CN115632804A - Account login method, device and storage medium - Google Patents

Account login method, device and storage medium Download PDF

Info

Publication number
CN115632804A
CN115632804A CN202210978269.1A CN202210978269A CN115632804A CN 115632804 A CN115632804 A CN 115632804A CN 202210978269 A CN202210978269 A CN 202210978269A CN 115632804 A CN115632804 A CN 115632804A
Authority
CN
China
Prior art keywords
login
user
terminal device
account information
remote server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210978269.1A
Other languages
Chinese (zh)
Inventor
张宏浩
刘鹏
陈艺伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Coocaa Network Technology Co Ltd
Original Assignee
Shenzhen Coocaa Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Coocaa Network Technology Co Ltd filed Critical Shenzhen Coocaa Network Technology Co Ltd
Priority to CN202210978269.1A priority Critical patent/CN115632804A/en
Publication of CN115632804A publication Critical patent/CN115632804A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an account login method, an account login device and a storage medium. The method comprises the steps of responding to login operation initiated by a user on the first terminal device, and sending a login page invoking request to a remote server; receiving an account login two-dimensional code returned by the remote server; polling to check the state of the two-dimension code, and inquiring the third-party account information of the user from the remote server when the state of the two-dimension code is authorized by code scanning; and performing login operation according to the third party account information. By adopting the scheme provided by the invention, the user can more quickly authorize the login, the user operation is reduced, and the user flow is simplified.

Description

Account login method, device and storage medium
Technical Field
The invention relates to the technical field of system management, in particular to an account login method, an account login device and a storage medium.
Background
At present, mobile phone applications commonly used by users in the market comprise WeChat, qq, tremble, microblog and the like, the applications occupy more than 80% of the time of the users, and the applications output commonly used authorized docking documents, so that the docking authorization login function of numerous developers is met.
However, the current authorized login function is not fast enough and cannot meet the use requirement of the user for system login.
Disclosure of Invention
In order to solve the technical problem that the existing authorized login function is not fast enough, the embodiment of the invention provides an account login method, an account login device and a storage medium.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides a first account login method, which is applied to first terminal equipment and comprises the following steps:
responding to a login operation initiated by a user at the first terminal device, and sending a login page invoking request to a remote server;
receiving an account login two-dimensional code returned by the remote server;
polling to check the state of the two-dimension code, and inquiring the third-party account information of the user from the remote server when the state of the two-dimension code is authorized by code scanning;
and performing login operation according to the third party account information.
In the above scheme, when the two-dimensional code status is authorized by code scanning, querying the remote server for the third-party account information of the user includes:
when the two-dimension code state is that code scanning is authorized, sending a request for obtaining an access token to the remote server;
receiving an access token returned by the remote server;
and inquiring the third party account information of the user from the remote server according to the access token.
The embodiment of the invention also provides a second account login method, which is applied to second terminal equipment and comprises the following steps:
responding to a code scanning operation initiated by a user at the second terminal equipment and aiming at the account number login two-dimensional code of the first terminal equipment, and sending a code scanning instruction to a remote server;
receiving a login page returned by the remote server;
and when detecting that the user authorizes the third party account information to log in on the login page, sending an authorization instruction to the remote server so that the remote server authorizes the first terminal device to use the third party account information to perform login operation.
The embodiment of the invention also provides a third account login method, which is applied to a remote server and comprises the following steps:
receiving a login page invoking request sent by first terminal equipment; the login page calling request is triggered when a user initiates a login operation at the first terminal equipment;
returning an account number to the first terminal equipment to log in the two-dimensional code;
receiving a code scanning instruction sent by second terminal equipment; the code scanning instruction is triggered when a user initiates a code scanning operation for logging in a two-dimensional code by aiming at a first terminal equipment account number at the second terminal equipment;
returning a login page to the second terminal device;
when receiving an authorization instruction sent by the second terminal device and the first terminal device inquires third party account information of the user, returning the third party account information to the first terminal device; the authorization instruction is triggered when the user authorizes the third party account information to log in the login page; and the inquiry of the third party account information of the user is triggered when the first terminal equipment inquires that the two-dimensional code state is authorized code scanning.
In the above scheme, when receiving the authorization instruction sent by the second terminal device and the first terminal device queries the third party account information of the user, returning the third party account information to the first terminal device includes:
when an authorization instruction sent by the second terminal device is received and an access token obtaining request sent by the first terminal device is received, returning an access token to the first terminal device;
and when receiving the information of the third party account of the user inquired by the first terminal equipment according to the access token, returning the information of the third party account of the user to the first terminal equipment.
In the above scheme, when receiving the authorization instruction sent by the second terminal device and the first terminal device queries the third party account information of the user, returning the third party account information to the first terminal device includes:
when receiving an authorization instruction sent by the second terminal device, the first terminal device queries the third-party account information of the user, and initiates a skip third-party account information authorization page to the third-party application;
and when an authorization success instruction of the third-party application is received, returning third-party account information to the first terminal equipment.
The embodiment of the invention also provides a first account login device, which is applied to the first terminal equipment, and comprises:
the login page calling request sending module is used for responding to login operation initiated by a user on the first terminal device and sending a login page calling request to a remote server;
the account login two-dimensional code receiving module is used for receiving an account login two-dimensional code returned by the remote server;
the polling checking module is used for polling and checking the state of the two-dimensional code, and inquiring the third-party account information of the user from the remote server when the state of the two-dimensional code is authorized by code scanning;
and the login operation module is used for performing login operation according to the third party account information.
The embodiment of the invention also provides a second account login device, which is applied to second terminal equipment, and comprises:
the code scanning instruction sending module is used for responding to a code scanning operation which is initiated by a user at the second terminal device and aims at the account number of the first terminal device to log in the two-dimensional code, and sending a code scanning instruction to the remote server;
the login page module is used for receiving a login page returned by the remote server;
and the authorization instruction sending module is used for sending an authorization instruction to the remote server when detecting that the user authorizes the third party account information to log in on the login page, so that the remote server authorizes the first terminal device to use the third party account information to perform login operation.
