherein the first memory has a computer program stored therein;
the first processor is configured to execute the computer program to implement the login method of claim 7.
9. A login method applied to a second terminal, comprising:
scanning a login code displayed by a first terminal, wherein the login code corresponds to a first application program;
acquiring account information to be sent to a first server, wherein the first server corresponds to the first application program, and the account information is account information of logging in a second application program;
and when the account information comprises information which cannot be identified by the first server and/or the first terminal, displaying the prompt information which cannot be identified.
10. A second terminal comprising a second memory and a second processor, wherein the second memory has a computer program stored therein;
the second processor is configured to execute the computer program to implement the login method of claim 9.
11. A storage medium having stored thereon a computer program which, when executed by a processor, implements the login method according to claim 7 or 9.
12. A login system comprising a first terminal and a second terminal; the first terminal displays a login code corresponding to a first application program; the second terminal obtains account information to be sent to a first server, wherein the first server corresponds to the first application program, and the account information is account information of logging in a second application program;
the first terminal and/or the second terminal are/is further configured to display prompt information that cannot be identified when the account information includes information that cannot be identified by the first server and/or the first terminal.
13. The login system of claim 12 in which,
the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal; and/or
The login code is a two-dimensional code.
CN202011551081.6A 2020-12-24 2020-12-24 Login method, first terminal, second terminal, storage medium and login system Active CN114666082B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011551081.6A CN114666082B (en) 2020-12-24 2020-12-24 Login method, first terminal, second terminal, storage medium and login system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011551081.6A CN114666082B (en) 2020-12-24 2020-12-24 Login method, first terminal, second terminal, storage medium and login system

Publications (2)

Publication Number Publication Date
CN114666082A CN114666082A (en) 2022-06-24
CN114666082B true CN114666082B (en) 2023-09-26

Family

ID=82024761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011551081.6A Active CN114666082B (en) 2020-12-24 2020-12-24 Login method, first terminal, second terminal, storage medium and login system

Country Status (1)

Country Link
CN (1) CN114666082B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388005A (en) * 2003-03-14 2009-03-18 夏普株式会社 Content processing device and method
CN103345493A (en) * 2013-06-27 2013-10-09 广州市动景计算机科技有限公司 Method, device and system for text content displaying on mobile terminal
CN108111392A (en) * 2017-11-29 2018-06-01 努比亚技术有限公司 A kind of information processing method, device and computer readable storage medium
CN109951812A (en) * 2019-03-27 2019-06-28 深圳市丰巢科技有限公司 A kind of pickup code sends processing method, device, equipment and the storage medium of failure

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109416713B (en) * 2016-08-22 2021-06-29 帕斯罗基株式会社 Authentication system and non-transitory information recording medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388005A (en) * 2003-03-14 2009-03-18 夏普株式会社 Content processing device and method
CN103345493A (en) * 2013-06-27 2013-10-09 广州市动景计算机科技有限公司 Method, device and system for text content displaying on mobile terminal
CN108111392A (en) * 2017-11-29 2018-06-01 努比亚技术有限公司 A kind of information processing method, device and computer readable storage medium
CN109951812A (en) * 2019-03-27 2019-06-28 深圳市丰巢科技有限公司 A kind of pickup code sends processing method, device, equipment and the storage medium of failure

Also Published As

Publication number Publication date
CN114666082A (en) 2022-06-24

Similar Documents

Publication Publication Date Title
US20080109408A1 (en) Phone book group management method for mobile terminal
CN105871690B (en) Method and device for realizing instant messaging
CN109582872B (en) Information pushing method and device, electronic equipment and storage medium
KR101922037B1 (en) Page operation processing method and apparatus, and terminal
CN106570100A (en) Information search method and device
CN108039173B (en) Voice information input method, mobile terminal, system and readable storage medium
CN108449261B (en) Message prompting method, message version number processing method, device and storage medium
US20160366077A1 (en) E-mail processing
CN114666082B (en) Login method, first terminal, second terminal, storage medium and login system
CN107133204B (en) Terminal shortcut input method
CN113807060A (en) Document processing method and device, electronic equipment and computer readable storage medium
CN113746721A (en) Mail processing method, server and storage medium
CN113596226A (en) Interface display method and electronic equipment
CN107770206B (en) Document editing method, device and system
CN109905373B (en) Information acquisition and processing method, device and equipment
US8560538B2 (en) Information processing device, content management system, method, and computer readable medium for managing contents
CN106534238B (en) Method and device for providing offline application service for user
CN114047855A (en) Form editing method and device and terminal equipment
US10007696B2 (en) Feed for expecting entities for address books
CN111737685B (en) Text service processing system, method and device
CN108965490B (en) Method for determining promotion conversion rate, server and computer readable storage medium
CN115297081B (en) Vehicle wireless control method, device, equipment and storage medium
CN117493045A (en) Cross-terminal data interaction method
CN114615225A (en) Friend adding method and device, computer equipment and storage medium
CN114610981A (en) Information searching method, device, system, equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant