WO2018103559A1 - 授权登录方法及装置 - Google Patents
授权登录方法及装置 Download PDFInfo
- Publication number
- WO2018103559A1 WO2018103559A1 PCT/CN2017/113555 CN2017113555W WO2018103559A1 WO 2018103559 A1 WO2018103559 A1 WO 2018103559A1 CN 2017113555 W CN2017113555 W CN 2017113555W WO 2018103559 A1 WO2018103559 A1 WO 2018103559A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- login
- user interface
- user
- server
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/0486—Drag-and-drop
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04886—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2203/00—Indexing scheme relating to G06F3/00 - G06F3/048
- G06F2203/048—Indexing scheme relating to G06F3/048
- G06F2203/04806—Zoom, i.e. interaction techniques or interactors for controlling the zooming operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2203/00—Indexing scheme relating to G06F3/00 - G06F3/048
- G06F2203/048—Indexing scheme relating to G06F3/048
- G06F2203/04808—Several contacts: gestures triggering a specific function, e.g. scrolling, zooming, right-click, when the user establishes several contacts with the surface simultaneously; e.g. using several fingers or a combination of fingers and pen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- the present application relates to the field of computer applications, and in particular, to an authorized login method and apparatus.
- Authorized login means that the authorized user directly logs in to the shortcut login mode of another application by using the login identity of an application that has successfully logged in.
- the user when browsing an application, if the user needs to use the login identity of another successfully logged-in application, and the authorized login for the current application, the user is usually required to perform multiple operations on the login page of the application. The login is complete, so the interaction is more complicated and not easy.
- the application provides an authorization login method, and the method includes:
- the blank area generated by the user interface of the first application is displayed, and the icon information of the second application that the user has logged in is displayed; wherein the first application is pre-established with the second application;
- the application further provides an authorization login device, the device comprising:
- a scaling module that reduces the first in response to a zooming operation of a user interface for the first application User interface of the application
- a display module where the blank area generated by the user interface of the first application is reduced, the icon information of the second application that the user has logged in is displayed; wherein the first application is pre-established with the second application. ;
- a delivery module in response to an operation of dragging the icon information of the second application from the blank area to the reduced user interface of the first application, transmitting login authorization information of the second application to the a first application, in which the login authorization information of the second application is submitted by the first application to the server of the second application for login authorization verification;
- the login module in response to the server of the second application, authorizes login to the first application by using a notification message that is verified by the server of the first application for verifying the login authorization information.
- an interactive manner is provided that can quickly complete the authorized login.
- the user can perform a preset zoom operation on the user interface of the first application, and trigger the operating system of the terminal device to narrow the user interface of the first application.
- the blank area generated by the user interface of the first application is displayed, and at least one icon information of the second application that is associated with the first application and the user has logged in is displayed, and then the icon information of the second application is dragged by the user to the first application.
- a user interface of the application to trigger the terminal device to transmit the login authorization information of the second application to the first application, and submit, by the first application, the login authorization information of the second application to the second application through the server of the first application
- the application server performs login authorization verification.
- the user can use the login authorization information of the first application to log in to the second application, thereby realizing that the user can quickly complete the authorized login through the simple and quick interaction operation, thereby reducing the The complexity of the operation when performing an authorized login improves the user's interactive experience.
- FIG. 1 is a schematic diagram of interaction of performing authorization login in the related art shown in the present application.
- FIG. 2 is a flowchart of an authorization login method according to an embodiment of the present application.
- FIG. 3 is a schematic diagram of interaction of a reduced user interface according to an embodiment of the present application.
- FIG. 4 is a schematic diagram showing interaction of displaying associated application icon information in a blank area of a reduced user interface according to an embodiment of the present application
- FIG. 5 is a schematic diagram of interaction of authorized login according to an embodiment of the present application.
- FIG. 6 is a schematic diagram of interaction between an application to transfer a target object in an authorized login scenario according to an embodiment of the present application
- FIG. 7 is a logic block diagram of an authorization login device according to an embodiment of the present application.
- FIG. 8 is a structural diagram of hardware involved in a terminal device that carries the authorized login device according to an embodiment of the present application.
- the APP application of the mobile application is used as an example.
- a login entry corresponding to multiple third-party APPs may be set in the login interface of the current APP1; the user needs to use a third party that has successfully logged in.
- the login of APP2 can trigger the login entry corresponding to APP2, jump to the login authorization page of APP2, and further interact with the login authorization page to confirm the operation of the authorized login.
- APP1 can initiate authorized login authentication to the server corresponding to APP2, and complete the authorized login of APP1 by using the login identity of APP2.