The embodiment of the invention also provides a third account login device, which is applied to a remote server and comprises:
the login page calling request receiving module is used for receiving a login page calling request sent by first terminal equipment; the login page calling request is triggered when a user initiates a login operation at the first terminal equipment;
the account login two-dimensional code returning module is used for returning an account login two-dimensional code to the first terminal equipment;
the code scanning instruction receiving module is used for receiving a code scanning instruction sent by the second terminal equipment; the code scanning instruction is triggered when a user initiates a code scanning operation aiming at a first terminal equipment account number login two-dimensional code at the second terminal equipment;
the login page returning module is used for returning a login page to the second terminal device;
the third party account information returning module is used for returning third party account information to the first terminal equipment when the first terminal equipment inquires the third party account information of the user after receiving an authorization instruction sent by the second terminal equipment; the authorization instruction is triggered when the user authorizes the login of the third-party account information on the login page; and the inquiry of the third party account information of the user is triggered when the first terminal equipment inquires that the two-dimensional code state is authorized code scanning.
The embodiment of the invention also provides a storage medium, wherein a computer program is stored in the storage medium, and when the computer program is executed by a processor, the steps of any one of the methods are realized.
According to the account login method, the account login device and the storage medium, provided by the embodiment of the invention, a login page invoking request is sent to a remote server in response to a login operation initiated by a user on the first terminal device; receiving an account login two-dimensional code returned by the remote server; polling to check the state of the two-dimension code, and inquiring the third-party account information of the user from the remote server when the state of the two-dimension code is authorized by code scanning; and performing login operation according to the third party account information. By adopting the scheme provided by the invention, the user can more quickly authorize the login, the user operation is reduced, and the user flow is simplified.
Drawings
Fig. 1 is a schematic flowchart of a first account login method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a second account login method according to the embodiment of the present invention;
fig. 3 is a flowchart illustrating a third account login method according to an embodiment of the present invention;
FIG. 4 is a system flow diagram according to an embodiment of the present invention;
FIG. 5 is a diagram illustrating a third-party application code-scanning login interface according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a mobile phone number scanning login interface according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a first account login device according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a second account login device according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a third account login device according to an embodiment of the present invention;
fig. 10 is an internal structural view of a computer device according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
The embodiment of the invention provides a first account login method, which is applied to first terminal equipment, and as shown in fig. 1, the method comprises the following steps:
step 101: responding to a login operation initiated by a user at the first terminal device, and sending a login page invoking request to a remote server;
step 102: receiving an account login two-dimensional code returned by the remote server;
step 103: polling to check the state of the two-dimension code, and inquiring the third-party account information of the user from the remote server when the state of the two-dimension code is authorized by code scanning;
step 104: and performing login operation according to the third party account information.
Specifically, the first terminal device in this embodiment may be a television. The third party account information may be login account information of a hot application program such as WeChat, QQ, tremble, microblog and the like.
Further, in this embodiment, the login operation initiated by the user on the first terminal device may be a login operation initiated by the user on a system installed on the first terminal device. The system may be a cool start system.
The embodiment mainly performs login through code scanning authorization. By adopting the technology of oauth2, after the code scanning authorization of the user is carried out, public information such as the third-party user ID, the head portrait, the nickname and the like of the user is obtained.
Here, the two-dimensional code state in the present embodiment may include any one of the following three types: 1. code scanning is not performed; 2. the scanned code is unauthorized; 3. the scanned code is authorized. In addition, polling can be performed at certain intervals to check the state of the two-dimensional code, and when the state of the two-dimensional code is authorized by code scanning, the information of a third-party account of the user is inquired from the remote server; when the two-dimension code state is that the code is not scanned or the code is scanned without authorization, the two-dimension code state is continuously checked after a certain time interval until the two-dimension code state is that the code is scanned and authorized or the set time is reached.
In an embodiment, when the two-dimensional code status is authorized by code scanning, querying the remote server for user third-party account information includes:
when the two-dimension code state is that code scanning is authorized, sending a request for obtaining an access token to the remote server;
receiving an access token returned by the remote server;
and inquiring the third-party account information of the user from the remote server according to the access token.
In actual application, the access token can be acquired from the remote server, and the third-party account information of the user can be inquired from the remote server by using the access token. The access token may contain security information for this login session. And each time the terminal equipment logs in once, the server generates an access token and returns the access token to the terminal equipment, and the terminal equipment can identify the identity of the terminal equipment to the website only by requesting to attach the access token each time. According to the embodiment, the third party account information of the user is inquired through the access token, the safety of login at each time can be guaranteed, and the privacy of the user is prevented from being revealed.
