WO2018103559A1 - 授权登录方法及装置 - Google Patents

授权登录方法及装置 Download PDF

Info

Publication number
WO2018103559A1
WO2018103559A1 PCT/CN2017/113555 CN2017113555W WO2018103559A1 WO 2018103559 A1 WO2018103559 A1 WO 2018103559A1 CN 2017113555 W CN2017113555 W CN 2017113555W WO 2018103559 A1 WO2018103559 A1 WO 2018103559A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
login
user interface
user
server
Prior art date
Application number
PCT/CN2017/113555
Other languages
English (en)
French (fr)
Inventor
傅小贞
Original Assignee
阿里巴巴集团控股有限公司
傅小贞
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司, 傅小贞 filed Critical 阿里巴巴集团控股有限公司
Priority to KR1020197019798A priority Critical patent/KR102194071B1/ko
Priority to ES17877865T priority patent/ES2862397T3/es
Priority to JP2019531144A priority patent/JP6859512B2/ja
Priority to EP17877865.0A priority patent/EP3554034B8/en
Priority to PL17877865T priority patent/PL3554034T3/pl
Publication of WO2018103559A1 publication Critical patent/WO2018103559A1/zh
Priority to US16/380,395 priority patent/US10445486B2/en
Priority to PH12019501290A priority patent/PH12019501290A1/en
Priority to US16/597,521 priority patent/US10795983B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/048Indexing scheme relating to G06F3/048
    • G06F2203/04806Zoom, i.e. interaction techniques or interactors for controlling the zooming operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/048Indexing scheme relating to G06F3/048
    • G06F2203/04808Several contacts: gestures triggering a specific function, e.g. scrolling, zooming, right-click, when the user establishes several contacts with the surface simultaneously; e.g. using several fingers or a combination of fingers and pen
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Definitions

  • the present application relates to the field of computer applications, and in particular, to an authorized login method and apparatus.
  • Authorized login means that the authorized user directly logs in to the shortcut login mode of another application by using the login identity of an application that has successfully logged in.
  • the user when browsing an application, if the user needs to use the login identity of another successfully logged-in application, and the authorized login for the current application, the user is usually required to perform multiple operations on the login page of the application. The login is complete, so the interaction is more complicated and not easy.
  • the application provides an authorization login method, and the method includes:
  • the blank area generated by the user interface of the first application is displayed, and the icon information of the second application that the user has logged in is displayed; wherein the first application is pre-established with the second application;
  • the application further provides an authorization login device, the device comprising:
  • a scaling module that reduces the first in response to a zooming operation of a user interface for the first application User interface of the application
  • a display module where the blank area generated by the user interface of the first application is reduced, the icon information of the second application that the user has logged in is displayed; wherein the first application is pre-established with the second application. ;
  • a delivery module in response to an operation of dragging the icon information of the second application from the blank area to the reduced user interface of the first application, transmitting login authorization information of the second application to the a first application, in which the login authorization information of the second application is submitted by the first application to the server of the second application for login authorization verification;
  • the login module in response to the server of the second application, authorizes login to the first application by using a notification message that is verified by the server of the first application for verifying the login authorization information.
  • an interactive manner is provided that can quickly complete the authorized login.
  • the user can perform a preset zoom operation on the user interface of the first application, and trigger the operating system of the terminal device to narrow the user interface of the first application.
  • the blank area generated by the user interface of the first application is displayed, and at least one icon information of the second application that is associated with the first application and the user has logged in is displayed, and then the icon information of the second application is dragged by the user to the first application.
  • a user interface of the application to trigger the terminal device to transmit the login authorization information of the second application to the first application, and submit, by the first application, the login authorization information of the second application to the second application through the server of the first application
  • the application server performs login authorization verification.
  • the user can use the login authorization information of the first application to log in to the second application, thereby realizing that the user can quickly complete the authorized login through the simple and quick interaction operation, thereby reducing the The complexity of the operation when performing an authorized login improves the user's interactive experience.
  • FIG. 1 is a schematic diagram of interaction of performing authorization login in the related art shown in the present application.
  • FIG. 2 is a flowchart of an authorization login method according to an embodiment of the present application.
  • FIG. 3 is a schematic diagram of interaction of a reduced user interface according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram showing interaction of displaying associated application icon information in a blank area of a reduced user interface according to an embodiment of the present application
  • FIG. 5 is a schematic diagram of interaction of authorized login according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of interaction between an application to transfer a target object in an authorized login scenario according to an embodiment of the present application
  • FIG. 7 is a logic block diagram of an authorization login device according to an embodiment of the present application.
  • FIG. 8 is a structural diagram of hardware involved in a terminal device that carries the authorized login device according to an embodiment of the present application.
  • the APP application of the mobile application is used as an example.
  • a login entry corresponding to multiple third-party APPs may be set in the login interface of the current APP1; the user needs to use a third party that has successfully logged in.
  • the login of APP2 can trigger the login entry corresponding to APP2, jump to the login authorization page of APP2, and further interact with the login authorization page to confirm the operation of the authorized login.
  • APP1 can initiate authorized login authentication to the server corresponding to APP2, and complete the authorized login of APP1 by using the login identity of APP2.
  • an interactive manner that can quickly complete the authorized login.
  • the user can perform a preset zoom operation on the user interface of the first application, and trigger the operating system of the terminal device to narrow the user interface of the first application.
  • the blank area generated by the user interface of the first application is displayed, and at least one icon information of the second application that is associated with the first application and the user has logged in is displayed, and then the icon information of the second application is dragged by the user to The user interface of the first application,
  • the triggering terminal device transmits the login authorization information of the second application to the first application, and the login authorization information of the second application is submitted by the first application to the server of the second application to log in.
  • the user can log in to the second application by using the login authorization information of the first application, so that the user can quickly complete the authorized login through simple and quick interaction, and reduce the operation when performing the authorized login. Complexity enhances the user's interactive experience.
  • FIG. 2 is a schematic diagram of an authorization login method applied to an operating system of a terminal device according to an embodiment of the present disclosure. The method performs the following steps:
  • Step 201 Reducing a user interface of the first application in response to a zooming operation of a user interface of the first application;
  • Step 202 The blank area generated by the user interface of the first application is displayed, and the icon information of the second application that the user has logged in is displayed.
  • the first application is pre-established with the second application. ;
  • the terminal device may be a mobile terminal device or a PC terminal device; for example, the terminal device may be a touch screen smart phone, a laptop computer or a tablet computer; and the operating system of the terminal device may be an IOS, Android, Windows or other types of operating systems.
  • the first application is an application that can authorize users to directly log in using the login identity of other third-party applications.
  • the second application refers to an application that the user has successfully logged in and can provide an associated authorized login service for other applications. ;
  • the first application may refer to a niche application having a small number of users and having some special functions; and the second application may refer to a large number of users, which can be used for other niche
  • the application provides an associated application for authorized login services; for example, applications such as Alipay and WeChat.
  • the first application and the second application may be an APP application installed on the mobile terminal device, or may be a web application installed on the PC terminal, in this example. No particular limitation is imposed.
  • the server corresponding to the first application and the second application may establish an association relationship between the first application and the second application, respectively.
  • the association relationship may specifically refer to a login association between the first application and the second application; when the first application and the second application establish a login association between the two on their respective servers, the first application And the server corresponding to the second application will open the function permission to directly complete the login using the login identity of the other party.
  • the user of the first application may be used.
  • the interface performs a preset zooming operation to trigger an operating system of the terminal device (hereinafter referred to as an operating system) to reduce the user interface; when the operating system detects the zooming operation, the operating system may respond to the zooming operation according to a preset reduction ratio. Reduce the user interface.
  • an operating system an operating system of the terminal device
  • the preset zoom operation may include a two-finger pinch touch operation for the user interface, a preset trigger operation for the user interface (such as a double-click operation or other types of operations); and, for a preset virtual A preset trigger action for a button (such as a zoom button) or a physical button (such as a fingerprint button or other physical button on a terminal device).
  • the user can perform a two-finger pinch operation as shown in FIG. 3 for the first application currently being displayed to trigger the operating system to narrow the user interface.
  • a zoom button may be set in a user interface of the user interface currently being displayed by the first application, and the user may trigger the operating system to narrow the user interface by double-clicking the zoom button;
  • the zoom-out event for the user interface may be defined in advance in the operating system as a trigger event for performing a double-click operation on the fingerprint button of the terminal device, and when the operating system detects the user's double-click operation on the fingerprint button When the double-click operation is performed, the user interface can be reduced.
  • the icon information of the plurality of second applications that are previously associated with the first application may be displayed in a blank area generated by reducing the user interface.
  • the size of the blank area may be adjusted by adjusting the scaling ratio; and the number of icon information of the second application displayed in the blank area may also be based on the second relationship actually established with the first application.
  • the number of apps is customized.
  • the first application is APP1
  • the second application includes APP2, APP3, and APP4.
  • the operating system is triggered to be based on a preset ratio.
  • APP2, APP3, and APP4 can be displayed at any position in the blank area generated after the user interface of APP1 is reduced (shown in FIG. 4 is a blank area displayed above the reduced user interface) .
  • Step 203 In response to the operation of dragging the icon information of the second application from the blank area to the reduced user interface of the first application, transmitting login authorization information of the second application to the a first application, in which the login authorization information of the second application is submitted by the first application to the server of the second application for login authorization verification;
  • Step 204 In response to the server of the second application, by using the notification message returned by the server of the first application for verifying the login authorization information, the first application is authorized to log in.
  • the operating system displays the icon information of the plurality of second applications that are associated with the first application in a blank area generated after the user interface of the first application is zoomed