- an interactive manner that can quickly complete the authorized login.
- the user can perform a preset zoom operation on the user interface of the first application, and trigger the operating system of the terminal device to narrow the user interface of the first application.
- the blank area generated by the user interface of the first application is displayed, and at least one icon information of the second application that is associated with the first application and the user has logged in is displayed, and then the icon information of the second application is dragged by the user to The user interface of the first application,
- the triggering terminal device transmits the login authorization information of the second application to the first application, and the login authorization information of the second application is submitted by the first application to the server of the second application to log in.
- the user can log in to the second application by using the login authorization information of the first application, so that the user can quickly complete the authorized login through simple and quick interaction, and reduce the operation when performing the authorized login. Complexity enhances the user's interactive experience.
- FIG. 2 is a schematic diagram of an authorization login method applied to an operating system of a terminal device according to an embodiment of the present disclosure. The method performs the following steps:
- Step 201 Reducing a user interface of the first application in response to a zooming operation of a user interface of the first application;
- Step 202 The blank area generated by the user interface of the first application is displayed, and the icon information of the second application that the user has logged in is displayed.
- the first application is pre-established with the second application. ;
- the terminal device may be a mobile terminal device or a PC terminal device; for example, the terminal device may be a touch screen smart phone, a laptop computer or a tablet computer; and the operating system of the terminal device may be an IOS, Android, Windows or other types of operating systems.
- the first application is an application that can authorize users to directly log in using the login identity of other third-party applications.
- the second application refers to an application that the user has successfully logged in and can provide an associated authorized login service for other applications. ;
- the first application may refer to a niche application having a small number of users and having some special functions; and the second application may refer to a large number of users, which can be used for other niche
- the application provides an associated application for authorized login services; for example, applications such as Alipay and WeChat.
- the first application and the second application may be an APP application installed on the mobile terminal device, or may be a web application installed on the PC terminal, in this example. No particular limitation is imposed.
- the server corresponding to the first application and the second application may establish an association relationship between the first application and the second application, respectively.
- the association relationship may specifically refer to a login association between the first application and the second application; when the first application and the second application establish a login association between the two on their respective servers, the first application And the server corresponding to the second application will open the function permission to directly complete the login using the login identity of the other party.
- the user of the first application may be used.
- the interface performs a preset zooming operation to trigger an operating system of the terminal device (hereinafter referred to as an operating system) to reduce the user interface; when the operating system detects the zooming operation, the operating system may respond to the zooming operation according to a preset reduction ratio. Reduce the user interface.
- an operating system an operating system of the terminal device
- the preset zoom operation may include a two-finger pinch touch operation for the user interface, a preset trigger operation for the user interface (such as a double-click operation or other types of operations); and, for a preset virtual A preset trigger action for a button (such as a zoom button) or a physical button (such as a fingerprint button or other physical button on a terminal device).
- the user can perform a two-finger pinch operation as shown in FIG. 3 for the first application currently being displayed to trigger the operating system to narrow the user interface.
- a zoom button may be set in a user interface of the user interface currently being displayed by the first application, and the user may trigger the operating system to narrow the user interface by double-clicking the zoom button;
- the zoom-out event for the user interface may be defined in advance in the operating system as a trigger event for performing a double-click operation on the fingerprint button of the terminal device, and when the operating system detects the user's double-click operation on the fingerprint button When the double-click operation is performed, the user interface can be reduced.
- the icon information of the plurality of second applications that are previously associated with the first application may be displayed in a blank area generated by reducing the user interface.
- the size of the blank area may be adjusted by adjusting the scaling ratio; and the number of icon information of the second application displayed in the blank area may also be based on the second relationship actually established with the first application.
- the number of apps is customized.
- the first application is APP1
- the second application includes APP2, APP3, and APP4.
- the operating system is triggered to be based on a preset ratio.
- APP2, APP3, and APP4 can be displayed at any position in the blank area generated after the user interface of APP1 is reduced (shown in FIG. 4 is a blank area displayed above the reduced user interface) .
- Step 203 In response to the operation of dragging the icon information of the second application from the blank area to the reduced user interface of the first application, transmitting login authorization information of the second application to the a first application, in which the login authorization information of the second application is submitted by the first application to the server of the second application for login authorization verification;
- Step 204 In response to the server of the second application, by using the notification message returned by the server of the first application for verifying the login authorization information, the first application is authorized to log in.
- the operating system displays the icon information of the plurality of second applications that are associated with the first application in a blank area generated after the user interface of the first application is zoomed
- the user may The icon information of the second application displayed in the control area is directly dragged to the area of the reduced user interface of the first application, to trigger the operating system to transmit the login authorization information of the second application that is dragged to the The first application.
- the login authorization information may include an application identifier (such as an APP ID) of the second application, and a user identifier (such as a UID) allocated by the server of the second application to the user after the user successfully logs in to the second application. And a login credential (such as a Token credential) issued by the server of the second application after the user successfully logs in to the second application;
- an application identifier such as an APP ID
- UID user identifier allocated by the server of the second application to the user after the user successfully logs in to the second application.
- a login credential such as a Token credential
- the server of the application when a user successfully logs in to a certain account by entering a login account and password, After use, the server of the application usually assigns a corresponding UID to the user, and sends a corresponding Token credential to the application; the UID is used to uniquely identify the identity of the user, and the Token credential is usually based on a preset.
- the token algorithm calculates a random string that is used to verify the login identity of the user.
- the login authorization information may include an application identifier of the second application, a UID assigned to the user after successfully logging in to the second application, and a Token credential.
- the second application may be pre-configured with an open interface (API) for data transfer between applications.
- API open interface
- the second application pre-configured may be invoked.
- the interface is opened, and then the login authorization information of the user logging in to the second application is transmitted as a call parameter to the second application.
- the first application may be based on The pre-established connection between the server of the first application interacts with the server of the first application, and submits the login authorization information of the second application to the server of the first application.
- the server of the first application may perform the login association in advance between the server of the first application and the second application, and thus may be invoked by data transmission between the server.
- the mechanism further submits the login authorization information of the second application to the server of the second application for login authorization authentication.
- the server of the second application may return a verification notification message to the server of the first application, and the server of the first application receives the notification message.
- the personal information (such as the user's UID, personal data, and the like) used by the user when logging in to the second application may be used to set the first application to the login state, and then the notification message is continuously sent to the operating system. .
- the operating system may also invoke the personal information used by the user when logging in to the second application from the system level. Automatically log in to the first application.
- the first application is APP1
- the second application includes APP2, APP3, and APP4.
- the blank area displays icon information of APP2, APP3, and APP4;
- the login identity is authorized to log in to APP1.
- the user can drag the icon of APP2 to the reduced user interface of APP1.
- the operating system may invoke the above-mentioned open interface pre-configured by the APP1, and the APP ID of the APP2, the service end of the APP2, and the UID assigned by the user and the APP2.
- the Token certificate sent by the server is transmitted as a call parameter to the inside of the APP1 through the open interface. Then, the APP1 can continue to deliver the APP ID of the APP2, the UID of the APP2 to the user, and the server of the APP2.
- the Token certificate is submitted to the server of APP2 for verification by the server of APP1; when the server of APP2 is verified to confirm that the token is valid, the notification message of the authentication can be returned to the server of APP1, and then the service of APP1
- the terminal can pull the personal information reserved by the user on the server of the APP2 to complete the login authorization, and deliver the notification message to the operating system. After receiving the notification message, the operating system can also pull the user who logs in to the APP2. Information is automatically logged in to APP1.
- the operating system may restore the user interface of the first application to the default size.
- the user can quickly complete the use of the third-party application by dragging the icon of the third-party application displayed in the blank area of the reduced user interface of the current application to the user interface of the current application.
- Login identity the operation of login authorization for the current application, thus significantly reducing the complexity of the operation when performing authorized login, and improving the user's interactive experience.
- the operating system reduces the user interface of the first application by a zoom operation in response to the user's user interface for the first application, and the plurality of second applications associated with the first application are pre-established with the login
- the icon information shows that after the blank area generated by the user interface of the first application is reduced, the user can drag the icon information of any second application in the blank area to the reduced first application, in addition to the interaction manner described above.
- the user interface to quickly complete the use of the user in the first
- performing a fast login authorization for the first application in the actual application, the user may also drag the target object of the specified type currently displayed in the reduced user interface of the first application to the blank.
- the area where any icon information is displayed in the area the target object is quickly delivered to the second application corresponding to the icon information, and the file sharing of the target object is completed.
- the target object may include any type of file that can be transferred between applications, such as text, pictures, links, videos, articles, and the like displayed in the user interface of the first application.
- applications such as text, pictures, links, videos, articles, and the like displayed in the user interface of the first application.
- the background developer of the first application can also pre-limit the types of target objects that need to be transferred between applications;
- the background developer of the first application can specify a file type that can be passed to other applications for the first application based on actual needs, assuming that the developer specifies the image and text as a file that can be delivered, then In this case, only the text and images displayed in the application's user interface can respond to the user's dragging to other application icons.