The login system in the embodiment is simple, the user can authorize the login, and more comprehensive user experience is provided for the user. By connecting products widely used by users in the market, the users can log in more quickly and authorized, user operation is reduced, and user flow is simplified.
According to the account login method provided by the embodiment of the invention, a login page invoking request is sent to a remote server in response to a login operation initiated by a user on the first terminal device; receiving an account login two-dimensional code returned by the remote server; polling to check the state of the two-dimension code, and inquiring the third-party account information of the user from the remote server when the state of the two-dimension code is authorized by code scanning; and performing login operation according to the third party account information. By adopting the scheme provided by the invention, the user can authorize login more quickly, the user operation is reduced, and the user flow is simplified.
The embodiment of the present invention further provides a second account login method, which is applied to a second terminal device, and as shown in fig. 2, the method includes:
step 201: responding to a code scanning operation initiated by a user at the second terminal equipment and aiming at the account number login two-dimensional code of the first terminal equipment, and sending a code scanning instruction to a remote server;
step 202: receiving a login page returned by the remote server;
step 203: and when detecting that the user authorizes the third party account information to log in on the login page, sending an authorization instruction to the remote server so that the remote server authorizes the first terminal device to use the third party account information to perform login operation.
Specifically, the first terminal device in this embodiment may be a television; the second terminal device may be a mobile phone. The third party account information may be login account information of a hot application program such as WeChat, QQ, tremble, microblog and the like.
Further, in this embodiment, when a user initiates a login operation on a first terminal device, the first terminal device sends a request to invoke a login page to a remote server; and the remote server returns an account number to the first terminal equipment to log in the two-dimensional code. The second terminal device scans the account number on the first terminal device to log in the two-dimensional code so as to trigger and send a code scanning instruction to the remote server.
In the account login method provided by the embodiment of the invention, a code scanning instruction is sent to a remote server in response to a code scanning operation initiated by a user at the second terminal device and aiming at the account login two-dimensional code of the first terminal device; receiving a login page returned by the remote server; and when the fact that the user authorizes the third party account information to log in the login page is detected, an authorization instruction is sent to the remote server, so that the remote server authorizes the first terminal device to use the third party account information to carry out login operation. By adopting the scheme provided by the invention, the user can more quickly authorize the login, the user operation is reduced, and the user flow is simplified.
The embodiment of the invention also provides a third account login method, which is applied to a remote server, and as shown in fig. 3, the method comprises the following steps:
step 301: receiving a login page invoking request sent by first terminal equipment; the login page calling request is triggered when a user initiates a login operation at the first terminal equipment;
step 302: returning an account number to the first terminal equipment to log in the two-dimensional code;
step 303: receiving a code scanning instruction sent by second terminal equipment; the code scanning instruction is triggered when a user initiates a code scanning operation aiming at a first terminal equipment account number login two-dimensional code at the second terminal equipment;
step 304: returning a login page to the second terminal device;
step 305: when receiving an authorization instruction sent by the second terminal device and the first terminal device inquires third party account information of the user, returning the third party account information to the first terminal device; the authorization instruction is triggered when the user authorizes the login of the third-party account information on the login page; and the inquiry of the third party account information of the user is triggered when the two-dimension code inquiry state of the first terminal equipment is that code scanning is authorized.
Specifically, the first terminal device in this embodiment may be a television; the second terminal device may be a mobile phone. The third party account information may be login account information of a hot application program such as WeChat, QQ, tremble, microblog and the like.
Further, in this embodiment, when a user initiates a login operation on a first terminal device, the first terminal device sends a request to invoke a login page to a remote server; and the remote server returns the account number to the first terminal equipment to log in the two-dimensional code. The second terminal device scans the account number on the first terminal device to log in the two-dimensional code so as to trigger and send a code scanning instruction to the remote server.
The embodiment mainly performs login through code scanning authorization. By adopting the oauth2 technology, after the code scanning authorization of the user, public information such as the third-party user ID, the head portrait, the nickname and the like of the user is obtained.
Here, the two-dimensional code state in the present embodiment may include any one of the following three types: 1. code scanning is not performed; 2. the scanned code is unauthorized; 3. the scanned code is authorized.
In an embodiment, when the first terminal device queries the third party account information of the user after receiving the authorization instruction sent by the second terminal device, returning the third party account information to the first terminal device includes:
when an authorization instruction sent by the second terminal device is received and an access token obtaining request sent by the first terminal device is received, returning an access token to the first terminal device;
and when receiving the information of the third party account of the user inquired by the first terminal equipment according to the access token, returning the information of the third party account of the user to the first terminal equipment.
In practice, the access token may contain security information for this login session. The user can generate an access token to return to the terminal equipment once logging in, and the terminal equipment can identify the identity of the user to the website only by attaching the access token to the request each time. According to the embodiment, the third party account information of the user is inquired through the access token, the safety of login at each time can be guaranteed, and the privacy of the user is prevented from being revealed.