  • the user may The icon information of the second application displayed in the control area is directly dragged to the area of the reduced user interface of the first application, to trigger the operating system to transmit the login authorization information of the second application that is dragged to the The first application.
  • the login authorization information may include an application identifier (such as an APP ID) of the second application, and a user identifier (such as a UID) allocated by the server of the second application to the user after the user successfully logs in to the second application. And a login credential (such as a Token credential) issued by the server of the second application after the user successfully logs in to the second application;
  • an application identifier such as an APP ID
  • UID user identifier allocated by the server of the second application to the user after the user successfully logs in to the second application.
  • a login credential such as a Token credential
  • the server of the application when a user successfully logs in to a certain account by entering a login account and password, After use, the server of the application usually assigns a corresponding UID to the user, and sends a corresponding Token credential to the application; the UID is used to uniquely identify the identity of the user, and the Token credential is usually based on a preset.
  • the token algorithm calculates a random string that is used to verify the login identity of the user.
  • the login authorization information may include an application identifier of the second application, a UID assigned to the user after successfully logging in to the second application, and a Token credential.
  • the second application may be pre-configured with an open interface (API) for data transfer between applications.
  • API open interface
  • the second application pre-configured may be invoked.
  • the interface is opened, and then the login authorization information of the user logging in to the second application is transmitted as a call parameter to the second application.
  • the first application may be based on The pre-established connection between the server of the first application interacts with the server of the first application, and submits the login authorization information of the second application to the server of the first application.
  • the server of the first application may perform the login association in advance between the server of the first application and the second application, and thus may be invoked by data transmission between the server.
  • the mechanism further submits the login authorization information of the second application to the server of the second application for login authorization authentication.
  • the server of the second application may return a verification notification message to the server of the first application, and the server of the first application receives the notification message.
  • the personal information (such as the user's UID, personal data, and the like) used by the user when logging in to the second application may be used to set the first application to the login state, and then the notification message is continuously sent to the operating system. .
  • the operating system may also invoke the personal information used by the user when logging in to the second application from the system level. Automatically log in to the first application.
  • the first application is APP1
  • the second application includes APP2, APP3, and APP4.
  • the blank area displays icon information of APP2, APP3, and APP4;
  • the login identity is authorized to log in to APP1.
  • the user can drag the icon of APP2 to the reduced user interface of APP1.
  • the operating system may invoke the above-mentioned open interface pre-configured by the APP1, and the APP ID of the APP2, the service end of the APP2, and the UID assigned by the user and the APP2.
  • the Token certificate sent by the server is transmitted as a call parameter to the inside of the APP1 through the open interface. Then, the APP1 can continue to deliver the APP ID of the APP2, the UID of the APP2 to the user, and the server of the APP2.
  • the Token certificate is submitted to the server of APP2 for verification by the server of APP1; when the server of APP2 is verified to confirm that the token is valid, the notification message of the authentication can be returned to the server of APP1, and then the service of APP1
  • the terminal can pull the personal information reserved by the user on the server of the APP2 to complete the login authorization, and deliver the notification message to the operating system. After receiving the notification message, the operating system can also pull the user who logs in to the APP2. Information is automatically logged in to APP1.
  • the operating system may restore the user interface of the first application to the default size.
  • the user can quickly complete the use of the third-party application by dragging the icon of the third-party application displayed in the blank area of the reduced user interface of the current application to the user interface of the current application.
  • Login identity the operation of login authorization for the current application, thus significantly reducing the complexity of the operation when performing authorized login, and improving the user's interactive experience.
  • the operating system reduces the user interface of the first application by a zoom operation in response to the user's user interface for the first application, and the plurality of second applications associated with the first application are pre-established with the login
  • the icon information shows that after the blank area generated by the user interface of the first application is reduced, the user can drag the icon information of any second application in the blank area to the reduced first application, in addition to the interaction manner described above.
  • the user interface to quickly complete the use of the user in the first
  • performing a fast login authorization for the first application in the actual application, the user may also drag the target object of the specified type currently displayed in the reduced user interface of the first application to the blank.
  • the area where any icon information is displayed in the area the target object is quickly delivered to the second application corresponding to the icon information, and the file sharing of the target object is completed.
  • the target object may include any type of file that can be transferred between applications, such as text, pictures, links, videos, articles, and the like displayed in the user interface of the first application.
  • applications such as text, pictures, links, videos, articles, and the like displayed in the user interface of the first application.
  • the background developer of the first application can also pre-limit the types of target objects that need to be transferred between applications;
  • the background developer of the first application can specify a file type that can be passed to other applications for the first application based on actual needs, assuming that the developer specifies the image and text as a file that can be delivered, then In this case, only the text and images displayed in the application's user interface can respond to the user's dragging to other application icons.
  • each of the second applications associated with the login is established in advance, and an open interface may be pre-configured separately.
  • the operating system detects that the target object of the specified type displayed by the user in the user interface of the first application is dragged to the icon information of any second application displayed in the blank area, the second application may be invoked.
  • the above open interface transmits the target object as a call parameter to the second application, and is further processed by the second application.
  • the first application is APP1
  • the second application includes APP2, APP3, and APP4.
  • the blank area displays icon information of APP2, APP3, and APP4;
  • the product image displayed in the user interface of the APP1 is quickly shared to the APP2.
  • the user can drag the product image displayed in the user interface of the APP1 to the area of the icon of the APP2 in the blank area, and the operating system detects that After the product image is dragged to the area where the icon of the APP2 is located, the open interface pre-configured by the APP2 may be invoked, and the product image is used as a calling parameter, and is transmitted to the inside of the APP2 through the open interface, and further processed by the APP2.
  • the manner in which the second application further processes the delivered target object generally depends on the processing logic loaded in the open interface, and may be included in the local processing. Save, or perform further forwarding and other operations; in practical applications, developers of the second application background can independently develop the open interface based on actual needs.
  • APP2 is a mail application
  • the user needs to transmit the product image displayed in the user interface of APP1 to the APP2 as an attachment
  • the developer of APP2 is developing the APP2.
  • the execution logic of "sending the file delivered to the APP as an attachment" may be added to the structure of the open interface.
  • the execution logic can be immediately executed, jump to the mail sending page, and the product picture is added to the mail sending page in the form of an attachment.
  • the user can quickly share the target object to the third-party application by dragging the target object displayed in the reduced user interface of the current application to the icon of the third-party application displayed in the blank area. , so you can significantly improve the efficiency of file sharing between applications.
  • the present application also provides an embodiment of the device.
  • the present application provides an authorization login device 70, which is applied to a terminal device.
  • the hardware architecture involved in the terminal device that carries the authorization login device 70 generally includes a CPU and a memory.
  • the device 70 includes:
  • the zooming module 701 is configured to reduce a user interface of the first application in response to a zooming operation of the user interface of the first application;
  • the display module 702 displays, in the blank area generated by the user interface of the first application, the icon information of the second application that the at least one user has logged in; wherein the first application is pre-established with the second application. relationship;
  • the delivery module 703 in response to the operation of dragging the icon information of the second application from the blank area to the reduced user interface of the first application, transmitting the login authorization information of the second application to the The first application, in which the login authorization information of the second application is submitted by the first application to the server of the second application for login authorization verification;
  • the login module 704 is configured to respond to the service of the second application by using the service of the first application.
  • the notification message returned by the terminal for verifying the login authorization information is authorized to log in to the first application.
  • the scaling module 701 further:
  • the user interface of the first application is restored to a default size.
  • the delivery module 703 further:
  • the delivery module 703 further:
  • the zooming operation includes: a two-finger pinch touch operation for a user interface of the first application;
  • a preset trigger action for a preset virtual button or a physical button is a preset trigger action for a preset virtual button or a physical button.
  • the login authorization information includes:
  • the application identifier of the second application the user identifier assigned by the server of the second application to the user after the user successfully logs in to the second application, and the user is successfully logged into the second application by the user
  • the login credential issued by the server of the second application The login credential issued by the server of the second application.
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, in which The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present application. Those of ordinary skill in the art can understand and implement without any creative effort.
  • the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
  • a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email transceiver, and a game control.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

本申请提供一种授权登录方法,包括:响应于针对第一应用的用户界面的缩放操作,缩小第一应用的用户界面;在第一应用的用户界面缩小后产生的空白区域展示至少一个用户已登录的第二应用的图标信息;其中,第一应用与所述第二应用预先建立了关联关系;响应于将第二应用的图标信息从所述空白区域拖动至缩小后的第一应用的用户界面的操作,将第二应用的登录授权信息传递至第一应用,以由第一应用将第二应用的登录授权信息通过第一应用的服务端提交至第二应用的服务端进行登录授权验证;响应于第二应用的服务端通过第一应用的服务端返回的针对该登录授权信息验证通过的通知消息,授权登录第一应用。本申请可以降低在执行授权登录时的操作复杂度。

Description

授权登录方法及装置 技术领域
本申请涉及计算机应用领域,尤其涉及一种授权登录方法及装置。
背景技术
授权登录,是指授权用户直接使用一个已登录成功的应用的登录身份,登录另一个应用的快捷登录模式。然而,在实际应用中,用户在浏览某个应用时,如果需要使用其它已经登录成功的应用的登录身份,针对当前应用进行授权登录,通常要求用户在该应用的登录页面中执行多次操作才能完成登录,因此交互较复杂不够简便。
发明内容
本申请提出一种授权登录方法,所述方法包括:
响应于针对第一应用的用户界面的缩放操作,缩小所述第一应用的用户界面;
在所述第一应用的用户界面缩小后产生的空白区域展示至少一个用户已登录的第二应用的图标信息;其中,所述第一应用与所述第二应用预先建立了关联关系;
响应于将所述第二应用的图标信息从所述空白区域拖动至缩小后的所述第一应用的用户界面的操作,将所述第二应用的登录授权信息传递至所述第一应用,以由所述第一应用将所述第二应用的登录授权信息通过所述第一应用的服务端提交至所述第二应用的服务端进行登录授权验证;
响应于所述第二应用的服务端通过所述第一应用的服务端返回的针对所述登录授权信息验证通过的通知消息,授权登录所述第一应用。
本申请还提出一种授权登录装置,所述装置包括:
缩放模块,响应于针对第一应用的用户界面的缩放操作,缩小所述第一 应用的用户界面;
展示模块,在所述第一应用的用户界面缩小后产生的空白区域展示至少一个用户已登录的第二应用的图标信息;其中,所述第一应用与所述第二应用预先建立了关联关系;
传递模块,响应于将所述第二应用的图标信息从所述空白区域拖动至缩小后的所述第一应用的用户界面的操作,将所述第二应用的登录授权信息传递至所述第一应用,以由所述第一应用将所述第二应用的登录授权信息通过所述第一应用的服务端提交至所述第二应用的服务端进行登录授权验证;
登录模块,响应于所述第二应用的服务端通过所述第一应用的服务端返回的针对所述登录授权信息验证通过的通知消息,授权登录所述第一应用。
本申请中,提出一种能够快捷的完成授权登录的交互方式;用户可以针对第一应用的用户界面执行预设的缩放操作,触发终端设备的操作系统缩小该第一应用的用户界面,在该第一应用的用户界面缩小后产生的空白区域展示至少一个与第一应用建立了关联关系且用户已登录的第二应用的图标信息,然后由用户将该第二应用的图标信息拖动至第一应用的用户界面,来触发终端设备将该第二应用的登录授权信息传递至第一应用,并由第一应用将该第二应用的登录授权信息通过第一应用的服务端提交至第二应用的服务端进行登录授权验证,当验证通过后用户可以使用第一应用的登录授权信息登录该第二应用,从而实现了用户可以通过简易快捷的交互操作,快速的完成授权登录,降低了在执行授权登录时的操作复杂度,提升了用户的交互体验。
附图说明
图1是本申请示出的相关技术中执行授权登录的交互示意图;
图2是本申请一实施例示出的一种授权登录方法的流程图;
图3是本申请一实施例示出的一种缩小用户界面的交互示意图;
图4是本申请一实施例示出的一种在缩小后的用户界面的空白区域展示关联应用图标信息的交互示意图;
图5是本申请一实施例示出的授权登录的交互示意图;
图6是本申请一实施例示出的在授权登录的场景下应用间传递目标对象的交互示意图;
图7是本申请一实施例示出的一种授权登录装置的逻辑框图;
图8是本申请一实施例示出的承载所述授权登录装置的终端设备所涉及的硬件结构图。
具体实施方式
在相关技术中,用户在使用第三方的已经登录成功的应用的登录身份,针对当前浏览的应用进行授权登录时,通常要求用户在该应用的登录页面中执行多次操作才能完成登录,因此交互较复杂不够简便。
例如,请参见图1,以上述应用为移动端的APP应用为例,通常可以在当前的APP1的登录界面中设置对应于多个第三方APP的登录入口;用户在需要使用已成功登录的第三方的APP2的登录身份登录APP1时,可以触发对应于APP2的登录入口,跳转至APP2的登录授权页面,并在该登录授权页面中进一步进行交互操作,对本次授权登陆的操作进行确认后,APP1才能够向APP2对应的服务端发起授权登录验证,完成使用APP2的登录身份登录APP1的授权登录。
可见,在相关技术中,用户如果需要使用第三方应用的登录身份,授权登陆当前浏览的应用,至少要执行授权登录的触发,以及在页面跳转后的授权登录的确认两次操作,才能够完成授权登录操作,因此交互较复杂不够简便。
为了解决上述问题,提出一种能够快捷的完成授权登录的交互方式;用户可以针对第一应用的用户界面执行预设的缩放操作,触发终端设备的操作系统缩小该第一应用的用户界面,在该第一应用的用户界面缩小后产生的空白区域展示至少一个与第一应用建立了关联关系且用户已登录的第二应用的图标信息,然后由用户将该第二应用的图标信息拖动至第一应用的用户界面, 来触发终端设备将该第二应用的登录授权信息传递至第一应用,并由第一应用将该第二应用的登录授权信息通过第一应用的服务端提交至第二应用的服务端进行登录授权验证,当验证通过后用户可以使用第一应用的登录授权信息登录该第二应用,从而实现了用户可以通过简易快捷的交互操作,快速的完成授权登录,降低了在执行授权登录时的操作复杂度,提升了用户的交互体验。
下面通过具体实施例并结合具体的应用场景对本申请进行描述。
请参考图2,图2是本申请一实施例提供的一种授权登录方法,应用于终端设备的操作系统,所述方法执行以下步骤:
步骤201,响应于针对第一应用的用户界面的缩放操作,缩小所述第一应用的用户界面;
步骤202,在所述第一应用的用户界面缩小后产生的空白区域展示至少一个用户已登录的第二应用的图标信息;其中,所述第一应用与所述第二应用预先建立了关联关系;
上述终端设备,可以是指移动终端设备,也可以是指PC终端设备;比如,上述终端设备可以是触屏智能手机,也可以是笔记本电脑或者平板电脑;上述终端设备的操作系统,可以IOS、Android、Windows或者其它类型的操作系统。
上述第一应用,是指能够授权用户使用其它第三方应用的登录身份直接进行登录的应用;而上述第二应用,是指用户已经成功登录,且能够为其它应用提供关联的授权登录服务的应用;
例如,在实际应用中,上述第一应用,可以是指那些用户数量较少,同时具有一些特色功能的小众应用;而上述第二应用,可以是指那些用户数量庞大,能够为其它小众应用提供关联的授权登陆服务的应用;比如,诸如支付宝、微信等应用。
其中,在实际应用中,上述第一应用以及第二应用,可以是安装于移动终端设备上的APP应用,也可以是安装于PC终端上的Web应用,在本例中 不进行特别限定。
在初始状态下,上述第一应用以及第二应用对应的服务端,可以分别建立第一应用与第二应用之间的关联关系。该关联关系,具体可以是指第一应用与第二应用之间的登录关联;当在第一应用以及第二应用在其各自的服务端上建立了二者的登录关联后,则第一应用以及第二应用对应的服务端将会开放使用对方的登录身份直接完成登录的功能权限。
在本例中,当用户在浏览第一应用的过程中,如果需要使用终端设备上安装的某一已经成功登录的第二应用的登录身份登录第一应用,则可以针对该第一应用的用户界面,执行预设的缩放操作,来触发终端设备的操作系统(以下简称操作系统)缩小该用户界面;当操作系统检测到该缩放操作后,可以响应于该缩放操作,按照预设的缩小比例缩小该用户界面。
其中,上述预设的缩放操作,可以包括针对该用户界面的双指捏合触控操作;针对该用户界面的预设触发操作(比如双击操作或者其它类型的操作);以及,针对预设的虚拟按键(比如缩放按钮)或者实体按键(比如指纹按钮或者终端设备上的其它实体按键)的预设触发操作。
例如,请参见图3,当上述终端设备为触屏设备时:
用户可以针对该第一应用当前正在显示的,执行如图3所示出的双指捏合操作,来触发操作系统缩小该用户界面。
当上述终端设备为非触屏设备时:
在一种情况下,可以在第一应用当前正在显示的用户界面的用户界面中设置一缩放按钮,用户可以通过双击该缩放按钮,来触发操作系统缩小该用户界面;
在另一种情况下,可以预先在操作系统中将针对该用户界面的缩小事件,定义为针对终端设备的指纹按键执行双击操作的触发事件,当操作系统检测到用户针对该指纹按键的双击操作时,则可以响应该双击操作,缩小该用户界面。
在本例中,当操作系统响应于用户针对第一应用的用户界面的缩放操作, 将该用户界面按照预设的比例缩小后,此时可以将预先与第一应用建立了关联关系的多个第二应用的图标信息,展示在对该用户界面进行缩小后产生的空白区域中。
其中,该空白区域的大小,可以通过调整缩放比例来同步的进行调整;而在该空白区域展示的第二应用的图标信息的数量,也可以基于实际与第一应用建立了关联关系的第二应用的数量进行自定义。
例如,请参见图4,假设上述第一应用为APP1,上述第二应用包括APP2、APP3和APP4,当用户针对APP1的用户界面执行预设的缩放操作,触发操作系统基于预设的比例对该用户界面进行缩小后,可以将APP2、APP3和APP4展示于APP1的用户界面被缩小后产生的空白区域中的任意位置(图4示出的为展示在位于缩小后的用户界面上方的空白区域)。
步骤203,响应于将所述第二应用的图标信息从所述空白区域拖动至缩小后的所述第一应用的用户界面的操作,将所述第二应用的登录授权信息传递至所述第一应用,以由所述第一应用将所述第二应用的登录授权信息通过所述第一应用的服务端提交至所述第二应用的服务端进行登录授权验证;
步骤204,响应于所述第二应用的服务端通过所述第一应用的服务端返回的针对所述登录授权信息验证通过的通知消息,授权登录所述第一应用。
在本例中,当操作系统将与第一应用建立了关联关系的多个第二应用的图标信息,展示于第一应用的用户界面被缩放后所产生的空白区域后,此时用户可以将展示于该控制区域的第二应用的图标信息,直接拖动至缩小后的该第一应用的用户界面所在的区域中,来触发操作系统将拖动的该第二应用的登录授权信息传递至第一应用。
其中,上述登录授权信息,可以包括该第二应用的应用标识(比如APP ID)、用户成功登录该第二应用后由该第二应用的服务端为该用户分配的用户标识(比如UID)、以及用户在成功登录该第二应用后由该第二应用的服务端下发的登录凭证(比如Token凭证);
例如,在实际应用中,当用户通过输入登录账号和密码成功登录某一应 用后,该应用的服务端通常会向该用户分配一个对应的UID,并向该应用下发一个对应的Token凭证;该UID用于唯一识别该用户的身份,该Token凭证通常是基于预设的令牌算法计算出的一个随机字符串,用于对该用户的登录身份进行验证。在这种情况下,上述登录授权信息可以包括上述第二应用的应用标识、用户在成功登录该第二应用后为该用户分配的UID以及Token凭证。
在本例中,为了实现上述第一应用和上述第二应用之间的数据互通,上述第二应用可以预先配置一个开放接口(API),该开放接口用于应用之间的数据传递。
当操作系统在检测到用户将上述空白区域中展示的任一第二应用的图标信息拖动至缩小后的该第一应用的用户界面的操作时,则可以调用该第二应用预先配置的上述开放接口,然后将用户登录该第二应用的登录授权信息作为调用参数,传递至上述第二应用内部。
在本例中,当用户通过拖动上述空白区域中的任一第二应用的图标信息,上述第二应用的登录授权信息成功传递至第一应用内部后,此时该第一应用可以基于与第一应用的服务端之间预先建立的连接,与第一应用的服务端进行交互,将该第二应用的登录授权信息提交至该第一应用的服务端。
第一应用的服务端在接收到该第二应用的登录授权信息后,由于第一应用和第二应用的服务端之间也预先进行了登录关联,因而可以通过服务端之间的数据传输调用机制,将该第二应用的登录授权信息继续提交至第二应用的服务端进行登录授权认证。
当第二应用的服务端针对第一应用的服务端传递的登录授权信息验证通过后,此时可以向第一应用的服务端返回一个验证通过的通知消息,第一应用的服务端在接收到该通知消息后,可以使用用户在登录第二应用时使用的个人信息(比如用户的UID、个人资料等等),将第一应用设置为登录状态,然后将该通知消息继续下发给操作系统。相似地,操作系统在接收到该通知消息后,也可以从系统层面调用用户在登录第二应用时所使用的个人信息, 自动登录该第一应用。
例如,请参见图5,假设上述第一应用为APP1,上述第二应用包括APP2、APP3和APP4,APP1的用户界面缩小后空白区域展示APP2、APP3和APP4的图标信息;假设用户需要使用APP2的登录身份授权登录APP1,此时用户可以将APP2的图标拖动至APP1缩小后的用户界面。操作系统在检测到将APP2的图标拖动至APP缩小后的用户界面的操作后,可以调用APP1预先配置的上述开放接口,将该APP2的APP ID、APP2的服务端为用户分配的UID以及APP2的服务端下发的Token凭证,作为调用参数,通过该开放接口传递至该APP1内部,然后APP1可以继续将该APP2的APP ID、APP2的服务端为用户分配的UID以及APP2的服务端下发的Token凭证通过APP1的服务端提交给APP2的服务端进行验证;当APP2的服务端经过验证后确认该Token凭证有效,则可以向APP1的服务端返回一个验证通过的通知消息,进而APP1的服务端可以拉取用户在APP2的服务端上预留的个人信息完成登录授权,并将该通知消息下发给操作系统;操作系统在收到该通知消息后,也可以拉取用户登录APP2的个人信息自动登录APP1。
当然,当操作系统调用用户在登录第二应用时所使用的个人信息,自动登录该第一应用完成授权登录后,此时操作系统还可以将第一应用的用户界面恢复为默认大小。
可见,通过这种方式,用户可以通过将当前应用缩小后的用户界面中的空白区域展示的第三方应用的图标,拖动至当前应用的用户界面中,就可以快速的完成使用第三方应用的登录身份,针对当前应用进行登录授权的操作,因此显著降低了在执行授权登录时的操作复杂度,提升了用户的交互体验。
在本例中,当操作系统通过响应于用户针对第一应用的用户界面的缩放操作,将第一应用的用户界面缩小,并将与第一应用预先建立了登录关联的多个第二应用的图标信息展示在第一应用的用户界面缩小后产生的空白区域后,用户除了可以按照以上描述的交互方式,将空白区域中任一第二应用的图标信息拖动至缩小后的第一应用的用户界面中,来快速完成使用用户在第 二应用上的登录身份,针对第一应用执行快速的登陆授权以外,在实际应用中,用户也可以将缩小后的第一应用的用户界面中当前展示的指定类型的目标对象,拖动至空白区域中展示的任一图标信息所在区域,将该目标对象快速的传递至与该图标信息对应的第二应用,完成目标对象的文件共享。
其中,上述目标对象,可以包括第一应用的用户界面中展示的文本、图片、链接、视频、商品等任意类型的可以在应用之间的传递的文件。在实际应用中,第一应用的后台开发人员还可以预先对需要在应用之间互相传递的目标对象的类型进行限制;
例如,在实际应用中,第一应用的后台开发人员可以基于实际的需求,为第一应用指定可以传递至其它应用的文件类型,假设开发人员将图片和文本指定为可以传递的文件,那么在这种情况下,只有该应用的用户界面中展示的文本和图片,才能够响应用户的拖动至其它应用图标的操作。
在本例中,与第一应用预先建立了登录关联的各第二应用,也可以分别预先配置一个开放接口。当操作系统检测到用户将第一应用的用户界面中展示的指定类型的目标对象,拖动至上述空白区域中展示的任一第二应用的图标信息的操作后,可以调用该第二应用的上述开放接口,将该目标对象作为调用参数,传递至该第二应用,由第二应用作进一步的处理。
例如,请参见图6,假设上述第一应用为APP1,上述第二应用包括APP2、APP3和APP4,APP1的用户界面缩小后空白区域展示APP2、APP3和APP4的图标信息;假设APP2为用户需要将APP1的用户界面中展示的商品图片,快速分享至APP2,此时用户可以将APP1的用户界面中展示的该商品图片,拖动至空白区域中APP2的图标所在区域,操作系统在检测到将该商品图片拖动至APP2的图标所在区域的操作后,可以调用APP2预先配置的上述开放接口,将该商品图片作为调用参数,通过该开放接口传递至该APP2内部,由APP2作进一步的处理。
其中,需要说明的是,第二应用对传递过来的目标对象作进一步处理的方式,通常取决于上述开放接口中加载的处理逻辑,可以包括在其本地进行 保存,或者执行进一步的转发等操作;在实际应用中,第二应用后台的开发人员可以基于实际的需求针对该开放接口进行独立的开发。
例如,请继续参见图6,假设APP2为邮件应用,用户需要将APP1的用户界面中展示的商品图片以附件的形式传递给APP2进行邮件发送,在这种情况下,APP2的开发人员在开发APP2的上述开放接口时,可以在该开放接口的结构体中增加“将传递至本APP的文件以附件的形式发送”的执行逻辑。当APP2接收到APP1传递过来的上述商品图片,可以立即运行该执行逻辑,跳转至邮件发送页面,并将该商品图片以附件的形式添加到邮件发送页面。
可见,通过这种方式,用户可以通过将当前应用缩小后的用户界面中展示的目标对象,拖动至空白区域展示的第三方应用的图标,就可以快速的将该目标对象分享至第三方应用,因此可以显著提升应用之间的文件分享效率。
与上述方法实施例相对应,本申请还提供了装置的实施例。
请参见图7,本申请提出一种授权登录装置70,应用于终端设备;其中,请参见图8,作为承载所述授权登录装置70的终端设备所涉及的硬件架构中,通常包括CPU、内存、非易失性存储器、网络接口以及内部总线等;以软件实现为例,所述授权登录装置70通常可以理解为加载在内存中的计算机程序,通过CPU运行之后形成的软硬件相结合的逻辑装置,所述装置70包括:
缩放模块701,响应于针对第一应用的用户界面的缩放操作,缩小所述第一应用的用户界面;
展示模块702,在所述第一应用的用户界面缩小后产生的空白区域展示至少一个用户已登录的第二应用的图标信息;其中,所述第一应用与所述第二应用预先建立了关联关系;
传递模块703,响应于将所述第二应用的图标信息从所述空白区域拖动至缩小后的所述第一应用的用户界面的操作,将所述第二应用的登录授权信息传递至所述第一应用,以由所述第一应用将所述第二应用的登录授权信息通过所述第一应用的服务端提交至所述第二应用的服务端进行登录授权验证;
登录模块704,响应于所述第二应用的服务端通过所述第一应用的服务 端返回的针对所述登录授权信息验证通过的通知消息,授权登录所述第一应用。
在本例中,所述缩放模块701进一步:
当基于所述第一应用的登录授权信息成功登录所述第二应用后,将所述第一应用的用户界面恢复为默认大小。
在本例中,所述传递模块703进一步:
响应于将缩小后的所述第一应用的用户界面中显示的指定类型的目标对象,拖动至所述空白区域中任一图标信息所在区域的操作,将所述目标对象传递至与该图标信息对应的第二应用,以由所述第二应用针对所述目标对象执行进一步的处理。
在本例中,
所述传递模块703进一步:
调用所述第一应用的开放接口,将所述第二应用的登录授权信息作为调用参数,传递至所述第一应用;以及,
调用与该图标信息对应的第二应用的开放接口,将所述目标对象作为调用参数,传递至与该图标信息对应的第二应用。
在本例中,所述第一应用以及第二应用包括:
APP应用以及Web应用;
所述缩放操作包括:针对所述第一应用的用户界面的双指捏合触控操作;
针对所述第一应用的用户界面的预设触发操作;
针对预设的虚拟按键或者实体按键的预设触发操作。
在本例中,所述登录授权信息包括:
所述第二应用的应用标识、用户成功登录所述第二应用后由所述第二应用的服务端为所述用户分配的用户标识、以及用户在成功登录所述第二应用后由所述第二应用的服务端下发的登录凭证。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中 所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本申请方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由下面的权利要求指出。
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求来限制。
以上所述仅为本申请的较佳实施例而已,并不用以限制本申请,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请保护的范围之内。

Claims (12)

  1. 一种授权登录方法,其特征在于,所述方法包括:
    响应于针对第一应用的用户界面的缩放操作,缩小所述第一应用的用户界面;
    在所述第一应用的用户界面缩小后产生的空白区域展示至少一个用户已登录的第二应用的图标信息;其中,所述第一应用与所述第二应用预先建立了关联关系;
    响应于将所述第二应用的图标信息从所述空白区域拖动至缩小后的所述第一应用的用户界面的操作,将所述第二应用的登录授权信息传递至所述第一应用,以由所述第一应用将所述第二应用的登录授权信息通过所述第一应用的服务端提交至所述第二应用的服务端进行登录授权验证;
    响应于所述第二应用的服务端通过所述第一应用的服务端返回的针对所述登录授权信息验证通过的通知消息,授权登录所述第一应用。
  2. 根据权利要求1所述的方法,其特征在于,还包括:
    当基于所述第一应用的登录授权信息成功登录所述第二应用后,将所述第一应用的用户界面恢复为默认大小。
  3. 根据权利要求1所述的方法,其特征在于,还包括:
    响应于将缩小后的所述第一应用的用户界面中显示的指定类型的目标对象,拖动至所述空白区域中任一图标信息所在区域的操作,将所述目标对象传递至与该图标信息对应的第二应用,以由所述第二应用针对所述目标对象执行进一步的处理。
  4. 根据权利要求3所述的方法,其特征在于,
    所述将所述第二应用的登录授权信息传递至所述第一应用,包括:
    调用所述第一应用的开放接口,将所述第二应用的登录授权信息作为调用参数,传递至所述第一应用;
    所述将所述目标对象传递至与该图标信息对应的第二应用,包括:
    调用与该图标信息对应的第二应用的开放接口,将所述目标对象作为调用参数,传递至与该图标信息对应的第二应用。
  5. 根据权利要求1所述的方法,其特征在于,
    所述第一应用以及第二应用包括:
    APP应用以及Web应用;
    所述缩放操作包括:
    针对所述第一应用的用户界面的双指捏合触控操作;
    针对所述第一应用的用户界面的预设触发操作;
    针对预设的虚拟按键或者实体按键的预设触发操作。
  6. 根据权利要求1所述的方法,其特征在于,所述登录授权信息包括:
    所述第二应用的应用标识、用户成功登录所述第二应用后由所述第二应用的服务端为所述用户分配的用户标识、以及用户在成功登录所述第二应用后由所述第二应用的服务端下发的登录凭证。
  7. 一种授权登录装置,其特征在于,所述装置包括:
    缩放模块,响应于针对第一应用的用户界面的缩放操作,缩小所述第一应用的用户界面;
    展示模块,在所述第一应用的用户界面缩小后产生的空白区域展示至少一个用户已登录的第二应用的图标信息;其中,所述第一应用与所述第二应用预先建立了关联关系;
    传递模块,响应于将所述第二应用的图标信息从所述空白区域拖动至缩小后的所述第一应用的用户界面的操作,将所述第二应用的登录授权信息传递至所述第一应用,以由所述第一应用将所述第二应用的登录授权信息通过所述第一应用的服务端提交至所述第二应用的服务端进行登录授权验证;
    登录模块,响应于所述第二应用的服务端通过所述第一应用的服务端返回的针对所述登录授权信息验证通过的通知消息,授权登录所述第一应用。
  8. 根据权利要求7所述的装置,其特征在于,所述缩放模块进一步:
    当基于所述第一应用的登录授权信息成功登录所述第二应用后,将所述 第一应用的用户界面恢复为默认大小。
  9. 根据权利要求7所述的装置,其特征在于,所述传递模块进一步:
    响应于将缩小后的所述第一应用的用户界面中显示的指定类型的目标对象,拖动至所述空白区域中任一图标信息所在区域的操作,将所述目标对象传递至与该图标信息对应的第二应用,以由所述第二应用针对所述目标对象执行进一步的处理。
  10. 根据权利要求9所述的装置,其特征在于,
    所述传递模块进一步:
    调用所述第一应用的开放接口,将所述第二应用的登录授权信息作为调用参数,传递至所述第一应用;以及,
    调用与该图标信息对应的第二应用的开放接口,将所述目标对象作为调用参数,传递至与该图标信息对应的第二应用。
  11. 根据权利要求7所述的装置,其特征在于,
    所述第一应用以及第二应用包括:
    APP应用以及Web应用;
    所述缩放操作包括:
    针对所述第一应用的用户界面的双指捏合触控操作;
    针对所述第一应用的用户界面的预设触发操作;
    针对预设的虚拟按键或者实体按键的预设触发操作。
  12. 根据权利要求7所述的装置,其特征在于,所述登录授权信息包括:
    所述第二应用的应用标识、用户成功登录所述第二应用后由所述第二应用的服务端为所述用户分配的用户标识、以及用户在成功登录所述第二应用后由所述第二应用的服务端下发的登录凭证。
PCT/CN2017/113555 2016-12-08 2017-11-29 授权登录方法及装置 WO2018103559A1 (zh)

Priority Applications (8)

Application Number Priority Date Filing Date Title
KR1020197019798A KR102194071B1 (ko) 2016-12-08 2017-11-29 인가된 로그인을 위한 방법 및 장치
ES17877865T ES2862397T3 (es) 2016-12-08 2017-11-29 Método y dispositivo para autenticar el inicio de sesión
JP2019531144A JP6859512B2 (ja) 2016-12-08 2017-11-29 認証されたログインのための方法およびデバイス
EP17877865.0A EP3554034B8 (en) 2016-12-08 2017-11-29 Method and device for authenticating login
PL17877865T PL3554034T3 (pl) 2016-12-08 2017-11-29 Sposób i aparat do autoryzowanego logowania
US16/380,395 US10445486B2 (en) 2016-12-08 2019-04-10 Method and apparatus for authorized login
PH12019501290A PH12019501290A1 (en) 2016-12-08 2019-06-07 Method and apparatus for authorized login
US16/597,521 US10795983B2 (en) 2016-12-08 2019-10-09 Method and apparatus for authorized login

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611124494.X 2016-12-08
CN201611124494.XA CN106888202B (zh) 2016-12-08 2016-12-08 授权登录方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/380,395 Continuation US10445486B2 (en) 2016-12-08 2019-04-10 Method and apparatus for authorized login

Publications (1)

Publication Number Publication Date
WO2018103559A1 true WO2018103559A1 (zh) 2018-06-14

Family

ID=59176158

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/113555 WO2018103559A1 (zh) 2016-12-08 2017-11-29 授权登录方法及装置

Country Status (10)

Country Link
US (2) US10445486B2 (zh)
EP (1) EP3554034B8 (zh)
JP (1) JP6859512B2 (zh)
KR (1) KR102194071B1 (zh)
CN (1) CN106888202B (zh)
ES (1) ES2862397T3 (zh)
PH (1) PH12019501290A1 (zh)
PL (1) PL3554034T3 (zh)
TW (1) TWI665623B (zh)
WO (1) WO2018103559A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970298A (zh) * 2020-08-26 2020-11-20 腾讯科技(深圳)有限公司 应用访问方法、装置、存储介质及计算机设备

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888202B (zh) 2016-12-08 2020-02-21 阿里巴巴集团控股有限公司 授权登录方法及装置
KR102379313B1 (ko) * 2017-08-23 2022-03-28 삼성전자주식회사 어플리케이션을 표시하기 위한 전자 장치 및 그의 동작 방법
CN107704735B (zh) * 2017-09-12 2020-03-27 珠海格力电器股份有限公司 一种授权管理方法、装置及电子设备
US11132106B2 (en) * 2018-03-13 2021-09-28 Vmware, Inc. User-specific applications for shared devices
CN110324276B (zh) * 2018-03-28 2022-01-07 腾讯科技(深圳)有限公司 一种登录应用的方法、系统、终端和电子设备
CN112822222B (zh) * 2018-06-25 2023-04-25 蚂蚁金服(杭州)网络技术有限公司 登录验证方法、自动登录的验证方法、服务端及客户端
CN109086596B (zh) * 2018-08-08 2022-03-22 网易(杭州)网络有限公司 应用程序的认证方法、装置及系统
CN110557502B (zh) * 2019-08-09 2021-03-23 五八有限公司 一种小程序的调起方法、装置、电子设备及可读存储介质
CN111352552B (zh) * 2020-03-30 2021-09-10 北京达佳互联信息技术有限公司 一种应用登录方法、装置、电子设备及存储介质
CN111756923A (zh) * 2020-06-15 2020-10-09 北京智明星通科技股份有限公司 一种手机游戏的登录方法、系统及游戏终端
CN113766289B (zh) * 2021-09-27 2024-03-29 Vidaa(荷兰)国际控股有限公司 一种显示设备及基于语音交互的登录控制方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188237A (zh) * 2011-12-30 2013-07-03 盛大计算机(上海)有限公司 单点登录系统及方法
CN105072133A (zh) * 2015-08-28 2015-11-18 北京金山安全软件有限公司 一种应用程序的登录方法及装置
US20150363066A1 (en) * 2014-06-12 2015-12-17 Apple Inc. Systems and Methods for Efficiently Navigating Between Applications with Linked Content on an Electronic Device with a Touch-Sensitive Display
CN105573615A (zh) * 2014-09-12 2016-05-11 三星电子株式会社 用于通过应用选择屏幕来运行应用的方法和装置
CN105808095A (zh) * 2015-07-08 2016-07-27 维沃移动通信有限公司 一种终端的应用界面的显示方法及终端
CN106888202A (zh) * 2016-12-08 2017-06-23 阿里巴巴集团控股有限公司 授权登录方法及装置

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5768503A (en) * 1995-09-25 1998-06-16 International Business Machines Corporation Middleware program with enhanced security
US7350139B1 (en) * 2000-06-16 2008-03-25 American Express Travel Related Services Company, Inc. System and method for utilizing a drag and drop technique to complete electronic forms
US7624351B2 (en) * 2001-10-02 2009-11-24 Verizon Corporate Services Group Inc. Methods and apparatus for controlling a plurality of applications
US20030154110A1 (en) * 2001-11-20 2003-08-14 Ervin Walter Method and apparatus for wireless access to a health care information system
US7818582B2 (en) * 2004-06-25 2010-10-19 Accenture Global Services Gmbh Single sign-on with common access card
US20060021004A1 (en) * 2004-07-21 2006-01-26 International Business Machines Corporation Method and system for externalized HTTP authentication
GB0420409D0 (en) * 2004-09-14 2004-10-20 Waterleaf Ltd Online commercial transaction system and method of operation thereof
US20060075224A1 (en) * 2004-09-24 2006-04-06 David Tao System for activating multiple applications for concurrent operation
US7895644B1 (en) * 2005-12-02 2011-02-22 Symantec Operating Corporation Method and apparatus for accessing computers in a distributed computing environment
US20070174429A1 (en) * 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
US7581244B2 (en) * 2006-01-25 2009-08-25 Seiko Epson Corporation IMX session control and authentication
US8949933B2 (en) * 2006-08-15 2015-02-03 International Business Machines Corporation Centralized management of technical records across an enterprise
TWI328179B (en) * 2006-12-05 2010-08-01 Fineart Technology Co Ltd Controlling module for programs and method for the same
US20080168539A1 (en) * 2007-01-05 2008-07-10 Joseph Stein Methods and systems for federated identity management
US8984628B2 (en) * 2008-10-21 2015-03-17 Lookout, Inc. System and method for adverse mobile application identification
US8347386B2 (en) * 2008-10-21 2013-01-01 Lookout, Inc. System and method for server-coupled malware prevention
US8621387B2 (en) * 2009-06-08 2013-12-31 Apple Inc. User interface for multiple display regions
US20120191657A1 (en) 2011-01-17 2012-07-26 Nathan Daniel Weinstein Data backup, storage and management system and methodology
KR101356368B1 (ko) * 2012-02-24 2014-01-29 주식회사 팬택 어플리케이션 전환 장치 및 방법
US9185112B2 (en) * 2012-10-10 2015-11-10 Adobe Systems Incorporated Extensible configuration system to allow a website to authenticate users based on an authorization protocol
US9419963B2 (en) * 2013-07-02 2016-08-16 Open Text S.A. System and method for controlling access
US9065819B1 (en) * 2013-12-23 2015-06-23 Cellco Partnership Single sign on (SSO) authorization and authentication for mobile communication devices
CN105207774B (zh) * 2014-05-30 2019-03-01 北京奇虎科技有限公司 验证信息的密钥协商方法及装置
US9264419B1 (en) * 2014-06-26 2016-02-16 Amazon Technologies, Inc. Two factor authentication with authentication objects
CN104113533B (zh) * 2014-07-02 2017-10-27 百度在线网络技术(北京)有限公司 登录授权方法和装置
US20160007182A1 (en) * 2014-07-02 2016-01-07 Remember Everyone, LLC Directing Information Based on Device Proximity
CN105592011B (zh) * 2014-10-23 2019-12-24 阿里巴巴集团控股有限公司 一种账号登录方法及装置
US9866545B2 (en) * 2015-06-02 2018-01-09 ALTR Solutions, Inc. Credential-free user login to remotely executed applications
CN105101205B (zh) * 2015-06-19 2018-12-18 广州密码科技有限公司 一种一键登录认证方法、装置及系统
US10635716B2 (en) * 2016-08-24 2020-04-28 Facebook, Inc. Methods and systems for secured end-to-end data communication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188237A (zh) * 2011-12-30 2013-07-03 盛大计算机(上海)有限公司 单点登录系统及方法
US20150363066A1 (en) * 2014-06-12 2015-12-17 Apple Inc. Systems and Methods for Efficiently Navigating Between Applications with Linked Content on an Electronic Device with a Touch-Sensitive Display
CN105573615A (zh) * 2014-09-12 2016-05-11 三星电子株式会社 用于通过应用选择屏幕来运行应用的方法和装置
CN105808095A (zh) * 2015-07-08 2016-07-27 维沃移动通信有限公司 一种终端的应用界面的显示方法及终端
CN105072133A (zh) * 2015-08-28 2015-11-18 北京金山安全软件有限公司 一种应用程序的登录方法及装置
CN106888202A (zh) * 2016-12-08 2017-06-23 阿里巴巴集团控股有限公司 授权登录方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970298A (zh) * 2020-08-26 2020-11-20 腾讯科技(深圳)有限公司 应用访问方法、装置、存储介质及计算机设备
CN111970298B (zh) * 2020-08-26 2024-01-05 腾讯科技(深圳)有限公司 应用访问方法、装置、存储介质及计算机设备

Also Published As

Publication number Publication date
CN106888202A (zh) 2017-06-23
ES2862397T3 (es) 2021-10-07
US20190236263A1 (en) 2019-08-01
US20200042690A1 (en) 2020-02-06
PL3554034T3 (pl) 2021-06-14
EP3554034A4 (en) 2019-12-18
CN106888202B (zh) 2020-02-21
JP6859512B2 (ja) 2021-04-14
PH12019501290A1 (en) 2019-12-02
US10445486B2 (en) 2019-10-15
KR20190089069A (ko) 2019-07-29
TWI665623B (zh) 2019-07-11
KR102194071B1 (ko) 2020-12-23
EP3554034A1 (en) 2019-10-16
TW201822093A (zh) 2018-06-16
EP3554034B8 (en) 2021-03-17
US10795983B2 (en) 2020-10-06
EP3554034B1 (en) 2021-01-06
JP2020502657A (ja) 2020-01-23

Similar Documents

Publication Publication Date Title
WO2018103559A1 (zh) 授权登录方法及装置
JP7268167B2 (ja) 顧客サポート呼の第2の要素認証のためのシステムおよび方法
US11159626B2 (en) Session transfer between resources
JP6628319B2 (ja) 2要素認証
RU2541847C2 (ru) Управление доступом к защищенным функциям приложений с использованием уровней доверия клиента
KR20190072554A (ko) 스크린 공유 경험을 위한 공유 보호
JP2014526744A (ja) リソースアクセスの権限付与
EP2849403A1 (en) Method and system for controlling the exchange of privacy-sensitive information
US20180107831A1 (en) Securing data gathering devices of a personal computing device while performing sensitive data gathering activities to prevent the misappropriation of personal user data gathered therewith
CN108141497A (zh) 一种信息交互的方法及设备
US20220100874A1 (en) Data loss protection on secondary displays
US20220038463A1 (en) Method and system of multi-channel user authorization
US20220350903A1 (en) Virtual machine formjacking protection
US8955070B2 (en) Controlled password modification method and apparatus
WO2018145239A1 (zh) 一种电子支付方法和装置
WO2018145238A1 (zh) 一种nfc设备的鉴权方法和装置
CN118611992A (zh) 一种接入方法及系统、电子设备
KR20130110331A (ko) 시큐어 os를 이용한 모바일 디바이스의 사용자 인증 시스템 및 사용자 인증 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17877865

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019531144

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20197019798

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017877865

Country of ref document: EP

Effective date: 20190708