- each of the second applications associated with the login is established in advance, and an open interface may be pre-configured separately.
- the operating system detects that the target object of the specified type displayed by the user in the user interface of the first application is dragged to the icon information of any second application displayed in the blank area, the second application may be invoked.
- the above open interface transmits the target object as a call parameter to the second application, and is further processed by the second application.
- the first application is APP1
- the second application includes APP2, APP3, and APP4.
- the blank area displays icon information of APP2, APP3, and APP4;
- the product image displayed in the user interface of the APP1 is quickly shared to the APP2.
- the user can drag the product image displayed in the user interface of the APP1 to the area of the icon of the APP2 in the blank area, and the operating system detects that After the product image is dragged to the area where the icon of the APP2 is located, the open interface pre-configured by the APP2 may be invoked, and the product image is used as a calling parameter, and is transmitted to the inside of the APP2 through the open interface, and further processed by the APP2.
- the manner in which the second application further processes the delivered target object generally depends on the processing logic loaded in the open interface, and may be included in the local processing. Save, or perform further forwarding and other operations; in practical applications, developers of the second application background can independently develop the open interface based on actual needs.
- APP2 is a mail application
- the user needs to transmit the product image displayed in the user interface of APP1 to the APP2 as an attachment
- the developer of APP2 is developing the APP2.
- the execution logic of "sending the file delivered to the APP as an attachment" may be added to the structure of the open interface.
- the execution logic can be immediately executed, jump to the mail sending page, and the product picture is added to the mail sending page in the form of an attachment.
- the user can quickly share the target object to the third-party application by dragging the target object displayed in the reduced user interface of the current application to the icon of the third-party application displayed in the blank area. , so you can significantly improve the efficiency of file sharing between applications.
- the present application also provides an embodiment of the device.
- the present application provides an authorization login device 70, which is applied to a terminal device.
- the hardware architecture involved in the terminal device that carries the authorization login device 70 generally includes a CPU and a memory.
- the device 70 includes:
- the zooming module 701 is configured to reduce a user interface of the first application in response to a zooming operation of the user interface of the first application;
- the display module 702 displays, in the blank area generated by the user interface of the first application, the icon information of the second application that the at least one user has logged in; wherein the first application is pre-established with the second application. relationship;
- the delivery module 703 in response to the operation of dragging the icon information of the second application from the blank area to the reduced user interface of the first application, transmitting the login authorization information of the second application to the The first application, in which the login authorization information of the second application is submitted by the first application to the server of the second application for login authorization verification;
- the login module 704 is configured to respond to the service of the second application by using the service of the first application.
- the notification message returned by the terminal for verifying the login authorization information is authorized to log in to the first application.
- the scaling module 701 further:
- the user interface of the first application is restored to a default size.
- the delivery module 703 further:
- the delivery module 703 further:
- the zooming operation includes: a two-finger pinch touch operation for a user interface of the first application;
- a preset trigger action for a preset virtual button or a physical button is a preset trigger action for a preset virtual button or a physical button.
- the login authorization information includes:
- the application identifier of the second application the user identifier assigned by the server of the second application to the user after the user successfully logs in to the second application, and the user is successfully logged into the second application by the user
- the login credential issued by the server of the second application The login credential issued by the server of the second application.
- the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
- the device embodiments described above are merely illustrative, in which The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present application. Those of ordinary skill in the art can understand and implement without any creative effort.