In an embodiment, when receiving an authorization instruction sent by the second terminal device and the first terminal device queries third party account information of a user, returning the third party account information to the first terminal device includes:
when receiving an authorization instruction sent by the second terminal device, the first terminal device queries the third-party account information of the user, and initiates a skip third-party account information authorization page to the third-party application;
and when an authorization success instruction of the third-party application is received, returning third-party account information to the first terminal equipment.
In this embodiment, after receiving an authorization instruction sent by the second terminal device, the third party application may initiate a skip to a third party account information authorization page to verify whether the user is authorized, and after receiving an authorization success instruction of the third party application, the third party account information is returned to the first terminal device.
The account login method provided by the embodiment of the invention receives a login page invoking request sent by first terminal equipment; the login page calling request is triggered when a user initiates a login operation at the first terminal equipment; returning an account number to the first terminal equipment to log in the two-dimensional code; receiving a code scanning instruction sent by second terminal equipment; the code scanning instruction is triggered when a user initiates a code scanning operation aiming at a first terminal equipment account number login two-dimensional code at the second terminal equipment; returning a login page to the second terminal device; when receiving an authorization instruction sent by the second terminal device and the first terminal device inquires third party account information of the user, returning the third party account information to the first terminal device; the authorization instruction is triggered when the user authorizes the login of the third-party account information on the login page; and the inquiry of the third party account information of the user is triggered when the two-dimension code inquiry state of the first terminal equipment is that code scanning is authorized. By adopting the scheme provided by the invention, the user can more quickly authorize the login, the user operation is reduced, and the user flow is simplified.
The above methods are described from the perspective of a single device, and the account login method of the present embodiment will be described from the perspective of a system with reference to fig. 4.
Specifically, referring to fig. 4, the steps of this embodiment include:
step 401: a user clicks and logs in at a television end (which can be understood as first terminal equipment);
step 402: the television side calls a login page to a server side (which can be understood as a remote server);
step 403: the server returns WeChat or QQ login two-dimensional codes to the television;
step 404: polling and checking the state of the two-dimensional code by the television;
here, the two-dimensional code state may include: 1. code scanning is not performed; 2. the scanned code is unauthorized; 3. the scanned code is authorized.
Step 405: a user scans codes at a mobile phone end (which can be understood as second terminal equipment);
step 406: the mobile phone end sends a code scanning instruction to the server end;
step 407: the server side skips a WeChat or QQ authorization page to a third party;
step 408: after the third party successfully authorizes, a callback instruction is sent to the server side;
step 409: polling and checking the state of the two-dimensional code by the television terminal;
here, the two-dimensional code state may include: 1. code scanning is not performed; 2. the scanned code is unauthorized; 3. the scanned code is authorized.
Step 410: when the two-dimensional code state is that code scanning is authorized, the television side obtains an access Token from the server side;
step 411: the server returns an access Token to the television;
step 412: the television terminal queries user information according to the access Token;
step 413: and the server returns the user information to the television.
The embodiment can provide the code scanning authorization login functions of WeChat, qq, tremble, microblog and the like of the user, also can provide the login functions of mobile phone number verification codes, account numbers, passwords and the like, and meets the requirements of the user on various docking modes. Specifically, referring to fig. 5 and fig. 6, fig. 5 is a schematic diagram of a WeChat or QQ code scanning login page, and fig. 6 is a schematic diagram of a mobile phone number login page.
In order to implement the method according to the embodiment of the present invention, an embodiment of the present invention further provides a first account login apparatus, which is applied to a first terminal device, and as shown in fig. 7, an account login apparatus 700 includes: a login page calling request sending module 701, an account login two-dimensional code receiving module 702, a polling viewing module 703 and a login operation module 704; wherein, the first and the second end of the pipe are connected with each other,
a login page call request sending module 701, configured to send a login page call request to a remote server in response to a login operation initiated by a user at the first terminal device;
an account login two-dimensional code receiving module 702, configured to receive an account login two-dimensional code returned by the remote server;
the polling viewing module 703 is configured to poll and view the two-dimensional code state, and query the remote server for the third-party account information of the user when the two-dimensional code state is authorized by code scanning;
and a login operation module 704, configured to perform a login operation according to the third party account information.
In actual application, the login page call request sending module 701, the account login two-dimensional code receiving module 702, the polling viewing module 703 and the login operation module 704 may be implemented by a processor in the account login device.
In order to implement the method according to the embodiment of the present invention, an embodiment of the present invention further provides a second account login apparatus, which is applied to a second terminal device, and as shown in fig. 8, the account login apparatus 800 includes: a code scanning instruction sending module 801, a login page module 802 and an authorization instruction sending module 803; wherein the content of the first and second substances,
a code scanning instruction sending module 801, configured to respond to a code scanning operation initiated by a user at the second terminal device and directed to a first terminal device account number login two-dimensional code, and send a code scanning instruction to a remote server;
a login page module 802, configured to receive a login page returned by the remote server;
an authorization instruction sending module 803, configured to send an authorization instruction to the remote server when it is detected that the user authorizes the third-party account information to log in on the login page, so that the remote server authorizes the first terminal device to perform a login operation using the third-party account information.
In actual application, the code scanning instruction sending module 801, the login page module 802 and the authorization instruction sending module 803 may be implemented by a processor in the account login device.
In order to implement the method according to the embodiment of the present invention, an embodiment of the present invention further provides a third account login apparatus, which is applied to a remote server, and as shown in fig. 9, the account login apparatus 900 includes: a login page calling request receiving module 901, an account login two-dimensional code returning module 902, a code scanning instruction receiving module 903, a login page returning module 904 and a third-party account information returning module 905; wherein the content of the first and second substances,
a login page call request receiving module 901, configured to receive a login page call request sent by a first terminal device; the login page calling request is triggered when a user initiates a login operation at the first terminal equipment;
an account login two-dimensional code returning module 902, configured to return an account login two-dimensional code to the first terminal device;
a code scanning instruction receiving module 903, configured to receive a code scanning instruction sent by the second terminal device; the code scanning instruction is triggered when a user initiates a code scanning operation aiming at a first terminal equipment account number login two-dimensional code at the second terminal equipment;
a login page returning module 904, configured to return a login page to the second terminal device;
a third party account information returning module 905, configured to return third party account information to the first terminal device when the first terminal device queries user third party account information after receiving an authorization instruction sent by the second terminal device; the authorization instruction is triggered when the user authorizes the third party account information to log in the login page; and the inquiry of the third party account information of the user is triggered when the two-dimension code inquiry state of the first terminal equipment is that code scanning is authorized.
In actual application, the login page request receiving module 901, the account login two-dimensional code returning module 902, the code scanning instruction receiving module 903, the login page returning module 904 and the third party account information returning module 905 can be implemented by a processor in the account login device.
It should be noted that: the above-mentioned apparatus provided in the above-mentioned embodiment is only exemplified by the division of the above-mentioned program modules when executing, and in practical application, the above-mentioned processing may be distributed to be completed by different program modules according to needs, that is, the internal structure of the terminal is divided into different program modules to complete all or part of the above-mentioned processing. In addition, the apparatus provided by the above embodiment and the method embodiment belong to the same concept, and the specific implementation process thereof is described in the method embodiment and is not described herein again.
To implement the method of the embodiment of the present invention, the embodiment of the present invention further provides a computer program product, where the computer program product includes computer instructions, and the computer instructions are stored in a computer-readable storage medium. A processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the steps of the above-described method.
Based on the hardware implementation of the program module, in order to implement the method according to the embodiment of the present invention, an electronic device (computer device) is further provided in the embodiment of the present invention. Specifically, in one embodiment, the computer device may be a terminal, and its internal structure diagram may be as shown in fig. 10. The computer apparatus includes a processor a01, a network interface a02, a display screen a04, an input device a05, and a memory (not shown in the figure) connected through a system bus. Wherein the processor a01 of the computer device is adapted to provide computing and control capabilities. The memory of the computer apparatus includes an internal memory a03 and a nonvolatile storage medium a06. The nonvolatile storage medium a06 stores an operating system B01 and a computer program B02. The internal memory a03 provides an environment for running the operating system B01 and the computer program B02 in the nonvolatile storage medium a06. The network interface a02 of the computer apparatus is used for communicating with an external terminal through a network connection. The computer program is executed by the processor a01 to implement the method of any of the above embodiments. The display screen a04 of the computer device may be a liquid crystal display screen or an electronic ink display screen, and the input device a05 of the computer device may be a touch layer covered on the display screen, a key, a trackball or a touch pad arranged on a casing of the computer device, or an external keyboard, a touch pad or a mouse.
Those skilled in the art will appreciate that the architecture shown in fig. 10 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The device provided by the embodiment of the present invention includes a processor, a memory, and a program stored in the memory and capable of running on the processor, and when the processor executes the program, the method according to any one of the embodiments described above is implemented.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transmyedia) such as modulated data signals and carrier waves.
It will be appreciated that the memory of embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic random access Memory (FRAM), a magnetic random access Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration, and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), synchronous Static Random Access Memory (SSRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), double Data Rate Synchronous Random Access Memory (ESDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM), enhanced Synchronous Random Access Memory (DRAM), synchronous Random Access Memory (DRAM), direct Random Access Memory (DRmb Access Memory). The described memory for embodiments of the present invention is intended to comprise, without being limited to, these and any other suitable types of memory.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of the present application shall be included in the scope of the claims of the present application.