- the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
- a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email transceiver, and a game control.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (12)
- 一种授权登录方法,其特征在于,所述方法包括:响应于针对第一应用的用户界面的缩放操作,缩小所述第一应用的用户界面;在所述第一应用的用户界面缩小后产生的空白区域展示至少一个用户已登录的第二应用的图标信息;其中,所述第一应用与所述第二应用预先建立了关联关系;响应于将所述第二应用的图标信息从所述空白区域拖动至缩小后的所述第一应用的用户界面的操作,将所述第二应用的登录授权信息传递至所述第一应用,以由所述第一应用将所述第二应用的登录授权信息通过所述第一应用的服务端提交至所述第二应用的服务端进行登录授权验证;响应于所述第二应用的服务端通过所述第一应用的服务端返回的针对所述登录授权信息验证通过的通知消息,授权登录所述第一应用。
- 根据权利要求1所述的方法,其特征在于,还包括:当基于所述第一应用的登录授权信息成功登录所述第二应用后,将所述第一应用的用户界面恢复为默认大小。
- 根据权利要求1所述的方法,其特征在于,还包括:响应于将缩小后的所述第一应用的用户界面中显示的指定类型的目标对象,拖动至所述空白区域中任一图标信息所在区域的操作,将所述目标对象传递至与该图标信息对应的第二应用,以由所述第二应用针对所述目标对象执行进一步的处理。
- 根据权利要求3所述的方法,其特征在于,所述将所述第二应用的登录授权信息传递至所述第一应用,包括:调用所述第一应用的开放接口,将所述第二应用的登录授权信息作为调用参数,传递至所述第一应用;所述将所述目标对象传递至与该图标信息对应的第二应用,包括:调用与该图标信息对应的第二应用的开放接口,将所述目标对象作为调用参数,传递至与该图标信息对应的第二应用。
- 根据权利要求1所述的方法,其特征在于,所述第一应用以及第二应用包括:APP应用以及Web应用;所述缩放操作包括:针对所述第一应用的用户界面的双指捏合触控操作;针对所述第一应用的用户界面的预设触发操作;针对预设的虚拟按键或者实体按键的预设触发操作。
- 根据权利要求1所述的方法,其特征在于,所述登录授权信息包括:所述第二应用的应用标识、用户成功登录所述第二应用后由所述第二应用的服务端为所述用户分配的用户标识、以及用户在成功登录所述第二应用后由所述第二应用的服务端下发的登录凭证。
- 一种授权登录装置,其特征在于,所述装置包括:缩放模块,响应于针对第一应用的用户界面的缩放操作,缩小所述第一应用的用户界面;展示模块,在所述第一应用的用户界面缩小后产生的空白区域展示至少一个用户已登录的第二应用的图标信息;其中,所述第一应用与所述第二应用预先建立了关联关系;传递模块,响应于将所述第二应用的图标信息从所述空白区域拖动至缩小后的所述第一应用的用户界面的操作,将所述第二应用的登录授权信息传递至所述第一应用,以由所述第一应用将所述第二应用的登录授权信息通过所述第一应用的服务端提交至所述第二应用的服务端进行登录授权验证;登录模块,响应于所述第二应用的服务端通过所述第一应用的服务端返回的针对所述登录授权信息验证通过的通知消息,授权登录所述第一应用。
- 根据权利要求7所述的装置,其特征在于,所述缩放模块进一步:当基于所述第一应用的登录授权信息成功登录所述第二应用后,将所述 第一应用的用户界面恢复为默认大小。
- 根据权利要求7所述的装置,其特征在于,所述传递模块进一步:响应于将缩小后的所述第一应用的用户界面中显示的指定类型的目标对象,拖动至所述空白区域中任一图标信息所在区域的操作,将所述目标对象传递至与该图标信息对应的第二应用,以由所述第二应用针对所述目标对象执行进一步的处理。
- 根据权利要求9所述的装置,其特征在于,所述传递模块进一步:调用所述第一应用的开放接口,将所述第二应用的登录授权信息作为调用参数,传递至所述第一应用;以及,调用与该图标信息对应的第二应用的开放接口,将所述目标对象作为调用参数,传递至与该图标信息对应的第二应用。
- 根据权利要求7所述的装置,其特征在于,所述第一应用以及第二应用包括:APP应用以及Web应用;所述缩放操作包括:针对所述第一应用的用户界面的双指捏合触控操作;针对所述第一应用的用户界面的预设触发操作;针对预设的虚拟按键或者实体按键的预设触发操作。
- 根据权利要求7所述的装置,其特征在于,所述登录授权信息包括:所述第二应用的应用标识、用户成功登录所述第二应用后由所述第二应用的服务端为所述用户分配的用户标识、以及用户在成功登录所述第二应用后由所述第二应用的服务端下发的登录凭证。
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020197019798A KR102194071B1 (ko) | 2016-12-08 | 2017-11-29 | 인가된 로그인을 위한 방법 및 장치 |
ES17877865T ES2862397T3 (es) | 2016-12-08 | 2017-11-29 | Método y dispositivo para autenticar el inicio de sesión |
JP2019531144A JP6859512B2 (ja) | 2016-12-08 | 2017-11-29 | 認証されたログインのための方法およびデバイス |
EP17877865.0A EP3554034B8 (en) | 2016-12-08 | 2017-11-29 | Method and device for authenticating login |
PL17877865T PL3554034T3 (pl) | 2016-12-08 | 2017-11-29 | Sposób i aparat do autoryzowanego logowania |
US16/380,395 US10445486B2 (en) | 2016-12-08 | 2019-04-10 | Method and apparatus for authorized login |
PH12019501290A PH12019501290A1 (en) | 2016-12-08 | 2019-06-07 | Method and apparatus for authorized login |
US16/597,521 US10795983B2 (en) | 2016-12-08 | 2019-10-09 | Method and apparatus for authorized login |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611124494.X | 2016-12-08 | ||
CN201611124494.XA CN106888202B (zh) | 2016-12-08 | 2016-12-08 | 授权登录方法及装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/380,395 Continuation US10445486B2 (en) | 2016-12-08 | 2019-04-10 | Method and apparatus for authorized login |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018103559A1 true WO2018103559A1 (zh) | 2018-06-14 |
Family
ID=59176158
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/113555 WO2018103559A1 (zh) | 2016-12-08 | 2017-11-29 | 授权登录方法及装置 |
Country Status (10)
Country | Link |
---|---|
US (2) | US10445486B2 (zh) |
EP (1) | EP3554034B8 (zh) |
JP (1) | JP6859512B2 (zh) |
KR (1) | KR102194071B1 (zh) |
CN (1) | CN106888202B (zh) |
ES (1) | ES2862397T3 (zh) |
PH (1) | PH12019501290A1 (zh) |
PL (1) | PL3554034T3 (zh) |
TW (1) | TWI665623B (zh) |
WO (1) | WO2018103559A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111970298A (zh) * | 2020-08-26 | 2020-11-20 | 腾讯科技(深圳)有限公司 | 应用访问方法、装置、存储介质及计算机设备 |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106888202B (zh) | 2016-12-08 | 2020-02-21 | 阿里巴巴集团控股有限公司 | 授权登录方法及装置 |
KR102379313B1 (ko) * | 2017-08-23 | 2022-03-28 | 삼성전자주식회사 | 어플리케이션을 표시하기 위한 전자 장치 및 그의 동작 방법 |
CN107704735B (zh) * | 2017-09-12 | 2020-03-27 | 珠海格力电器股份有限公司 | 一种授权管理方法、装置及电子设备 |
US11132106B2 (en) * | 2018-03-13 | 2021-09-28 | Vmware, Inc. | User-specific applications for shared devices |
CN110324276B (zh) * | 2018-03-28 | 2022-01-07 | 腾讯科技(深圳)有限公司 | 一种登录应用的方法、系统、终端和电子设备 |
CN112822222B (zh) * | 2018-06-25 | 2023-04-25 | 蚂蚁金服(杭州)网络技术有限公司 | 登录验证方法、自动登录的验证方法、服务端及客户端 |
CN109086596B (zh) * | 2018-08-08 | 2022-03-22 | 网易(杭州)网络有限公司 | 应用程序的认证方法、装置及系统 |
CN110557502B (zh) * | 2019-08-09 | 2021-03-23 | 五八有限公司 | 一种小程序的调起方法、装置、电子设备及可读存储介质 |
CN111352552B (zh) * | 2020-03-30 | 2021-09-10 | 北京达佳互联信息技术有限公司 | 一种应用登录方法、装置、电子设备及存储介质 |
CN111756923A (zh) * | 2020-06-15 | 2020-10-09 | 北京智明星通科技股份有限公司 | 一种手机游戏的登录方法、系统及游戏终端 |
CN113766289B (zh) * | 2021-09-27 | 2024-03-29 | Vidaa(荷兰)国际控股有限公司 | 一种显示设备及基于语音交互的登录控制方法 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103188237A (zh) * | 2011-12-30 | 2013-07-03 | 盛大计算机(上海)有限公司 | 单点登录系统及方法 |
CN105072133A (zh) * | 2015-08-28 | 2015-11-18 | 北京金山安全软件有限公司 | 一种应用程序的登录方法及装置 |
US20150363066A1 (en) * | 2014-06-12 | 2015-12-17 | Apple Inc. | Systems and Methods for Efficiently Navigating Between Applications with Linked Content on an Electronic Device with a Touch-Sensitive Display |
CN105573615A (zh) * | 2014-09-12 | 2016-05-11 | 三星电子株式会社 | 用于通过应用选择屏幕来运行应用的方法和装置 |
CN105808095A (zh) * | 2015-07-08 | 2016-07-27 | 维沃移动通信有限公司 | 一种终端的应用界面的显示方法及终端 |
CN106888202A (zh) * | 2016-12-08 | 2017-06-23 | 阿里巴巴集团控股有限公司 | 授权登录方法及装置 |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5768503A (en) * | 1995-09-25 | 1998-06-16 | International Business Machines Corporation | Middleware program with enhanced security |
US7350139B1 (en) * | 2000-06-16 | 2008-03-25 | American Express Travel Related Services Company, Inc. | System and method for utilizing a drag and drop technique to complete electronic forms |
US7624351B2 (en) * | 2001-10-02 | 2009-11-24 | Verizon Corporate Services Group Inc. | Methods and apparatus for controlling a plurality of applications |
US20030154110A1 (en) * | 2001-11-20 | 2003-08-14 | Ervin Walter | Method and apparatus for wireless access to a health care information system |
US7818582B2 (en) * | 2004-06-25 | 2010-10-19 | Accenture Global Services Gmbh | Single sign-on with common access card |
US20060021004A1 (en) * | 2004-07-21 | 2006-01-26 | International Business Machines Corporation | Method and system for externalized HTTP authentication |
GB0420409D0 (en) * | 2004-09-14 | 2004-10-20 | Waterleaf Ltd | Online commercial transaction system and method of operation thereof |
US20060075224A1 (en) * | 2004-09-24 | 2006-04-06 | David Tao | System for activating multiple applications for concurrent operation |
US7895644B1 (en) * | 2005-12-02 | 2011-02-22 | Symantec Operating Corporation | Method and apparatus for accessing computers in a distributed computing environment |
US20070174429A1 (en) * | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US7581244B2 (en) * | 2006-01-25 | 2009-08-25 | Seiko Epson Corporation | IMX session control and authentication |
US8949933B2 (en) * | 2006-08-15 | 2015-02-03 | International Business Machines Corporation | Centralized management of technical records across an enterprise |
TWI328179B (en) * | 2006-12-05 | 2010-08-01 | Fineart Technology Co Ltd | Controlling module for programs and method for the same |
US20080168539A1 (en) * | 2007-01-05 | 2008-07-10 | Joseph Stein | Methods and systems for federated identity management |
US8984628B2 (en) * | 2008-10-21 | 2015-03-17 | Lookout, Inc. | System and method for adverse mobile application identification |
US8347386B2 (en) * | 2008-10-21 | 2013-01-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
US8621387B2 (en) * | 2009-06-08 | 2013-12-31 | Apple Inc. | User interface for multiple display regions |
US20120191657A1 (en) | 2011-01-17 | 2012-07-26 | Nathan Daniel Weinstein | Data backup, storage and management system and methodology |
KR101356368B1 (ko) * | 2012-02-24 | 2014-01-29 | 주식회사 팬택 | 어플리케이션 전환 장치 및 방법 |
US9185112B2 (en) * | 2012-10-10 | 2015-11-10 | Adobe Systems Incorporated | Extensible configuration system to allow a website to authenticate users based on an authorization protocol |
US9419963B2 (en) * | 2013-07-02 | 2016-08-16 | Open Text S.A. | System and method for controlling access |
US9065819B1 (en) * | 2013-12-23 | 2015-06-23 | Cellco Partnership | Single sign on (SSO) authorization and authentication for mobile communication devices |
CN105207774B (zh) * | 2014-05-30 | 2019-03-01 | 北京奇虎科技有限公司 | 验证信息的密钥协商方法及装置 |
US9264419B1 (en) * | 2014-06-26 | 2016-02-16 | Amazon Technologies, Inc. | Two factor authentication with authentication objects |
CN104113533B (zh) * | 2014-07-02 | 2017-10-27 | 百度在线网络技术(北京)有限公司 | 登录授权方法和装置 |
US20160007182A1 (en) * | 2014-07-02 | 2016-01-07 | Remember Everyone, LLC | Directing Information Based on Device Proximity |
CN105592011B (zh) * | 2014-10-23 | 2019-12-24 | 阿里巴巴集团控股有限公司 | 一种账号登录方法及装置 |
US9866545B2 (en) * | 2015-06-02 | 2018-01-09 | ALTR Solutions, Inc. | Credential-free user login to remotely executed applications |
CN105101205B (zh) * | 2015-06-19 | 2018-12-18 | 广州密码科技有限公司 | 一种一键登录认证方法、装置及系统 |
US10635716B2 (en) * | 2016-08-24 | 2020-04-28 | Facebook, Inc. | Methods and systems for secured end-to-end data communication |
-
2016
- 2016-12-08 CN CN201611124494.XA patent/CN106888202B/zh active Active
-
2017
- 2017-09-19 TW TW106132068A patent/TWI665623B/zh active
- 2017-11-29 PL PL17877865T patent/PL3554034T3/pl unknown
- 2017-11-29 EP EP17877865.0A patent/EP3554034B8/en active Active
- 2017-11-29 JP JP2019531144A patent/JP6859512B2/ja active Active
- 2017-11-29 ES ES17877865T patent/ES2862397T3/es active Active
- 2017-11-29 WO PCT/CN2017/113555 patent/WO2018103559A1/zh unknown
- 2017-11-29 KR KR1020197019798A patent/KR102194071B1/ko active IP Right Grant
-
2019
- 2019-04-10 US US16/380,395 patent/US10445486B2/en active Active
- 2019-06-07 PH PH12019501290A patent/PH12019501290A1/en unknown
- 2019-10-09 US US16/597,521 patent/US10795983B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103188237A (zh) * | 2011-12-30 | 2013-07-03 | 盛大计算机(上海)有限公司 | 单点登录系统及方法 |
US20150363066A1 (en) * | 2014-06-12 | 2015-12-17 | Apple Inc. | Systems and Methods for Efficiently Navigating Between Applications with Linked Content on an Electronic Device with a Touch-Sensitive Display |
CN105573615A (zh) * | 2014-09-12 | 2016-05-11 | 三星电子株式会社 | 用于通过应用选择屏幕来运行应用的方法和装置 |
CN105808095A (zh) * | 2015-07-08 | 2016-07-27 | 维沃移动通信有限公司 | 一种终端的应用界面的显示方法及终端 |
CN105072133A (zh) * | 2015-08-28 | 2015-11-18 | 北京金山安全软件有限公司 | 一种应用程序的登录方法及装置 |
CN106888202A (zh) * | 2016-12-08 | 2017-06-23 | 阿里巴巴集团控股有限公司 | 授权登录方法及装置 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111970298A (zh) * | 2020-08-26 | 2020-11-20 | 腾讯科技(深圳)有限公司 | 应用访问方法、装置、存储介质及计算机设备 |
CN111970298B (zh) * | 2020-08-26 | 2024-01-05 | 腾讯科技(深圳)有限公司 | 应用访问方法、装置、存储介质及计算机设备 |
Also Published As
Publication number | Publication date |
---|---|
CN106888202A (zh) | 2017-06-23 |
ES2862397T3 (es) | 2021-10-07 |
US20190236263A1 (en) | 2019-08-01 |
US20200042690A1 (en) | 2020-02-06 |
PL3554034T3 (pl) | 2021-06-14 |
EP3554034A4 (en) | 2019-12-18 |
CN106888202B (zh) | 2020-02-21 |
JP6859512B2 (ja) | 2021-04-14 |
PH12019501290A1 (en) | 2019-12-02 |
US10445486B2 (en) | 2019-10-15 |
KR20190089069A (ko) | 2019-07-29 |
TWI665623B (zh) | 2019-07-11 |
KR102194071B1 (ko) | 2020-12-23 |
EP3554034A1 (en) | 2019-10-16 |
TW201822093A (zh) | 2018-06-16 |
EP3554034B8 (en) | 2021-03-17 |
US10795983B2 (en) | 2020-10-06 |
EP3554034B1 (en) | 2021-01-06 |
JP2020502657A (ja) | 2020-01-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018103559A1 (zh) | 授权登录方法及装置 | |
JP7268167B2 (ja) | 顧客サポート呼の第2の要素認証のためのシステムおよび方法 | |
US11159626B2 (en) | Session transfer between resources | |
JP6628319B2 (ja) | 2要素認証 | |
RU2541847C2 (ru) | Управление доступом к защищенным функциям приложений с использованием уровней доверия клиента | |
KR20190072554A (ko) | 스크린 공유 경험을 위한 공유 보호 | |
JP2014526744A (ja) | リソースアクセスの権限付与 | |
EP2849403A1 (en) | Method and system for controlling the exchange of privacy-sensitive information | |
US20180107831A1 (en) | Securing data gathering devices of a personal computing device while performing sensitive data gathering activities to prevent the misappropriation of personal user data gathered therewith | |
CN108141497A (zh) | 一种信息交互的方法及设备 | |
US20220100874A1 (en) | Data loss protection on secondary displays | |
US20220038463A1 (en) | Method and system of multi-channel user authorization | |
US20220350903A1 (en) | Virtual machine formjacking protection | |
US8955070B2 (en) | Controlled password modification method and apparatus | |
WO2018145239A1 (zh) | 一种电子支付方法和装置 | |
WO2018145238A1 (zh) | 一种nfc设备的鉴权方法和装置 | |
CN118611992A (zh) | 一种接入方法及系统、电子设备 | |
KR20130110331A (ko) | 시큐어 os를 이용한 모바일 디바이스의 사용자 인증 시스템 및 사용자 인증 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17877865 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019531144 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20197019798 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017877865 Country of ref document: EP Effective date: 20190708 |