Claims (10)

1. An account login method is applied to a first terminal device, and comprises the following steps:
responding to a login operation initiated by a user at the first terminal device, and sending a login page invoking request to a remote server;
receiving an account login two-dimensional code returned by the remote server;
polling to check the state of the two-dimension code, and inquiring the third-party account information of the user from the remote server when the state of the two-dimension code is authorized by code scanning;
and performing login operation according to the third party account information.
2. The method of claim 1, wherein when the two-dimensional code status is authorized by scanning a code, querying the remote server for user third party account information comprises:
when the two-dimension code state is that code scanning is authorized, sending a request for obtaining an access token to the remote server;
receiving an access token returned by the remote server;
and inquiring the third-party account information of the user from the remote server according to the access token.
3. An account login method is applied to a second terminal device, and comprises the following steps:
responding to a code scanning operation initiated by a user at the second terminal equipment and aiming at the account number login two-dimensional code of the first terminal equipment, and sending a code scanning instruction to a remote server;
receiving a login page returned by the remote server;
and when detecting that the user authorizes the third party account information to log in on the login page, sending an authorization instruction to the remote server so that the remote server authorizes the first terminal device to use the third party account information to perform login operation.
4. An account login method is applied to a remote server, and comprises the following steps:
receiving a login page invoking request sent by first terminal equipment; the login page calling request is triggered when a user initiates a login operation at the first terminal equipment;
returning an account number to the first terminal equipment to log in the two-dimensional code;
receiving a code scanning instruction sent by second terminal equipment; the code scanning instruction is triggered when a user initiates a code scanning operation aiming at a first terminal equipment account number login two-dimensional code at the second terminal equipment;
returning a login page to the second terminal device;
when receiving an authorization instruction sent by the second terminal device and the first terminal device inquires the third party account information of the user, returning the third party account information to the first terminal device; the authorization instruction is triggered when the user authorizes the login of the third-party account information on the login page; and the inquiry of the third party account information of the user is triggered when the two-dimension code inquiry state of the first terminal equipment is that code scanning is authorized.
5. The method according to claim 4, wherein when receiving the authorization instruction sent by the second terminal device and the first terminal device queries user third party account information, returning the third party account information to the first terminal device includes:
when an authorization instruction sent by the second terminal device is received and an access token obtaining request sent by the first terminal device is received, returning an access token to the first terminal device;
and when receiving the information of the third party account of the user inquired by the first terminal equipment according to the access token, returning the information of the third party account of the user to the first terminal equipment.
6. The method according to claim 4, wherein when receiving the authorization instruction sent by the second terminal device and the first terminal device queries user third party account information, returning the third party account information to the first terminal device includes:
when receiving an authorization instruction sent by the second terminal device, the first terminal device queries the third-party account information of the user, and initiates a skip third-party account information authorization page to the third-party application;
and when an authorization success instruction of the third-party application is received, returning third-party account information to the first terminal equipment.
7. An account login device is applied to a first terminal device, and the device comprises:
the login page calling request sending module is used for responding to login operation initiated by a user on the first terminal device and sending a login page calling request to a remote server;
the account login two-dimensional code receiving module is used for receiving an account login two-dimensional code returned by the remote server;
the polling checking module is used for polling and checking the state of the two-dimensional code, and inquiring the third-party account information of the user from the remote server when the state of the two-dimensional code is authorized by code scanning;
and the login operation module is used for performing login operation according to the third party account information.
8. An account login device, which is applied to a second terminal device, the device comprising:
the code scanning instruction sending module is used for responding to a code scanning operation which is initiated by a user at the second terminal device and aims at the account number of the first terminal device to log in the two-dimensional code, and sending a code scanning instruction to the remote server;
the login page module is used for receiving a login page returned by the remote server;
and the authorization instruction sending module is used for sending an authorization instruction to the remote server when detecting that the user authorizes the third party account information to log in on the login page, so that the remote server authorizes the first terminal device to use the third party account information to perform login operation.
9. An account login device, applied to a remote server, the device comprising:
the login page calling request receiving module is used for receiving a login page calling request sent by first terminal equipment; the login page calling request is triggered when a user initiates a login operation at the first terminal equipment;
the account login two-dimensional code returning module is used for returning an account login two-dimensional code to the first terminal equipment;
the code scanning instruction receiving module is used for receiving a code scanning instruction sent by the second terminal equipment; the code scanning instruction is triggered when a user initiates a code scanning operation aiming at a first terminal equipment account number login two-dimensional code at the second terminal equipment;
the login page returning module is used for returning a login page to the second terminal device;
the third party account information returning module is used for returning third party account information to the first terminal equipment when the first terminal equipment inquires the third party account information of the user after receiving the authorization instruction sent by the second terminal equipment; the authorization instruction is triggered when the user authorizes the login of the third-party account information on the login page; and the inquiry of the third party account information of the user is triggered when the two-dimension code inquiry state of the first terminal equipment is that code scanning is authorized.
10. A storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, performs the steps of the method of any one of claims 1 to 6.
CN202210978269.1A 2022-08-15 2022-08-15 Account login method, device and storage medium Pending CN115632804A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210978269.1A CN115632804A (en) 2022-08-15 2022-08-15 Account login method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210978269.1A CN115632804A (en) 2022-08-15 2022-08-15 Account login method, device and storage medium

Publications (1)

Publication Number Publication Date
CN115632804A true CN115632804A (en) 2023-01-20

Family

ID=84902856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210978269.1A Pending CN115632804A (en) 2022-08-15 2022-08-15 Account login method, device and storage medium

Country Status (1)

Country Link
CN (1) CN115632804A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116436707A (en) * 2023-06-14 2023-07-14 北京创新乐知网络技术有限公司 Login method, device, medium and computer equipment based on applet

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116436707A (en) * 2023-06-14 2023-07-14 北京创新乐知网络技术有限公司 Login method, device, medium and computer equipment based on applet
CN116436707B (en) * 2023-06-14 2023-08-25 北京创新乐知网络技术有限公司 Login method, device, medium and computer equipment based on applet

Similar Documents

Publication Publication Date Title
US10673866B2 (en) Cross-account role management
US8935757B2 (en) OAuth framework
CN108632253B (en) Client data security access method and device based on mobile terminal
KR102194052B1 (en) Service execution method and device
EP3203709B1 (en) Cloud service server and method for managing cloud service server
CN104902028B (en) A kind of a key login authentication method, apparatus and system
CN106130970B (en) Application access control method and device
CN105072080A (en) Information verification method, device and system
US11151239B2 (en) Single sign-on management for multiple independent identity providers
US20180218133A1 (en) Electronic document access validation
CN112738021B (en) Single sign-on method, terminal, application server, authentication server and medium
CN109547412B (en) Two-factor authentication method, device, system, electronic equipment and storage medium
CN113542201A (en) Access control method and device for Internet service
CN115632804A (en) Account login method, device and storage medium
CN113630253A (en) Login method, device, computer system and readable storage medium
CN113568542A (en) Interface display method and electronic equipment
US20210014278A1 (en) Multi-tenant authentication framework
CN106878252B (en) Method for establishing password-free login relationship, method for clearing account and device thereof
CN112560006A (en) Single sign-on method and system under multi-application system
CN112866265B (en) CSRF attack protection method and device
CN113395326B (en) Network service-based login method, device and computer-readable storage medium
CN113407359A (en) Processing method and device for interface call request
WO2010096818A1 (en) Generalized method for authenticating subscribers of a service via a graphical user interface or telephone using the same user name and password
CN112751844B (en) Portal authentication method and device and electronic equipment
CN114979996B (en) Business card generation method and device based on SIM card and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination