WO2021115199A1 - 验证信息共享方法及电子设备 - Google Patents

验证信息共享方法及电子设备 Download PDF

Info

Publication number
WO2021115199A1
WO2021115199A1 PCT/CN2020/133780 CN2020133780W WO2021115199A1 WO 2021115199 A1 WO2021115199 A1 WO 2021115199A1 CN 2020133780 W CN2020133780 W CN 2020133780W WO 2021115199 A1 WO2021115199 A1 WO 2021115199A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
verification information
verification
target application
receiving
Prior art date
Application number
PCT/CN2020/133780
Other languages
English (en)
French (fr)
Inventor
孟庆迪
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2021115199A1 publication Critical patent/WO2021115199A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Definitions

  • the present invention relates to the field of communication technology, in particular to a verification information sharing method and electronic equipment.
  • the verification scheme in the prior art has drawbacks in the following scenarios of high-frequency sharing of verification information.
  • User A and User B are two users with a strong trust relationship.
  • user A wants to use the identity of user B for verification, there are inconveniences for the above verification schemes:
  • SMS verification In the case of using SMS verification, user A wants to use user B’s information for login verification, but the SMS is sent to user B’s electronic device, user B cannot send the SMS verification code he received to user A in time, resulting in the verification code Invalidate.
  • user B can only send it to user A by taking a screenshot and then forwarding it to user A.
  • the whole process is very cumbersome, and user A may have failed when receiving the verification code;
  • the verification code is valid for a long time, and the security of the verification code cannot be guaranteed. For example, user A may authorize other people to use it.
  • the existing verification scheme has the problem of inconvenience in sharing verification information.
  • the embodiment of the present invention provides a verification information sharing method and electronic equipment to solve the problem of inconvenience in sharing verification information in the existing verification scheme.
  • an embodiment of the present invention provides a verification information sharing method, which is applied to a first electronic device, and includes:
  • the verification information is sent to the second electronic device.
  • an embodiment of the present invention provides a verification information sharing method applied to a second electronic device, including:
  • the target application is an authorization binding program between the first electronic device and the second electronic device
  • the first electronic device receives the verification information associated with the target application
  • the verification information sent by the first electronic device is received .
  • an embodiment of the present invention provides an electronic device, which is a first electronic device and includes:
  • the first receiving module is used to receive verification information associated with the target application
  • the first sending module is configured to send the verification information to the second electronic device when the target application is an authorization binding program between the first electronic device and the second electronic device.
  • an embodiment of the present invention provides an electronic device, which is a second electronic device, and includes:
  • the second receiving module is configured to receive the identity information input by the user through the target application, where the identity information is the identification information associated with the first electronic device;
  • the third receiving module is used to receive the first electronic device when the target application is an authorization binding program between the first electronic device and the second electronic device, and the first electronic device receives the verification information associated with the target application Verification information sent by an electronic device.
  • an embodiment of the present invention also provides an electronic device, including a processor, a memory, and a computer program stored in the memory and running on the processor.
  • the computer program is executed by the processor to implement the verification information sharing method described above. A step of.
  • an embodiment of the present invention also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium, and the computer program is executed by a processor to implement the steps of the verification information sharing method described above.
  • embodiments of the present invention also provide a computer program product, the computer program product is stored in a non-volatile storage medium, and the program product is configured to be executed by at least one processor to achieve the above verification The steps of the information sharing method.
  • an embodiment of the present invention also provides an electronic device configured to perform the steps of the verification information sharing method described above.
  • the verification information is sent to the second electronic device.
  • Devices can quickly and safely complete verification information sharing by binding trusted devices in advance and determining authorization binding procedures, improving the efficiency of information sharing, and solving the problem of inconvenience in sharing verification information.
  • FIG. 1 is a schematic diagram of a verification information sharing method according to an embodiment of the present invention
  • FIG. 3 is a flow chart 1 for sharing verification information through a graphic code scanning method according to an embodiment of the present invention
  • Fig. 4 is a second flowchart of authentication information sharing through graphic code scanning according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a second method for sharing verification information according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a first electronic device according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of a second electronic device according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of the hardware structure of an electronic device according to an embodiment of the present invention.
  • the embodiment of the present invention provides a verification information sharing method, which is applied to a first electronic device, as shown in FIG. 1, including:
  • Step 101 Receive verification information associated with the target application.
  • the first electronic device may first receive the verification information associated with the target application, where the verification information may be sent by the application platform of the target application, or may be sent by the second electronic device.
  • the target application program may be an application program shared by the first electronic device and the second electronic device.
  • Step 102 If the target application is an authorization binding program between the first electronic device and the second electronic device, send the verification information to the second electronic device.
  • the verification information After receiving the verification information associated with the target application, and in the case where it is determined that the target application is an authorized binding program between the first electronic device and the second electronic device, the verification information is forwarded so that the second electronic device The device obtains the verification information to synchronize the verification information associated with the target application to the second electronic device, so that the verification information can be shared between the two electronic devices.
  • the authorization binding procedure needs to be determined in advance between the first electronic device and the second electronic device. After the first electronic device receives the verification information associated with the target application sent by the second electronic device, when sending the verification information to the second electronic device, the sent verification information at this time is processed by the first electronic device verify message.
  • the verification information includes identification information associated with the second electronic device; sending the verification information to the second electronic device specifically includes:
  • the verification information is sent to the second electronic device.
  • the verification information received by the first electronic device contains the identification information associated with the second electronic device. Before sending the verification information to the second electronic device, it is necessary to check whether the identification information associated with the second electronic device is preset In the trust list, the preset trust list stores identification information of the trusted device bound to the first electronic device. When the identification information associated with the second electronic device is included in the preset trust list, a process of sending verification information to the second electronic device is performed.
  • the second electronic device by binding the trusted device in advance and generating a preset trust list, the second electronic device can be verified by using the preset trust list, and the verification information is sent to the second electronic device if the verification is passed to ensure the sharing of information safety.
  • the method before receiving the verification information associated with the target application, the method further includes:
  • For at least one first application program establish an authorization binding relationship between the first electronic device and the second electronic device;
  • At least one first application program is determined to be an authorization binding program.
  • the first electronic device Before receiving the verification information associated with the target application, the first electronic device needs to determine at least one first application to be shared among installed applications, and establish an application list including the at least one first application. For the established application list, establish an authorization binding relationship between the first electronic device and the second electronic device, and according to the established authorization binding relationship, determine that at least one first application in the application list is an authorization binding program .
  • the authentication information sharing of the authorization binding procedure between the electronic devices can be quickly and safely completed in the subsequent process.
  • establishing an authorization binding relationship between the first electronic device and the second electronic device includes:
  • the installed applications select at least one first application that is shared with the second electronic device; for at least one first application, establish the first electronic device and the second electronic device by means of verification code or graphic code scanning The authorization binding relationship between.
  • the first electronic device can establish an authorization binding relationship by means of a verification code, or can establish an authorization binding relationship by scanning a graphic code.
  • the graphic codes here include, but are not limited to, two-dimensional codes and barcodes.
  • trusted devices By sending a verification code or establishing an authorization binding relationship by scanning a graphic code, trusted devices can be bound in advance, and the sharing of verification information between electronic devices can be completed quickly and safely.
  • establishing an authorization binding relationship between the first electronic device and the second electronic device by means of a verification code includes:
  • the second prompt information is sent to the second electronic device.
  • an identification information input interface can be displayed, and the input identification information associated with the second electronic device can be received in the input interface.
  • the received identification information associated with the second electronic device generates a second verification code, and sends the second verification code to the second electronic device.
  • the first electronic device After the second electronic device receives the second verification code and forwards the second verification code to the first electronic device, the first electronic device enters the second verification code in the pop-up authorization interface. At this time, it can target at least one first application The procedure establishes the authorization binding relationship between the two electronic devices, that is, completes the authorization of the second electronic device. After the first electronic device inputs the second verification code, it is necessary to send second prompt information to the second electronic device for prompting the second electronic device with the progress information of the first electronic device.
  • the authorization binding relationship of the first application program of the first electronic device and the second electronic device is established through the verification code, which can realize the binding of the trusted device in advance, and then quickly and safely complete the sharing of verification information between the electronic devices.
  • receiving verification information associated with the target application includes:
  • the verification information including the first verification code and the identification information associated with the second electronic device sent by the application platform of the target application program is received, wherein the application platform is used to use the verification code when the second electronic device passes the information of the first electronic device When logging in to the target application and sending a verification request carrying identification information associated with the second electronic device, sending verification information;
  • sending the verification information to the second electronic device includes:
  • the verification information is forwarded to the second electronic device.
  • the sharing phase After establishing the authorization binding relationship between the two, you can enter the sharing phase.
  • the sharing phase when the second electronic device uses the verification code to log in to the target application through the information of the first electronic device, you can click to send the verification code to verify, and then the second electronic device sends to the application platform of the target application A verification request carrying identification information associated with the second electronic device.
  • the verification request may also include the identification of the target application, and the information of the first electronic device mentioned here may be the number of the first electronic device or the identity document (ID) of the first electronic device.
  • the application platform After receiving the verification request for the target application, the application platform sends verification information including the first verification code and the identification information associated with the second electronic device to the first electronic device, and the verification information may include the identification of the target application .
  • the first electronic device may perform a detection process, that is, according to the identification information associated with the second electronic device in the verification information, detect whether the verification request was sent by the second electronic device, and determine the target application associated with the verification information Whether the program is an authorized binding program. If the verification request is sent by the second electronic device, and the target application associated with the verification information belongs to the authorization binding program, it is determined that the detection is passed, and the verification information can be forwarded to the second electronic device at this time, so that the second electronic device can follow the verification information Complete login. Wherein, when performing the detection process, the first user corresponding to the first electronic device may manually detect it, or the first electronic device may automatically detect it. After the verification information is forwarded to the second electronic device, a corresponding sharing record can be made.
  • Step 201 The first electronic device determines at least one first application, and generates a second verification code according to the received identification information associated with the second electronic device, and sends it to the second electronic device.
  • Step 202 The second electronic device sends the second verification code to the first electronic device, and the first electronic device completes the authorization of the second electronic device according to the second verification code.
  • the authorization here is authorization for at least one first application.
  • Step 203 When the second electronic device uses the verification code to log in to the target application through the information of the first electronic device, send a verification request carrying identification information associated with the second electronic device to the application platform of the target application.
  • the target application here is one of the authorized first applications.
  • Step 204 The first electronic device receives the verification information including the first verification code and the identification information associated with the second electronic device sent by the application platform, and detects whether the verification information is requested by the second electronic device and the target associated with the verification information Whether the application belongs to an authorized binding program.
  • Step 205 In the case of passing the detection, the first electronic device forwards the verification information to the second electronic device.
  • Step 206 The second electronic device completes the login according to the verification information.
  • device binding and information sharing are realized by means of verification codes, which can ensure that the second electronic device completes the login of the target application through the information of the first electronic device.
  • establishing an authorization binding relationship between the first electronic device and the second electronic device by means of graphic code scanning verification includes:
  • the identification information associated with the second electronic device generate and encrypt the first authorized graphic code corresponding to the at least one first application
  • the second electronic device After receiving the third prompt message that the second electronic device accepts the first authorization request and displays the encrypted first authorization graphic code, scan the encrypted first authorization graphic code displayed on the second electronic device for at least one
  • the first application program establishes an authorization binding relationship with the second electronic device
  • the fourth prompt information is sent to the second electronic device.
  • an identification information input interface may be displayed, and the input identification information associated with the second electronic device may be received in the input interface.
  • the identification information associated with the second electronic device generates a first authorized graphic code corresponding to at least one first application program, and displays the first authorized graphic code after being encrypted.
  • the first control here may be a first artificial intelligence (Artificial Intelligence, AI) button.
  • the first electronic device sends the first authorization request carrying the encrypted first authorization pattern code to the second electronic device in the form of broadcast, wherein the first electronic device sends the first authorization request through the local area network or the ad hoc network, and the second The electronic device and the first electronic device are connected to the same local area network or the same ad hoc network.
  • the second electronic device After the second electronic device accepts the first authorization request and displays the encrypted first authorization graphic code, it will send a third prompt message.
  • the first electronic device enters the code scanning authorization link according to the third prompt message.
  • the first electronic device Scanning the encrypted first authorization graphic code displayed on the second electronic device according to the third prompt information to establish an authorization binding relationship with the second electronic device, that is, the authorization of the second electronic device is completed.
  • the fourth prompt information is sent to the second electronic device, so that the second electronic device can obtain the progress information of the first electronic device.
  • the authorization binding relationship between the first application program of the first electronic device and the second electronic device is established through the graphic code scanning method, which can realize the binding of trusted devices in advance, and then quickly and safely complete the sharing of verification information between electronic devices .
  • receiving verification information associated with the target application includes:
  • Send the verification information to the second electronic device including:
  • the first function pattern code is transmitted to the second electronic device.
  • the sharing phase can be entered.
  • the first electronic device receives the first function graphic code sent by the application platform of the target application and displays it.
  • the shared device selection interface is displayed, and according to the received first selection operation on the second electronic device, it is determined that the verification information needs to be synchronized with the second electronic device, and the first function graphic code is transmitted To the second electronic device, so that the second electronic device scans and verifies the first function graphic code.
  • the shared application program is determined and the trusted device is bound in advance, combined with the auxiliary function of the control, to complete the sharing and use of the graphic code, and realize the verification of the specific graphic code page in the authorized application program of the second electronic device by the first electronic device Features.
  • the graphic code takes effect immediately, without additional storage and forwarding in social software, reducing the risk of information leakage.
  • Step 301 The first electronic device determines at least one first application program, determines that an authorization binding relationship needs to be established with the second electronic device according to the acquired identification information associated with the second electronic device, and displays the encrypted and at least one application program.
  • the first authorization graphic code corresponding to the first application program enters the authentication authorization phase according to the fifth input to the first control.
  • Step 302 In the authentication and authorization stage, broadcast the first authorization request carrying the encrypted first authorization graphic code to the second electronic device, and the second electronic device accepts the first authorization request and displays the encrypted first authorization graphic code.
  • Step 303 After receiving the second electronic device accepting the first authorization request and displaying the third prompt information of the encrypted first authorization graphic code, stop the fifth input to the first control and enter the scan code authorization link, the first The electronic device scans the encrypted first authorization graphic code displayed on the second electronic device to establish an authorization binding relationship with the second electronic device. At this point, the authorization of the second electronic device is completed, and the sharing phase is entered.
  • the authorization here is authorization for at least one first application.
  • the fourth prompt information is sent to the second electronic device after the scanning is completed.
  • Step 304 The first electronic device displays the first functional graphic code of the target application, displays the shared device selection interface according to the first input to the first control, and receives the first selection operation on the second electronic device.
  • the target application here is one of the authorized first applications.
  • Step 305 After the second electronic device receives the input to the second control, the first function graphic code of the first electronic device can be transmitted to the second electronic device, and the second electronic device performs the first function graphic code Scan to verify.
  • the device binding and information sharing are realized through the graphic code scanning mode, which can ensure that the second electronic device scans and verifies the first function graphic code of the first electronic device.
  • establishing an authorization binding relationship between the first electronic device and the second electronic device through a graphic code scanning verification method further includes:
  • the sixth prompt information is sent to the second electronic device.
  • an identification information input interface may be displayed, and the input identification information associated with the second electronic device may be received in the input interface, and the identification information associated with the second electronic device may be received in the input interface.
  • the acquired identification information associated with the second electronic device determines that an authorization binding relationship needs to be established with the second electronic device.
  • the first electronic device broadcasts the second authorization request to the second electronic device through the local area network or the ad hoc network.
  • the second authorization graphic code is
  • the first electronic device After the first electronic device receives the fifth prompt message indicating that the second electronic device accepts the second authorization request and generates the second authorization graphic code, the first electronic device can display the first electronic device on the display screen of the second electronic device in the scan frame of the first electronic device.
  • Authorized graphic code The first electronic device scans the second authorization graphic code to establish an authorization binding relationship with the second electronic device, that is, the authorization of the second electronic device is completed. Wherein, after the scanning is completed, the sixth prompt information will be sent to the second electronic device for enabling the second electronic device to obtain the progress information of the first electronic device.
  • the second authorization pattern code on the display screen of the second electronic device when the second authorization pattern code on the display screen of the second electronic device is displayed in the scan frame of the first electronic device, the second authorization pattern can be realized through the communication connection between the first electronic device and the second electronic device Code transmission. It may also be in the process of establishing the authorization binding relationship, the binding relationship between the display screen of the first electronic device and the display screen of the second electronic device is established, through the display screen of the first electronic device and the display screen of the second electronic device The binding relationship of the second electronic device can directly display the content on the display screen of the second electronic device according to the fifth prompt information.
  • the authorization binding relationship between the first application program of the first electronic device and the second electronic device is established through the graphic code scanning method, which can realize the binding of trusted devices in advance, and then quickly and safely complete the sharing of verification information between electronic devices .
  • receiving verification information associated with the target application includes:
  • the second electronic device In the case of receiving the first prompt message that the second electronic device performs the code scanning operation, receive and display the second function graphic code to be scanned displayed on the second electronic device; wherein the second electronic device executes the code through the target application Scan code operation, when the first electronic device displays the second function graphic code, it is displayed through the target application;
  • Send the verification information to the second electronic device including:
  • the sharing phase can be entered.
  • the sharing device selection interface is displayed according to the second input to the first control, and the second selection operation on the second electronic device is received.
  • the second electronic device is selected, and it is determined that the verification information needs to be synchronized with the second electronic device.
  • the second electronic device enters the code scanning function page of the authorized application to perform the code scanning operation, and sends the first prompt information to the first electronic device.
  • the first electronic device receives the waiting message displayed on the second electronic device according to the first prompt information. Scan the second function graphic code and display it on the graphic code scanning page of the authorized application (target application), and scan the second function graphic code to obtain the scan result, synchronize the scan result to the second electronic device, and complete the scan code authorization Of sharing.
  • the transmission of the second functional graphic code to be scanned can be realized through the communication connection between the two electronic devices, or According to the binding relationship between the display screen of the first electronic device and the display screen of the second electronic device, the content on the display screen of the second electronic device is directly displayed according to the first prompt information.
  • the shared use of the graphic code scanning function is completed, and the first electronic device can scan the second electronic device in the authorized application program.
  • the function of the graphic code takes effect immediately, without additional storage and forwarding in social software, reducing the risk of information leakage.
  • Step 401 The first electronic device determines at least one first application, and according to the acquired identification information associated with the second electronic device, determines that an authorization binding relationship needs to be established with the second electronic device, and starts the graphic code scanning of the shared application Function, according to the sixth input to the first control, enter the verification and authorization phase.
  • Step 402 In the process of receiving the sixth input to the first control, broadcast a second authorization request to the second electronic device, and the second electronic device generates a second authorization graphic code after accepting the second authorization request, and sends it to the first An electronic device sends the fifth prompt message.
  • Step 403 The first electronic device displays the second authorized graphic code on the second electronic device in the scan box of the shared application program of the first electronic device according to the fifth prompt information, and the first electronic device scans the second authorized graphic code , Complete the authorization of the second electronic device. Wherein, after the scanning is completed, the sixth prompt information will be sent to the second electronic device.
  • the authorization here refers to authorization for at least one first application, and both the shared application and the authorized application are target applications.
  • Step 404 In the sharing phase, the first electronic device enters the graphic code scanning page and selects the second electronic device.
  • Step 405 The second electronic device enters the code scanning function page, and controls the camera to aim at the second function graphic code to be scanned.
  • Step 406 The first electronic device scans the page with the graphic code, displays and scans the second functional graphic code on the display screen of the second electronic device, and synchronizes the scanning result to the second electronic device.
  • the device binding and information sharing are realized through the graphic code scanning mode, which can ensure that the second electronic device obtains the code scanning result of the first electronic device.
  • the target application is the authorization binding program between the first electronic device and the second electronic device.
  • the verification information sharing can be completed quickly and safely by binding the trusted device in advance and determining the authorization binding procedure, improving the efficiency of information sharing, and solving the problem of inconvenience in sharing verification information.
  • the embodiment of the present invention also provides a verification information sharing method, which is applied to a second electronic device, as shown in FIG. 5, including:
  • Step 501 Receive the identity information input by the user through the target application, where the identity information is the identification information associated with the first electronic device.
  • the second electronic device may first receive the identification information associated with the first electronic device that is input by the user through the target application, and through the received identification information associated with the first electronic device, it may form a connection with the first electronic device for the target application. Association between devices.
  • the target application program may be an application program shared by the first electronic device and the second electronic device.
  • Step 502 In a case where the target application is an authorization binding program between the first electronic device and the second electronic device, and the first electronic device receives the verification information associated with the target application, receive a message sent by the first electronic device Verification information.
  • the verification information may be sent to the first electronic device.
  • the second electronic device enables the second electronic device to obtain verification information, and completes the sharing of verification information between the two electronic devices. It should be noted that the authorization binding procedure needs to be determined in advance between the first electronic device and the second electronic device.
  • the verification information includes identification information associated with the second electronic device
  • Receiving the verification information sent by the first electronic device specifically includes:
  • the verification information sent by the first electronic device to the second electronic device includes identification information associated with the second electronic device, and the identification information associated with the second electronic device can determine that the recipient of the verification information is the second electronic device.
  • the preset trust list Before sending the verification information to the second electronic device, it is necessary to detect whether the identification information associated with the second electronic device is in the preset trust list, and the preset trust list stores the trusted device bound to the first electronic device ⁇ identification information.
  • the process of sending verification information to the second electronic device is executed, and at this time, the second electronic device can receive the verification information sent by the first electronic device.
  • the second electronic device is verified through the preset trust list, and the verification information is sent to the second electronic device if the verification is passed, which can ensure the security of information sharing.
  • the method before receiving the identity information input by the user through the target application, the method further includes:
  • At least one first application program is an authorized binding program.
  • the second electronic device may establish an authorization binding relationship with the first electronic device for at least one first application program in advance, and determine that at least one first application program is an authorization binding program according to the established authorization binding relationship.
  • the authorization binding relationship can be established by means of verification codes, or the authorization binding relationship can be established by means of graphic code scanning.
  • the graphic codes here include, but are not limited to, QR codes and barcodes.
  • Establishing an authorization binding relationship through a verification code or scanning a graphic code can bind trusted devices in advance, and quickly and safely complete the sharing of verification information between electronic devices.
  • establishing an authorization binding relationship between the second electronic device and the first electronic device by means of a verification code includes:
  • the first electronic device determines at least one first application program to be shared to form an application list.
  • the identification information input interface the input identification information associated with the second electronic device is received, and the identification information associated with the second electronic device is received according to the identification information associated with the second electronic device.
  • the information generates a second verification code.
  • the second electronic device receives the second verification code sent by the first electronic device, and forwards the second verification code to the first electronic device, so that the first electronic device inputs the second verification code in the pop-up authorization interface according to the second verification code. Verify the code, and send the second prompt message to the second electronic device.
  • the second electronic device establishes an authorization binding relationship with the first electronic device according to the second prompt information.
  • the authorization binding relationship of the first application program of the first electronic device and the second electronic device is established through the verification code, which can realize the binding of the trusted device in advance, and then quickly and safely complete the sharing of verification information between the electronic devices.
  • the verification information sent by the first electronic device can also be received in the form of a verification code.
  • receiving the verification information sent by the first electronic device includes:
  • the sharing phase After establishing the authorization binding relationship between the two, you can enter the sharing phase.
  • the second electronic device uses the verification code to log in to the target application through the information of the first electronic device, it can click to send the verification code for verification.
  • the second electronic device sends the port to the application platform of the target application.
  • the information of the first electronic device mentioned here may be the number of the first electronic device or the identity document (ID) of the first electronic device.
  • the application platform After receiving the verification request for the target application, the application platform sends verification information including the first verification code and the identification information associated with the second electronic device to the first electronic device, and the verification information may include the identification of the target application .
  • the first electronic device may perform a detection process, that is, according to the identification information associated with the second electronic device in the verification information, detect whether the verification request was sent by the second electronic device, and determine the target application associated with the verification information Whether the program is an authorized binding program. If the verification request is sent by the second electronic device, and the target application associated with the verification information belongs to the authorization binding program, it is determined that the detection is passed, and the verification information can be forwarded to the second electronic device at this time.
  • the second electronic device receives the verification information including the first verification code and the identification information associated with the second electronic device forwarded by the first electronic device, performs login verification according to the first verification code, and logs in to the target application through the information of the first electronic device program.
  • establishing an authorization binding relationship between the second electronic device and the first electronic device by means of graphic code scanning includes:
  • the first authorization request display the encrypted first authorization graphic code, and send the third prompt message to the first electronic device;
  • an authorization binding relationship between the second electronic device and the first electronic device is established.
  • the first electronic device determines at least one first application program that needs to be shared to form an application list, and in the identification information input interface, receives the input identification information associated with the second electronic device, and determines that authorization needs to be established with the second electronic device Binding relationship.
  • the first authorized graphic code corresponding to the at least one first application program is generated, and displayed after being encrypted.
  • the authentication and authorization phase is entered, where the first control here may be a first artificial intelligence (AI) button on the first electronic device.
  • the first electronic device sends the first authorization request carrying the encrypted first authorization pattern code to the second electronic device in the form of broadcast, wherein the first electronic device sends the first authorization request through the local area network or the ad hoc network, and the second The electronic device and the first electronic device are connected to the same local area network or the same ad hoc network.
  • the second electronic device determines to accept the first authorization request according to the seventh input to the second control.
  • the second control here may be a second AI button on the second electronic device.
  • the second electronic device displays the encrypted first authorization graphic code on the display screen, and then sends the third prompt message to the first electronic device, so that the first electronic device enters the scan code authorization link, and the The encrypted first authorization graphic code on the second electronic device is scanned, and then the fourth prompt information is sent to the second electronic device.
  • the second electronic device establishes a connection with the first application for at least one first application according to the fourth prompt information.
  • the authorization binding relationship between the first application program of the first electronic device and the second electronic device is established through the graphic code scanning method, which can realize the binding of trusted devices in advance, and then quickly and safely complete the sharing of verification information between electronic devices .
  • the verification information sent by the first electronic device can also be received in a graphic code scanning mode.
  • receiving the verification information sent by the first electronic device includes:
  • the first function graphic code transmitted by the first electronic device is received and displayed.
  • the sharing phase can be entered.
  • the first electronic device displays the first function graphic code sent by the application platform of the target application, and according to the received For the first input of the first control, the shared device selection interface is displayed, and according to the received first selection operation on the second electronic device, it is determined that the verification information needs to be synchronized with the second electronic device, and the first function graphic code is transmitted To the second electronic device.
  • the second electronic device receives the first function graphic code transmitted by the first electronic device according to the received third input to the second control, and displays the received first function graphic code on the display screen. After the first function graphic code is displayed, the first function graphic code can be scanned and verified.
  • the scanning verification here can be: accept the scanning of the first function graphic code by other scanning devices to complete the function verification, or it can be the second electronic The device itself scans and verifies the first function graphic code.
  • the shared application program is determined and the trusted device is bound in advance, combined with the auxiliary function of the control, to complete the sharing and use of the graphic code, and realize the verification of the specific graphic code page in the authorized application program of the second electronic device by the first electronic device Features.
  • the graphic code takes effect immediately, without additional storage and forwarding in social software, reducing the risk of information leakage.
  • establishing an authorization binding relationship between the second electronic device and the first electronic device by means of graphic code scanning includes:
  • an authorization binding relationship between the second electronic device and the first electronic device is established.
  • the first electronic device determines at least one first application program that needs to be shared to form an application list.
  • the identification information input interface the input identification information associated with the second electronic device is received, and according to the acquired identification information associated with the second electronic device The associated identification information determines that an authorization binding relationship needs to be established with the second electronic device.
  • the authentication authorization phase is entered.
  • the first electronic device broadcasts the second authorization request to the second electronic device through the local area network or the ad hoc network.
  • the second electronic device accepts the second authorization request broadcast by the first electronic device according to the eighth input to the second control, and generates and displays the second authorization graphic code according to the second authorization request. Then, the fifth prompt information is fed back to the first electronic device, and the first electronic device displays the second authorization graphic code on the second electronic device in the scan frame of the first electronic device according to the fifth prompt information.
  • the first electronic device After scanning the second authorization graphic code, the first electronic device sends sixth prompt information to the second electronic device.
  • the second electronic device establishes a relationship with the first electronic device for at least one first application according to the sixth prompt information.
  • the authorization binding relationship After scanning the second authorization graphic code, the first electronic device sends sixth prompt information to the second electronic device.
  • the second electronic device establishes a relationship with the first electronic device for at least one first application according to the sixth prompt information.
  • the authorization binding relationship is a relationship with the first electronic device for at least one first application according to the sixth prompt information.
  • the second authorization pattern code on the display screen of the second electronic device when the second authorization pattern code on the display screen of the second electronic device is displayed in the scan frame of the first electronic device, the second authorization pattern can be realized through the communication connection between the first electronic device and the second electronic device Code transmission.
  • the binding relationship between the display screen of the first electronic device and the display screen of the second electronic device can also be established, through the display screen of the first electronic device and the display screen of the second electronic device.
  • the binding relationship of can directly display the content on the display screen of the second electronic device on the first electronic device according to the fifth prompt information.
  • the authorization binding relationship between the first application program of the first electronic device and the second electronic device is established through the graphic code scanning method, which can realize the binding of trusted devices in advance, and then quickly and safely complete the sharing of verification information between electronic devices .
  • the verification information sent by the first electronic device may also be received by scanning the graphic code.
  • receiving the verification information sent by the first electronic device includes: In the case of four inputs, control the second electronic device to face the second function graphic code to be scanned, and display the second function graphic code on the code scanning interface;
  • the electronic device Receive the scanning result sent by the first electronic device after scanning the second functional graphic code, wherein the first electronic device receives and displays the second functional graphic code according to the first prompt information, scans the second functional graphic code, and sends it to the first Second, the electronic device synchronizes the scan result.
  • the sharing phase can be entered.
  • the first electronic device displays the shared device selection interface according to the second input to the first control.
  • the second selection operation determines that the verification information needs to be synchronized with the second electronic device.
  • the second electronic device first displays the scan code interface of the target application, and according to the fourth input to the second control, controls the camera of the second electronic device to face the second functional graphic code to be scanned, so that the scan code interface displays the first Two functional graphic codes. At this time, the second electronic device sends the first prompt information to the first electronic device.
  • the first electronic device displays the second function graphic code on the graphic code scanning page of the authorized application (target application), and scans the second function graphic code to obtain the scanning result and synchronize with the second electronic device Scan results.
  • the second electronic device obtains the scanning result of the first electronic device, and completes the sharing of the scan code authorization.
  • the transmission of the second functional graphic code to be scanned can be realized through the communication connection between the two electronic devices, or According to the binding relationship between the display screen of the first electronic device and the display screen of the second electronic device, the content on the display screen of the second electronic device is directly displayed according to the first prompt information.
  • the shared use of the graphic code scanning function is completed, and the first electronic device can scan the second electronic device in the authorized application program.
  • the function of the graphic code takes effect immediately, without additional storage and forwarding in social software, reducing the risk of information leakage.
  • the target application is the first electronic device and the second electronic device.
  • the authorization binding program between electronic devices, and the first electronic device receives the verification information associated with the target application, and receives the verification information sent by the first electronic device.
  • the trusted device can be bound in advance and the authorization binding is determined. Set procedures to complete verification information sharing quickly and safely, improve the efficiency of information sharing, and solve the problem of inconvenience in verification information sharing.
  • An embodiment of the present invention provides an electronic device, which is a first electronic device, as shown in FIG. 6, including:
  • the first receiving module 10 is configured to receive verification information associated with the target application
  • the first sending module 20 is configured to send the verification information to the second electronic device when the target application is an authorization binding program between the first electronic device and the second electronic device.
  • the verification information includes identification information associated with the second electronic device
  • the first sending module is further used for:
  • the verification information is sent to the second electronic device.
  • the electronic equipment also includes:
  • the first establishing module is configured to establish an authorization binding relationship between the first electronic device and the second electronic device for at least one first application before the first receiving module receives the verification information associated with the target application;
  • the first determining module is configured to determine at least one first application program as an authorization binding program according to the authorization binding relationship.
  • the first establishment module includes:
  • the first selection submodule is used to select at least one first application shared with the second electronic device among the installed applications;
  • the establishment sub-module is used to establish an authorization binding relationship between the first electronic device and the second electronic device through a verification code method or a graphic code scanning method for at least one first application program.
  • the first receiving module is further used for:
  • the verification information including the first verification code and the identification information associated with the second electronic device sent by the application platform of the target application program is received, wherein the application platform is used to use the verification code when the second electronic device passes the information of the first electronic device When logging in to the target application and sending a verification request carrying identification information associated with the second electronic device, sending verification information;
  • the first sending module includes:
  • the detection sub-module is used to detect whether the verification information is requested by the second electronic device and whether the target application associated with the verification information belongs to the authorization binding program;
  • the forwarding sub-module is used to forward the verification information to the second electronic device when it is detected that the verification information is requested by the second electronic device and the target application associated with the verification information belongs to the authorization binding program.
  • the first receiving module is further used for:
  • the first sending module includes:
  • the first processing sub-module is configured to display the shared device selection interface in the case of receiving the first input to the first control, and receive the first selection operation on the second electronic device;
  • the transmission sub-module is used to transmit the first function pattern code to the second electronic device in response to the first selection operation.
  • the first receiving module includes:
  • the second processing sub-module is configured to display a shared device selection interface in the case of receiving a second input to the first control, and receive a second selection operation on the second electronic device;
  • the second selection submodule is used to select the second electronic device in response to the second selection operation
  • the third processing sub-module is configured to receive and display the second function graphic code to be scanned displayed on the second electronic device in the case of receiving the first prompt message for the second electronic device to perform the code scanning operation;
  • the first sending module is further used for:
  • the first electronic device in the embodiment of the present invention receives the verification information associated with the target application, and sends the verification information when the target application is an authorization binding program between the first electronic device and the second electronic device
  • the authentication information sharing can be completed quickly and safely by binding the trusted device in advance and determining the authorization binding procedure, improving the efficiency of information sharing, and solving the problem of inconvenience in sharing authentication information.
  • An embodiment of the present invention also provides an electronic device, which is a second electronic device, as shown in FIG. 7, including:
  • the second receiving module 30 is configured to receive the identity information input by the user through the target application, where the identity information is the identification information associated with the first electronic device;
  • the third receiving module 40 is configured to receive when the target application is an authorization binding program between the first electronic device and the second electronic device, and the first electronic device receives the verification information associated with the target application Verification information sent by the first electronic device.
  • the verification information includes identification information associated with the second electronic device
  • the third receiving module is further used for:
  • the electronic equipment also includes:
  • the second establishment module is used to establish the second electronic device and the first electronic device through the verification code method or the graphic code scanning method for the at least one first application program before the second receiving module receives the identity information input by the user through the target application program.
  • the second determining module is used to determine that at least one first application is an authorization binding program.
  • the third receiving module includes:
  • the first sending sub-module is configured to send a verification request carrying identification information associated with the second electronic device to the application platform of the target application when the target application is logged in by the verification code through the information of the first electronic device;
  • the first receiving submodule is configured to receive verification information including the first verification code and identification information associated with the second electronic device forwarded by the first electronic device, the verification information being the information sent by the application platform in response to the verification request.
  • the third receiving module is further used for:
  • the first function graphic code transmitted by the first electronic device is received and displayed.
  • the third receiving module includes:
  • the fourth processing sub-module is configured to control the second electronic device to face the second function graphic code to be scanned and display the second function graphic code on the code scanning interface when the fourth input to the second control is received;
  • the second sending sub-module is configured to send first prompt information for performing a code scanning operation to the first electronic device
  • the second receiving sub-module is configured to receive the scanning result sent by the first electronic device after scanning the second functional graphic code, wherein the first electronic device receives and displays the second functional graphic code according to the first prompt information, and responds to the second functional graphic code. After the functional graphic code is scanned, the scan result is synchronized with the second electronic device.
  • the target application by receiving the identification information associated with the first electronic device input by the user through the target application, the target application is the authorization binding between the first electronic device and the second electronic device.
  • the first electronic device receives the verification information associated with the target application program
  • the verification information sent by the first electronic device is received, and the verification can be completed quickly and safely by binding the trusted device in advance and determining the authorization binding program Information sharing, improve the efficiency of information sharing, and solve the problem of inconvenience in sharing verification information.
  • the electronic device 800 includes but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, and a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, and a power supply 811 and other components.
  • the structure of the electronic device shown in FIG. 8 does not constitute a limitation on the electronic device.
  • the electronic device may include more or fewer components than those shown in the figure, or a combination of certain components, or different components.
  • electronic devices include, but are not limited to, mobile phones, tablet computers, notebook computers, palmtop computers, vehicle-mounted terminals, wearable devices, and pedometers.
  • the electronic device may be a first electronic device or a second electronic device.
  • the radio frequency unit 801 receives verification information associated with the target application; when the target application is the first electronic device and In the case of an authorization binding procedure between the second electronic devices, the verification information is sent to the second electronic device.
  • the verification information includes identification information associated with the second electronic device; when the verification information is sent to the second electronic device, the radio frequency unit 801 is also used to: When the identification information associated with the second electronic device is included in the preset trust In the case of a list, the verification information is sent to the second electronic device.
  • the processor 810 before receiving the verification information associated with the target application, is configured to: for at least one first application, establish an authorization binding relationship between the first electronic device and the second electronic device; Determine the relationship, and determine that at least one first application is an authorized binding program.
  • the processor 810 when establishing an authorization binding relationship between the first electronic device and the second electronic device for at least one first application, is further configured to: among the installed applications, select the second At least one first application program shared by the electronic device; for the at least one first application program, an authorization binding relationship between the first electronic device and the second electronic device is established through a verification code method or a graphic code scanning method.
  • the radio frequency unit 801 when receiving the verification information associated with the target application, is further configured to: receive the verification information including the first verification code and the identification information associated with the second electronic device sent by the application platform of the target application , Where the application platform is used to send the verification information when the second electronic device uses the verification code to log in to the target application through the information of the first electronic device and sends a verification request carrying identification information associated with the second electronic device;
  • the processor 810 is further configured to: detect whether the verification information is generated by the second electronic device.
  • the electronic device requests to obtain and whether the target application associated with the verification information belongs to the authorization binding program; when it is detected that the verification information is requested by the second electronic device and the target application associated with the verification information belongs to the authorization binding program, the radio frequency is controlled
  • the unit 801 forwards the verification information to the second electronic device.
  • the radio frequency unit 801 when receiving the verification information associated with the target application, is further configured to: receive the first function graphic code sent by the application platform of the target application; when sending the verification information to the second electronic device, the user
  • the input unit 807 is configured to: upon receiving the first input to the first control, notify the processor 810 to control the display unit 806 to display the shared device selection interface, and to receive the first selection operation on the second electronic device; the radio frequency unit 801 is also used to: in response to the first selection operation, transmit the first function graphic code to the second electronic device.
  • the user input unit 807 is further configured to: in the case of receiving a second input to the first control, notify the processor 810 to control the display unit 806 to display the shared device selection Interface, and receive a second selection operation on the second electronic device; the processor 810 is further configured to: in response to the second selection operation, select the second electronic device; the radio frequency unit 801 is further configured to: perform a scan when the second electronic device is received In the case of the first prompt information of the code operation, the processor 810 is received and notified to control the display unit 806 to display the second function graphic code to be scanned displayed on the second electronic device; when the verification information is sent to the second electronic device, the radio frequency The unit 801 is further configured to scan the second function graphic code to obtain a scanning result, and synchronize the scanning result to the second electronic device.
  • the verification information is sent to the second electronic device. Binding trusted devices in advance and determining the authorization binding procedure to quickly and safely complete the verification information sharing, improve the efficiency of information sharing, and solve the problem of inconvenience in sharing verification information.
  • the user input unit 807 is used to: receive the identity information input by the user through the target application, the identity information is the identification information associated with the first electronic device; the radio frequency unit 801 is used to: The program is an authorization binding program between the first electronic device and the second electronic device, and when the first electronic device receives the verification information associated with the target application, the verification information sent by the first electronic device is received.
  • the verification information includes identification information associated with the second electronic device; when receiving the verification information sent by the first electronic device, the radio frequency unit 801 is further configured to: when the identification information associated with the second electronic device is included in the preset In the case of the trust list, the verification information sent by the first electronic device is received.
  • the processor 810 before receiving the identity information input by the user through the target application program, is configured to: for at least one first application program, establish a relationship between the second electronic device and the first electronic device through a verification code method or a graphic code scanning method. The authorization binding relationship between the two; determining that at least one first application is an authorization binding program.
  • the radio frequency unit 801 when receiving the verification information sent by the first electronic device, is further configured to: when logging in to the target application by means of verification code through the information of the first electronic device, send the carrying and data to the application platform of the target application.
  • a verification request for identification information associated with the second electronic device receiving verification information forwarded by the first electronic device including the first verification code and identification information associated with the second electronic device, the verification information being sent by the application platform in response to the verification request Information.
  • the radio frequency unit 801 when receiving the verification information sent by the first electronic device, is further configured to: in the case that the user input unit 807 receives a third input to the second control, receive the first electronic device transmitted by the first electronic device.
  • the function graphic code is notified to the processor 810 to control the display unit 806 to display.
  • the processor 810 when receiving the verification information sent by the first electronic device, is further configured to: when the user input unit 807 receives a fourth input to the second control, control the second electronic device to face the to-be-scanned The second function graphic code, and control the display unit 806 to display the second function graphic code on the code scanning interface; the radio frequency unit 801 is also used to: send the first prompt message for performing the code scanning operation to the first electronic device; receive the first electronic device The scanning result sent after scanning the second functional graphic code, wherein the first electronic device receives and displays the second functional graphic code according to the first prompt information, and after scanning the second functional graphic code, scans synchronously to the second electronic device result.
  • the target application is the authorization binding program between the first electronic device and the second electronic device, and the first electronic device receives
  • the verification information associated with the target application the verification information sent by the first electronic device can be received, by binding the trusted device in advance and determining the authorization binding procedure, the verification information sharing can be completed quickly and safely, and the efficiency of information sharing can be improved. Solve the problem of inconvenience in sharing verification information.
  • the radio frequency unit 801 can be used for receiving and sending signals in the process of sending and receiving information or talking. Specifically, the downlink data from the base station is received and processed by the processor 810; in addition, Uplink data is sent to the base station.
  • the radio frequency unit 801 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio frequency unit 801 can also communicate with the network and other devices through a wireless communication system.
  • Electronic devices provide users with wireless broadband Internet access through the network module 802, such as helping users to send and receive emails, browse web pages, and access streaming media.
  • the audio output unit 803 can convert the audio data received by the radio frequency unit 801 or the network module 802 or stored in the memory 809 into audio signals and output them as sounds. Moreover, the audio output unit 803 may also provide audio output related to a specific function performed by the electronic device 800 (for example, call signal reception sound, message reception sound, etc.).
  • the audio output unit 803 includes a speaker, a buzzer, a receiver, and the like.
  • the input unit 804 is used to receive audio or video signals.
  • the input unit 804 may include a graphics processing unit (GPU) 8041 and a microphone 8042.
  • the graphics processor 8041 is configured to monitor images of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed.
  • the processed image frame may be displayed on the display unit 806.
  • the image frame processed by the graphics processor 8041 may be stored in the memory 809 (or other storage medium) or sent via the radio frequency unit 801 or the network module 802.
  • the microphone 8042 can receive sound and can process such sound into audio data.
  • the processed audio data can be converted into a format that can be sent to the mobile communication base station via the radio frequency unit 801 for output in the case of a telephone call mode.
  • the electronic device 800 further includes at least one sensor 805, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor includes an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 8061 according to the brightness of the ambient light.
  • the proximity sensor can close the display panel 8061 and the display panel 8061 when the electronic device 800 is moved to the ear. / Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three-axis), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of electronic devices (such as horizontal and vertical screen switching, related games) , Magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc.; sensor 805 can also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, Infrared sensors, etc., will not be repeated here.
  • the display unit 806 is used to display information input by the user or information provided to the user.
  • the display unit 806 may include a display panel 8061, and the display panel 8061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • the user input unit 807 can be used to receive inputted numeric or character information, and generate key signal input related to user settings and function control of the electronic device.
  • the user input unit 807 includes a touch panel 8071 and other input devices 8072.
  • the touch panel 8071 also called a touch screen, can collect the user's touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 8071 or near the touch panel 8071. operating).
  • the touch panel 8071 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 810, the command sent by the processor 810 is received and executed.
  • the touch panel 8071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave.
  • the user input unit 807 may also include other input devices 8072.
  • other input devices 8072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
  • the touch panel 8071 can cover the display panel 8061.
  • the touch panel 8071 detects a touch operation on or near it, it transmits it to the processor 810 to determine the type of the touch event, and then the processor 810 determines the type of the touch event according to the touch
  • the type of event provides corresponding visual output on the display panel 8061.
  • the touch panel 8071 and the display panel 8061 are used as two independent components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 8071 and the display panel 8061 can be integrated
  • the implementation of the input and output functions of the electronic device is not specifically limited here.
  • the interface unit 808 is an interface for connecting an external device and the electronic device 800.
  • the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (Input/Output, I/O) port, video I/O port, headphone port, etc.
  • the interface unit 808 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the electronic device 800 or can be used to connect the electronic device 800 to an external device. Transfer data between devices.
  • the memory 809 can be used to store software programs and various data.
  • the memory 809 may mainly include a program storage area and a data storage area.
  • the program storage area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data created by the use of mobile phones (such as audio data, phone book, etc.), etc.
  • the memory 809 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the processor 810 is the control center of the electronic device. It uses various interfaces and lines to connect the various parts of the entire electronic device, runs or executes the software programs and/or modules stored in the memory 809, and calls the data stored in the memory 809. , Perform various functions of electronic equipment and process data, so as to monitor the electronic equipment as a whole.
  • the processor 810 may include one or more processing units; preferably, the processor 810 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface and application programs, etc., the modem
  • the processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 810.
  • the electronic device 800 may also include a power source 811 (such as a battery) for supplying power to various components.
  • a power source 811 such as a battery
  • the power source 811 may be logically connected to the processor 810 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system. And other functions.
  • the electronic device 800 includes some functional modules not shown, which will not be repeated here.
  • the embodiment of the present invention also provides an electronic device, including a processor and a memory, and a computer program stored in the memory and running on the processor, and when the computer program is executed by the processor, an embodiment of the method for sharing authentication information is implemented
  • an electronic device including a processor and a memory, and a computer program stored in the memory and running on the processor, and when the computer program is executed by the processor, an embodiment of the method for sharing authentication information is implemented
  • Each process can achieve the same technical effect. To avoid repetition, I won’t repeat it here.
  • the embodiment of the present invention also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the computer program is executed by a processor, each process of the foregoing verification information sharing method embodiment is realized, and the same The technical effect, in order to avoid repetition, will not be repeated here.
  • the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk, or optical disk, etc.
  • the disclosed device and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the technical solution of the present invention essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to make a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the method described in each embodiment of the present invention.
  • a terminal which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.
  • the program can be stored in a computer readable storage medium, and the program can be stored in a computer readable storage medium. When executed, it may include the procedures of the above-mentioned method embodiments.
  • the storage medium may be a magnetic disk, an optical disc, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.
  • modules, units, and sub-units can be implemented in one or more application specific integrated circuits (ASIC), digital signal processors (Digital Signal Processor, DSP), and digital signal processing equipment (DSP Device, DSPD). ), programmable logic devices (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, used to execute the present disclosure Other electronic units or a combination of the functions described above.
  • ASIC application specific integrated circuits
  • DSP Digital Signal Processor
  • DSP Device digital signal processing equipment
  • PLD programmable logic devices
  • Field-Programmable Gate Array Field-Programmable Gate Array
  • FPGA Field-Programmable Gate Array
  • the technology described in the embodiments of the present disclosure can be implemented by modules (for example, procedures, functions, etc.) that perform the functions described in the embodiments of the present disclosure.
  • the software codes can be stored in the memory and executed by the processor.
  • the memory can be implemented in the processor or external to the processor.

Abstract

一种验证信息共享方法及电子设备,其中,该方法包括:接收与目标应用程序关联的验证信息(101);在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备(102)。

Description

验证信息共享方法及电子设备
相关申请的交叉引用
本申请主张在2019年12月11日在中国提交的中国专利申请号No.201911268134.0的优先权,其全部内容通过引用包含于此。
技术领域
本发明涉及通信技术领域,尤其涉及一种验证信息共享方法及电子设备。
背景技术
目前电子设备在使用过程中,遇到账号登录、移动身份识别、移动支付等高频验证场景时,通常采用以下方案实现:
1、基于短信收取验证码,输入验证码和手机号码进行验证;2、电子设备应用内即时生成二维验证码,通过被识别设备扫描二维验证码进行验证;3、待登录或待支付网页生成二维验证码,用户通过扫描该二维验证码进行账户授权登录或支付。
现有技术中的验证方案在以下高频共享验证信息场景中存在弊端。
A用户和B用户是具有较强信任关系的两个用户,当A用户希望使用B用户的身份进行验证时,对于以上验证方案都有不方便的地方:
针对使用短信验证的情况,A用户希望使用B用户的信息进行登录验证,但是短信发送到了B用户的电子设备上,B用户不能及时将自己收到的短信验证码发送给A用户,导致验证码失效。
针对电子设备应用内即时生成二维验证码的情况,B用户只能通过截屏然后转发的方式给到A用户,一是整个过程非常繁琐,可能A用户收到验证码时已经失效;二是如果验证码是长期有效的,无法保证该验证码的安全,比如A用户可能授权给其他人使用等。
针对扫描二维验证码进行授权的情况,若A用户想要B用户帮忙扫描网页上的二维验证码,当A用户和B用户不在一起时,该流程很难完成。
综上,在电子设备验证场景下,现有的验证方案存在验证信息共享不便的问题。
发明内容
本发明实施例提供一种验证信息共享方法及电子设备,以解决现有的验证方案存在验证信息共享不便的问题。
为了解决上述问题,本发明实施例是这样实现的:
第一方面,本发明实施例提供一种验证信息共享方法,应用于第一电子设备,包括:
接收与目标应用程序关联的验证信息;
在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备。
第二方面,本发明实施例提供一种验证信息共享方法,应用于第二电子设备,包括:
接收用户通过目标应用程序输入的身份信息,身份信息为与第一电子设备关联的标识信息;
在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序,且第一电子设备接收到与目标应用程序关联的验证信息的情况下,接收第一电子设备发送的验证信息。
第三方面,本发明实施例提供一种电子设备,该电子设备为第一电子设备,包括:
第一接收模块,用于接收与目标应用程序关联的验证信息;
第一发送模块,用于在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备。
第四方面,本发明实施例提供一种电子设备,该电子设备为第二电子设备,包括:
第二接收模块,用于接收用户通过目标应用程序输入的身份信息,身份信息为与第一电子设备关联的标识信息;
第三接收模块,用于在目标应用程序为第一电子设备与第二电子设备 之间的授权绑定程序,且第一电子设备接收到与目标应用程序关联的验证信息的情况下,接收第一电子设备发送的验证信息。
第五方面,本发明实施例还提供一种电子设备,包括处理器、存储器及存储在存储器上并可在处理器上运行的计算机程序,计算机程序被处理器执行时实现上述的验证信息共享方法的步骤。
第六方面,本发明实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储计算机程序,计算机程序被处理器执行时实现上述的验证信息共享方法的步骤。
第七方面,本发明实施例还提供一种计算机程序产品,所述计算机程序产品被存储在非易失的存储介质中,所述程序产品被配置成被至少一个处理器执行以实现上述的验证信息共享方法的步骤。
第八方面,本发明实施例还提供一种电子设备,所述电子设备被配置成用于执行上述的验证信息共享方法的步骤。
本发明实施例中,通过接收与目标应用程序关联的验证信息,在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备,可以通过提前绑定信任设备并确定授权绑定程序,快速安全地完成验证信息共享,提高信息共享效率,解决验证信息共享不便的问题。
附图说明
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
图1为本发明实施例验证信息共享方法示意图一;
图2为本发明实施例通过验证码方式进行验证信息共享的流程图;
图3为本发明实施例通过图形码扫描方式进行验证信息共享的流程图一;
图4为本发明实施例通过图形码扫描方式进行验证信息共享的流程图 二;
图5为本发明实施例验证信息共享方法示意图二;
图6为本发明实施例第一电子设备示意图;
图7为本发明实施例第二电子设备示意图;
图8为本发明实施例电子设备硬件结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明实施例提供一种验证信息共享方法,应用于第一电子设备,如图1所示,包括:
步骤101、接收与目标应用程序关联的验证信息。
第一电子设备可以首先接收与目标应用程序关联的验证信息,其中,验证信息可以是目标应用程序的应用平台所发送,也可以是第二电子设备所发送。目标应用程序可以为第一电子设备和第二电子设备共有的应用程序。
步骤102、在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备。
在接收到与目标应用程序关联的验证信息之后,且在确定目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,进行验证信息的转发,使得第二电子设备获取验证信息,实现将与目标应用程序关联的验证信息同步至第二电子设备,使得两个电子设备之间完成验证信息的共享。
需要说明的是,第一电子设备与第二电子设备之间需要预先确定授权绑定程序。在第一电子设备接收到第二电子设备发送的与目标应用程序关联的验证信息之后,在向第二电子设备发送验证信息时,此时所发送的验证信息为经过第一电子设备处理后的验证信息。
上述实施过程,通过提前绑定信任设备并确定授权绑定程序,可以快 速安全地完成验证信息共享,提高信息共享效率,解决验证信息共享不便的问题。
可选的,在本发明一实施例中,验证信息包含与第二电子设备关联的标识信息;将验证信息发送给第二电子设备,具体包括:
在与第二电子设备关联的标识信息包含在预设信任列表的情况下,将验证信息发送给第二电子设备。
第一电子设备所接收到的验证信息中包含有与第二电子设备相关联的标识信息,在向第二电子设备发送验证信息之前,需要检测与第二电子设备关联的标识信息是否在预设信任列表中,其中预设信任列表中存储有与第一电子设备所绑定的信任设备的标识信息。在与第二电子设备关联的标识信息包含在预设信任列表中时,执行向第二电子设备发送验证信息的过程。
上述过程,通过提前绑定信任设备并生成预设信任列表,可以利用预设信任列表对第二电子设备进行检验,在检验通过的情况下将验证信息发送给第二电子设备,保证信息共享的安全性。
可选的,在本发明一实施例中,接收与目标应用程序关联的验证信息之前,还包括:
针对至少一个第一应用程序,建立第一电子设备与第二电子设备之间的授权绑定关系;
根据授权绑定关系,确定至少一个第一应用程序为授权绑定程序。
第一电子设备在接收与目标应用程序关联的验证信息之前,需要在所安装的应用程序中,确定需要共享的至少一个第一应用程序,建立包括至少一个第一应用程序的应用列表。针对所建立的应用列表,建立第一电子设备与第二电子设备之间的授权绑定关系,根据所建立的授权绑定关系,确定应用列表中的至少一个第一应用程序为授权绑定程序。
通过提前绑定信任设备并确定授权绑定程序,可以在后续过程中快速安全地完成电子设备之间关于授权绑定程序的验证信息共享。
其中,针对至少一个第一应用程序,建立第一电子设备与第二电子设备之间的授权绑定关系,包括:
在所安装的应用程序中,选择与第二电子设备共享的至少一个第一应 用程序;针对至少一个第一应用程序,通过验证码方式或者图形码扫描方式建立第一电子设备与第二电子设备之间的授权绑定关系。
在针对至少一个第一应用程序,建立与第二电子设备之间的授权绑定关系时,第一电子设备可以通过验证码的方式建立授权绑定关系,也可以通过图形码扫描方式建立授权绑定关系。这里的图形码包括但不限于二维码和条形码。
通过发送验证码或者通过图形码扫描方式建立授权绑定关系,可以提前绑定信任设备,快速安全地完成电子设备之间验证信息的共享。
可选的,在本发明一实施例中,针对至少一个第一应用程序,通过验证码方式建立第一电子设备与第二电子设备之间的授权绑定关系,包括:
接收在标识信息输入界面内所输入的与第二电子设备关联的标识信息;
根据与第二电子设备关联的标识信息生成第二验证码,并发送第二验证码至第二电子设备;
接收第二电子设备转发的第二验证码;
在授权界面输入第二验证码,针对至少一个第一应用程序,建立第一电子设备与第二电子设备之间的授权绑定关系;
其中,在输入第二验证码之后,向第二电子设备发送第二提示信息。
在针对至少一个第一应用程序,建立两个电子设备之间的授权绑定关系时,可以显示标识信息输入界面,在输入界面内接收所输入的与第二电子设备关联的标识信息,根据所接收到的与第二电子设备关联的标识信息生成第二验证码,并发送第二验证码至第二电子设备。
在第二电子设备接收到第二验证码,将第二验证码转发至第一电子设备之后,第一电子设备在弹出的授权界面内输入第二验证码,此时可针对至少一个第一应用程序,建立两个电子设备之间的授权绑定关系,即完成对第二电子设备的授权。在第一电子设备输入第二验证码之后需要向第二电子设备发送第二提示信息,用于向第二电子设备提示第一电子设备的进度信息。
上述过程,通过验证码方式建立第一电子设备和第二电子设备的第一应用程序的授权绑定关系,可以实现提前绑定信任设备,进而快速安全地完成电子设备之间验证信息的共享。
可选的,也可通过验证码方式接收和发送验证信息,在本发明一实施例中,接收与目标应用程序关联的验证信息,包括:
接收目标应用程序的应用平台所发送的包括第一验证码以及与第二电子设备关联的标识信息的验证信息,其中,应用平台用于在第二电子设备通过第一电子设备的信息采用验证码方式登录目标应用程序且发送携带与第二电子设备关联的标识信息的验证请求时,发送验证信息;
在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备,包括:
检测验证信息是否由第二电子设备请求获取以及与验证信息关联的目标应用程序是否属于授权绑定程序;
在检测到验证信息由第二电子设备请求获取且与验证信息关联的目标应用程序属于授权绑定程序时,向第二电子设备转发验证信息。
在建立两者的授权绑定关系之后,可以进入共享阶段。在共享阶段,在第二电子设备通过第一电子设备的信息采用验证码方式登录目标应用程序时,可以点击发送验证码的方式进行验证,此时第二电子设备向目标应用程序的应用平台发送携带与第二电子设备关联的标识信息的验证请求。其中,验证请求中还可以包括目标应用程序的标识,这里所说的第一电子设备的信息可以为第一电子设备的号码或者第一电子设备的身份标识(Identity document,ID)。
应用平台在接收到针对目标应用程序的验证请求后,向第一电子设备发送包括第一验证码以及与第二电子设备关联的标识信息的验证信息,且验证信息中可以包括目标应用程序的标识。第一电子设备在接收到验证信息之后,可以执行检测过程,即根据验证信息中与第二电子设备关联的标识信息检测验证请求是否为第二电子设备发送,并确定与验证信息关联的目标应用程序是否为授权绑定程序。如果验证请求是第二电子设备发送,且与验证信息关联的目标应用程序属于授权绑定程序,则确定检测通过,此时可以向第二电子设备转发验证信息,使得第二电子设备根据验证信息完成登录。其中,在执行检测过程时,可以是第一电子设备对应的第一用户人为检测,也可以是第一电子设备自动检测,向第二电子设备转发验证信息后,可以做相应的 分享记录。
上述实施过程,通过确定共享的应用程序并提前绑定信任设备,结合识别功能完成验证信息共享,能够实现第一电子设备对第二电子设备授权应用程序登录验证的能力,且上述过程快速安全,提高了信息共享效率,解决了验证信息共享不便的问题。
下面以一具体实例对通过验证码建立授权绑定关系,并接收和发送验证信息的过程进行阐述,如图2所示,包括:
步骤201、第一电子设备确定至少一个第一应用程序,并根据接收到的与第二电子设备关联的标识信息生成第二验证码,发送至第二电子设备。
步骤202、第二电子设备将第二验证码发送至第一电子设备,第一电子设备根据第二验证码完成对第二电子设备的授权。这里的授权为针对至少一个第一应用程序的授权。
步骤203、在第二电子设备通过第一电子设备的信息采用验证码方式登录目标应用程序时,向目标应用程序的应用平台发送携带与第二电子设备关联的标识信息的验证请求。这里的目标应用程序为已授权的第一应用程序中的一个应用程序。
步骤204、第一电子设备接收应用平台发送的包括第一验证码以及与第二电子设备关联的标识信息的验证信息,并检测验证信息是否由第二电子设备请求获取以及与验证信息关联的目标应用程序是否属于授权绑定程序。
步骤205、在检测通过的情况下,第一电子设备将验证信息转发给第二电子设备。
步骤206、第二电子设备根据验证信息完成登录。
上述流程,通过验证码方式实现设备绑定和信息共享,可以保证第二电子设备通过第一电子设备的信息完成目标应用程序的登录。
可选的,在本发明一实施例中,针对至少一个第一应用程序,通过图形码扫描验方式建立第一电子设备与第二电子设备之间的授权绑定关系,包括:
接收在标识信息输入界面内所输入的与第二电子设备关联的标识信息;
根据与第二电子设备关联的标识信息,生成与至少一个第一应用程序 所对应的第一授权图形码并加密;
在接收到对第一控件的第五输入的情况下,向第二电子设备广播携带加密后的第一授权图形码的第一授权请求,其中,第一电子设备与第二电子设备连接至同一网络;
在接收到第二电子设备接受第一授权请求并显示加密后的第一授权图形码的第三提示信息后,扫描显示在第二电子设备上的加密后的第一授权图形码,针对至少一个第一应用程序,建立与第二电子设备之间的授权绑定关系;
其中,在扫描第一授权图形码之后,向第二电子设备发送第四提示信息。
在针对至少一个第一应用程序,建立两个电子设备之间的授权绑定关系时,可以显示标识信息输入界面,在输入界面内接收所输入的与第二电子设备关联的标识信息,根据与第二电子设备关联的标识信息,生成与至少一个第一应用程序所对应的第一授权图形码,加密第一授权图形码之后进行显示。通过接收对第一控件的第五输入,可以进入验证授权阶段。其中,这里的第一控件可以为第一人工智能(Artificial Intelligence,AI)按键。此时第一电子设备向第二电子设备通过广播的形式发送携带加密后的第一授权图形码的第一授权请求,其中第一电子设备通过局域网或者自组网发送第一授权请求,第二电子设备与第一电子设备连接至同一局域网或者同一自组网中。
在第二电子设备接受第一授权请求并显示加密后的第一授权图形码后,会发送第三提示信息,第一电子设备根据第三提示信息进入扫码授权环节,此时第一电子设备根据第三提示信息扫描显示在第二电子设备上的加密后的第一授权图形码,建立与第二电子设备之间的授权绑定关系,即完成对第二电子设备的授权。在第一电子设备对加密后的第一授权图形码扫描之后,会向第二电子设备发送第四提示信息,便于使得第二电子设备获取第一电子设备的进度信息。
上述过程,通过图形码扫描方式建立第一电子设备和第二电子设备的第一应用程序的授权绑定关系,可以实现提前绑定信任设备,进而快速安全地完成电子设备之间验证信息的共享。
可选的,也可通过图形码扫描方式接收和发送验证信息,在本发明一实施例中,接收与目标应用程序关联的验证信息,包括:
接收目标应用程序的应用平台所发送的第一功能图形码;
将验证信息发送给第二电子设备,包括:
在接收到对第一控件的第一输入的情况下,显示共享设备选择界面,并接收对第二电子设备的第一选择操作;
响应第一选择操作,将第一功能图形码传输至第二电子设备。
在建立与第二电子设备之间的授权绑定关系之后,可以进入共享阶段,此时第一电子设备接收目标应用程序的应用平台所发送的第一功能图形码并显示,根据所接收到的对第一控件的第一输入,显示共享设备选择界面,并根据所接收到的对第二电子设备的第一选择操作,确定需要向第二电子设备同步验证信息,将第一功能图形码传输至第二电子设备,使得第二电子设备对第一功能图形码进行扫描验证。
上述实施过程,通过确定共享的应用程序并提前绑定信任设备,结合控件的辅助功能,完成图形码的共享使用,实现第一电子设备对第二电子设备授权应用程序内特定图形码页面验证的功能。且图形码即时生效,不需要额外存储和在社交软件内转发,减少了信息泄露的风险。
下面以一具体实例对通过图形码扫描建立授权绑定关系,并接收和发送验证信息的过程进行阐述,如图3所示,包括:
步骤301、第一电子设备确定至少一个第一应用程序,根据所获取的与第二电子设备关联的标识信息,确定需与第二电子设备建立授权绑定关系,并显示加密后的与至少一个第一应用程序所对应的第一授权图形码,根据对第一控件的第五输入,进入验证授权阶段。
步骤302、在验证授权阶段,向第二电子设备广播携带加密后的第一授权图形码的第一授权请求,由第二电子设备接受第一授权请求并显示加密后的第一授权图形码。
步骤303、在接收到第二电子设备接受第一授权请求并显示加密后的第一授权图形码的第三提示信息后,停止对第一控件的第五输入,进入扫码授权环节,第一电子设备扫描显示在第二电子设备上的加密后的第一授权图 形码,建立与第二电子设备之间的授权绑定关系。至此完成对第二电子设备的授权,进入共享阶段。这里的授权为针对至少一个第一应用程序的授权。其中在完成扫描后向第二电子设备发送第四提示信息。
步骤304、第一电子设备显示目标应用程序的第一功能图形码,根据对第一控件的第一输入,显示共享设备选择界面,并接收对第二电子设备的第一选择操作。这里的目标应用程序为已授权的第一应用程序中的一个应用程序。
步骤305、在第二电子设备接收对第二控件的输入后,可以实现将第一电子设备的第一功能图形码传输至第二电子设备,并由第二电子设备对第一功能图形码进行扫描验证。
上述流程,通过图形码扫描方式实现设备绑定和信息共享,可以保证第二电子设备对第一电子设备的第一功能图形码进行扫描验证。
可选的,在本发明一实施例中,针对至少一个第一应用程序,通过图形码扫描验方式建立第一电子设备与第二电子设备之间的授权绑定关系,还包括:
接收在标识信息输入界面内所输入的与第二电子设备关联的标识信息;
在接收到对第一控件的第六输入的情况下,向第二电子设备广播第二授权请求;
接收到第二电子设备接受第二授权请求并生成第二授权图形码的第五提示信息后,在第一电子设备的扫描框内显示第二授权图形码;
对第二授权图形码进行扫描,针对至少一个第一应用程序,建立第一电子设备与第二电子设备之间的授权绑定关系;
其中,在扫描第二授权图形码之后,向第二电子设备发送第六提示信息。
在针对至少一个第一应用程序,建立两个电子设备之间的授权绑定关系时,可以显示标识信息输入界面,在输入界面内接收所输入的与第二电子设备关联的标识信息,根据所获取的与第二电子设备关联的标识信息,确定需与第二电子设备建立授权绑定关系。
然后根据对第一控件的第六输入进入验证授权阶段,此时第一电子设 备通过局域网或者自组网向第二电子设备广播第二授权请求,第二电子设备接受第二授权请求后会生成第二授权图形码。
第一电子设备接收到第二电子设备接受第二授权请求并生成第二授权图形码的第五提示信息后,可以在第一电子设备的扫描框内显示第二电子设备的显示屏幕上的第二授权图形码。通过第一电子设备对第二授权图形码进行扫描,建立与第二电子设备之间的授权绑定关系,即完成对第二电子设备的授权。其中,在扫描完成后会向第二电子设备发送第六提示信息,用于使得第二电子设备获取第一电子设备的进度信息。
其中,在第一电子设备的扫描框内显示第二电子设备的显示屏幕上的第二授权图形码时,可以通过第一电子设备与第二电子设备之间的通信连接,实现第二授权图形码的传输。也可以是在建立授权绑定关系的过程中,建立第一电子设备的显示屏幕与第二电子设备的显示屏幕的绑定关系,通过第一电子设备的显示屏幕与第二电子设备的显示屏幕的绑定关系,可以直接根据第五提示信息显示第二电子设备显示屏幕上的内容。
上述过程,通过图形码扫描方式建立第一电子设备和第二电子设备的第一应用程序的授权绑定关系,可以实现提前绑定信任设备,进而快速安全地完成电子设备之间验证信息的共享。
可选的,也可通过图形码扫描方式接收和发送验证信息,在本发明一实施例中,接收与目标应用程序关联的验证信息,包括:
在接收到对第一控件的第二输入的情况下,显示共享设备选择界面,并接收对第二电子设备的第二选择操作;
响应第二选择操作,选择第二电子设备;
在接收到第二电子设备执行扫码操作的第一提示信息的情况下,接收并显示第二电子设备上所显示的待扫描第二功能图形码;其中,第二电子设备通过目标应用程序执行扫码操作,第一电子设备在显示第二功能图形码时,通过目标应用程序进行显示;
将验证信息发送给第二电子设备,包括:
扫描第二功能图形码获取扫描结果,并将扫描结果同步至第二电子设备。
在建立与第二电子设备之间的授权绑定关系之后,可以进入共享阶段,此时根据对第一控件的第二输入显示共享设备选择界面,并接收对第二电子设备的第二选择操作,响应于该第二选择操作,选择第二电子设备,确定需要向第二电子设备同步验证信息。第二电子设备进入授权应用程序的扫码功能页面执行扫码操作,并向第一电子设备发送第一提示信息,第一电子设备根据第一提示信息,接收第二电子设备上所显示的待扫描第二功能图形码,并在授权应用程序(目标应用程序)的图形码扫描页面显示,并扫描第二功能图形码,获取扫描结果,将扫描结果同步至第二电子设备,完成扫码授权的共享。
其中,在第一电子设备上显示第二电子设备上所显示的待扫描第二功能图形码时,可以通过两个电子设备之间的通信连接实现待扫描第二功能图形码的传输,也可以根据第一电子设备的显示屏幕与第二电子设备的显示屏幕之间的绑定关系,根据第一提示信息直接显示第二电子设备显示屏幕上的内容。
上述实施过程,通过确定共享的应用程序并提前绑定信任设备,结合控件和信息传输的辅助功能,完成图形码扫描功能的共享使用,实现第一电子设备对第二电子设备授权应用程序内扫描图形码的功能。且图形码即时生效,不需要额外存储和在社交软件内转发,减少了信息泄露的风险。
下面以一具体实例对通过图形码扫描建立授权绑定关系,并接收和发送验证信息的过程进行阐述,如图4所示,包括:
步骤401、第一电子设备确定至少一个第一应用程序,根据所获取的与第二电子设备关联的标识信息,确定需与第二电子设备建立授权绑定关系,开启共享应用程序的图形码扫描功能,根据对第一控件的第六输入,进入验证授权阶段。
步骤402、在接收对第一控件的第六输入的过程中,向第二电子设备广播第二授权请求,由第二电设备在接受第二授权请求后生成第二授权图形码,并向第一电子设备发送第五提示信息。
步骤403、第一电子设备根据第五提示信息,在第一电子设备共享应用程序的扫描框内显示第二电子设备上的第二授权图形码,第一电子设备对 第二授权图形码进行扫描,完成对第二电子设备的授权。其中,在扫描完成后会向第二电子设备发送第六提示信息。这里的授权为针对至少一个第一应用程序的授权,共享应用程序和授权应用程序均为目标应用程序。
步骤404、在共享阶段,第一电子设备进入图形码扫描页面,并选择第二电子设备。
步骤405、第二电子设备进入扫码功能页面,控制摄像头对准待扫描的第二功能图形码。
步骤406、第一电子设备在图形码扫描页面,显示第二电子设备的显示屏幕上的第二功能图形码并扫描,将扫描结果同步至第二电子设备。
上述流程,通过图形码扫描方式实现设备绑定和信息共享,可以保证第二电子设备获取第一电子设备的扫码结果。
综上,为第一电子设备侧的验证信息共享方法的实施过程,通过接收与目标应用程序关联的验证信息,在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备,可以通过提前绑定信任设备并确定授权绑定程序,快速安全地完成验证信息共享,提高信息共享效率,解决验证信息共享不便的问题。
本发明实施例还提供一种验证信息共享方法,应用于第二电子设备,如图5所示,包括:
步骤501、接收用户通过目标应用程序输入的身份信息,身份信息为与第一电子设备关联的标识信息。
第二电子设备可以首先接收用户通过目标应用程序所输入的与第一电子设备关联的标识信息,通过所接收到的与第一电子设备关联的标识信息,可以针对目标应用程序形成与第一电子设备之间的关联。目标应用程序可以为第一电子设备和第二电子设备共有的应用程序。
步骤502、在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序,且第一电子设备接收到与目标应用程序关联的验证信息的情况下,接收第一电子设备发送的验证信息。
在确定目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,且第一电子设备接收到与目标应用程序关联的验证信息时, 可以将验证信息发送给第二电子设备,使得第二电子设备获取验证信息,完成两个电子设备之间验证信息的共享。需要说明的是,第一电子设备与第二电子设备之间需要预先确定授权绑定程序。
上述实施过程,通过提前绑定信任设备并确定授权绑定程序,可以快速安全地完成验证信息共享,提高信息共享效率,解决验证信息共享不便的问题。
可选的,在本发明一实施例中,验证信息包含与第二电子设备关联的标识信息;
接收第一电子设备发送的验证信息,具体包括:
在与第二电子设备关联的标识信息包含在预设信任列表的情况下,接收第一电子设备发送的验证信息。
第一电子设备向第二电子设备发送的验证信息中包含有与第二电子设备关联的标识信息,通过与第二电子设备关联的标识信息可以确定验证信息的接收方为第二电子设备。其中在向第二电子设备发送验证信息之前,需要检测与第二电子设备关联的标识信息是否在预设信任列表中,其中预设信任列表中存储有与第一电子设备所绑定的信任设备的标识信息。在与第二电子设备关联的标识信息包含在预设信任列表中时,执行向第二电子设备发送验证信息的过程,此时第二电子设备可以接收第一电子设备发送的验证信息。
上述过程,通过预设信任列表对第二电子设备进行检验,在检验通过的情况下将验证信息发送给第二电子设备,可以保证信息共享的安全性。
可选的,在本发明一实施例中,接收用户通过目标应用程序输入的身份信息之前,还包括:
针对至少一个第一应用程序,通过验证码方式或者图形码扫描方式建立第二电子设备与第一电子设备之间的授权绑定关系;
确定至少一个第一应用程序为授权绑定程序。
第二电子设备可以预先针对至少一个第一应用程序,建立与第一电子设备之间的授权绑定关系,根据所建立的授权绑定关系,确定至少一个第一应用程序为授权绑定程序。其中可以通过验证码的方式建立授权绑定关系,也可以通过图形码扫描方式建立授权绑定关系。这里的图形码包括但不限于 二维码和条形码。
通过验证码或者通过图形码扫描方式建立授权绑定关系,可以提前绑定信任设备,快速安全地完成电子设备之间验证信息的共享。
可选的,在本发明一实施例中,针对至少一个第一应用程序,通过验证码方式建立第二电子设备与第一电子设备之间的授权绑定关系,包括:
接收第一电子设备所发送的第二验证码;
将第二验证码转发至第一电子设备;
在接收到第一电子设备在授权界面输入第二验证码的第二提示信息之后,针对至少一个第一应用程序,建立第二电子设备与第一电子设备的授权绑定关系。
首先由第一电子设备确定需要共享的至少一个第一应用程序,形成应用列表,在标识信息输入界面内,接收输入的与第二电子设备关联的标识信息,根据与第二电子设备关联的标识信息生成第二验证码。
第二电子设备接收第一电子设备所发送的第二验证码,并将第二验证码转发至第一电子设备,使得第一电子设备根据第二验证码,在弹出的授权界面内输入第二验证码,并向第二电子设备发送第二提示信息。第二电子设备根据第二提示信息建立与第一电子设备之间的授权绑定关系。
上述过程,通过验证码方式建立第一电子设备和第二电子设备的第一应用程序的授权绑定关系,可以实现提前绑定信任设备,进而快速安全地完成电子设备之间验证信息的共享。
可选的,也可通过验证码方式接收第一电子设备发送的验证信息,在本发明一实施例中,接收第一电子设备发送的验证信息,包括:
在通过第一电子设备的信息采用验证码方式登录目标应用程序时,向目标应用程序的应用平台发送携带与第二电子设备关联的标识信息的验证请求;
接收第一电子设备转发的包括第一验证码以及与第二电子设备关联的标识信息的验证信息,验证信息为应用平台响应于验证请求时所发送的信息。
在建立两者的授权绑定关系之后,可以进入共享阶段。在共享阶段,第二电子设备通过第一电子设备的信息采用验证码方式登录目标应用程序时, 可以点击发送验证码的方式进行验证,此时第二电子设备向目标应用程序的应用平台发送携带与第二电子设备关联的标识信息的验证请求。其中,这里所说的第一电子设备的信息可以为第一电子设备的号码或者第一电子设备的身份标识(Identity document,ID)。
应用平台在接收到针对目标应用程序的验证请求后,向第一电子设备发送包括第一验证码以及与第二电子设备关联的标识信息的验证信息,且验证信息中可以包括目标应用程序的标识。第一电子设备在接收到验证信息之后,可以执行检测过程,即根据验证信息中与第二电子设备关联的标识信息检测验证请求是否为第二电子设备发送,并确定与验证信息关联的目标应用程序是否为授权绑定程序。如果验证请求是第二电子设备发送,且与验证信息关联的目标应用程序属于授权绑定程序,则确定检测通过,此时可以向第二电子设备转发验证信息。
第二电子设备接收第一电子设备转发的包括第一验证码以及与第二电子设备关联的标识信息的验证信息,根据第一验证码进行登录验证,并通过第一电子设备的信息登录目标应用程序。
上述实施过程,通过确定共享的应用程序并提前绑定信任设备,结合识别功能完成验证信息共享,能够实现第一电子设备对第二电子设备授权应用程序登录验证的能力,且上述过程快速安全,提高了信息共享效率,解决了验证信息共享不便的问题。
可选的,在本发明一实施例中,针对至少一个第一应用程序,通过图形码扫描方式建立第二电子设备与第一电子设备之间的授权绑定关系,包括:
在接收到对第二控件的第七输入的情况下,接受第一电子设备广播的携带加密后的第一授权图形码的第一授权请求,其中,第一授权图形码对应于至少一个第一应用程序,第一电子设备与第二电子设备连接至同一网络;
根据第一授权请求,显示加密后的第一授权图形码,并向第一电子设备发送第三提示信息;
接收第一电子设备对第二电子设备上加密后的第一授权图形码扫描后所发送的第四提示信息,其中,第一电子设备根据第三提示信息扫描加密后的第一授权图形码;
根据第四提示信息,针对至少一个第一应用程序,建立第二电子设备与第一电子设备的授权绑定关系。
首先由第一电子设备确定需要共享的至少一个第一应用程序,形成应用列表,在标识信息输入界面内,接收输入的与第二电子设备关联的标识信息,确定需与第二电子设备建立授权绑定关系。
然后生成与至少一个第一应用程序所对应的第一授权图形码,加密后进行显示。通过接收对第一控件的第五输入,进入验证授权阶段,其中,这里的第一控件可以为第一电子设备上的第一人工智能(Artificial Intelligence,AI)按键。此时第一电子设备向第二电子设备通过广播的形式发送携带加密后的第一授权图形码的第一授权请求,其中第一电子设备通过局域网或者自组网发送第一授权请求,第二电子设备与第一电子设备连接至同一局域网或者同一自组网中。
第二电子设备根据对第二控件的第七输入,确定接受第一授权请求。这里的第二控件可以为第二电子设备上的第二AI按键。第二电子设备根据第一授权请求,在显示屏幕上显示加密后的第一授权图形码,然后向第一电子设备发送第三提示信息,使得第一电子设备进入扫码授权环节,对显示在第二电子设备上的加密后的第一授权图形码进行扫描,然后向第二电子设备发送第四提示信息,第二电子设备根据第四提示信息,针对至少一个第一应用程序,建立与第一电子设备之间的授权绑定关系。
上述过程,通过图形码扫描方式建立第一电子设备和第二电子设备的第一应用程序的授权绑定关系,可以实现提前绑定信任设备,进而快速安全地完成电子设备之间验证信息的共享。
可选的,也可通过图形码扫描方式接收第一电子设备发送的验证信息,在本发明一实施例中,接收第一电子设备发送的验证信息,包括:
在接收到对第二控件的第三输入的情况下,接收第一电子设备传输的第一功能图形码并显示。
在建立与第一电子设备之间的授权绑定关系之后,可以进入共享阶段,此时首先由第一电子设备显示目标应用程序的应用平台所发送的第一功能图形码,根据所接收到的对第一控件的第一输入,显示共享设备选择界面,并 根据所接收到的对第二电子设备的第一选择操作,确定需要向第二电子设备同步验证信息,将第一功能图形码传输至第二电子设备。
第二电子设备根据所接收到的对第二控件的第三输入,接收第一电子设备所传输的第一功能图形码,并在显示屏幕上对接收到的第一功能图形码进行显示。在显示第一功能图形码之后,可以对第一功能图形码进行扫描验证,这里的扫描验证可以为:接受其他扫描设备对第一功能图形码的扫描,完成功能验证,还可以是第二电子设备本身对第一功能图形码进行扫描验证。
上述实施过程,通过确定共享的应用程序并提前绑定信任设备,结合控件的辅助功能,完成图形码的共享使用,实现第一电子设备对第二电子设备授权应用程序内特定图形码页面验证的功能。且图形码即时生效,不需要额外存储和在社交软件内转发,减少了信息泄露的风险。
可选的,在本发明一实施例中,针对至少一个第一应用程序,通过图形码扫描方式建立第二电子设备与第一电子设备之间的授权绑定关系,包括:
在接收到对第二控件的第八输入时,接受第一电子设备广播的第二授权请求并生成第二授权图形码;
向第一电子设备发送接受第二授权请求并生成第二授权图形码的第五提示信息;
接收第一电子设备对第一电子设备扫描框内显示的第二授权图形码扫描后发送的第六提示信息,其中,第一电子设备根据第五提示信息,在第一电子设备的扫描框内显示第二授权图形码;
根据第六提示信息,针对至少一个第一应用程序,建立第二电子设备与第一电子设备的授权绑定关系。
首先由第一电子设备确定需要共享的至少一个第一应用程序,形成应用列表,在标识信息输入界面内,接收输入的与第二电子设备关联的标识信息,根据所获取的与第二电子设备关联的标识信息,确定需与第二电子设备建立授权绑定关系。然后根据对第一控件的第六输入进入验证授权阶段,此时第一电子设备通过局域网或者自组网向第二电子设备广播第二授权请求。
第二电子设备根据对第二控件的第八输入,接受第一电子设备广播的第二授权请求,根据第二授权请求生成第二授权图形码并显示。然后向第一 电子设备反馈第五提示信息,由第一电子设备根据第五提示信息在第一电子设备的扫描框内显示第二电子设备上的第二授权图形码。
第一电子设备在扫描第二授权图形码之后,向第二电子设备发送第六提示信息,第二电子设备根据第六提示信息,针对至少一个第一应用程序,建立与第一电子设备之间的授权绑定关系。
其中,在第一电子设备的扫描框内显示第二电子设备的显示屏幕上的第二授权图形码时,可以通过第一电子设备与第二电子设备之间的通信连接,实现第二授权图形码的传输。也可以是在建立授权绑定关系的过程中,建立第一电子设备的显示屏幕与第二电子设备的显示屏幕的绑定关系,通过第一电子设备的显示屏幕与第二电子设备的显示屏幕的绑定关系,可以直接根据第五提示信息在第一电子设备上显示第二电子设备显示屏幕上的内容。
上述过程,通过图形码扫描方式建立第一电子设备和第二电子设备的第一应用程序的授权绑定关系,可以实现提前绑定信任设备,进而快速安全地完成电子设备之间验证信息的共享。
可选的,也可通过图形码扫描方式接收第一电子设备发送的验证信息,在本发明一实施例中,接收第一电子设备发送的验证信息,包括:在接收到对第二控件的第四输入的情况下,控制第二电子设备朝向待扫描的第二功能图形码,并在扫码界面显示第二功能图形码;
向第一电子设备发送执行扫码操作的第一提示信息;
接收第一电子设备对第二功能图形码扫描后发送的扫描结果,其中,第一电子设备根据第一提示信息接收并显示第二功能图形码,并对第二功能图形码扫描后、向第二电子设备同步扫描结果。
在建立与第一电子设备之间的授权绑定关系之后,可以进入共享阶段,此时由第一电子设备根据对第一控件的第二输入显示共享设备选择界面,根据对第二电子设备的第二选择操作,确定需要向第二电子设备同步验证信息。
第二电子设备首先显示目标应用程序的扫码界面,并根据对第二控件的第四输入,控制第二电子设备的摄像头朝向待扫描的第二功能图形码,使得在扫码界面内显示第二功能图形码。此时第二电子设备向第一电子设备发送第一提示信息。
第一电子设备根据第一提示信息,在授权应用程序(目标应用程序)的图形码扫描页面,显示第二功能图形码,并扫描第二功能图形码,获取扫描结果,向第二电子设备同步扫描结果。第二电子设备获取第一电子设备的扫描结果,完成扫码授权的共享。
其中,在第一电子设备上显示第二电子设备上所显示的待扫描第二功能图形码时,可以通过两个电子设备之间的通信连接实现待扫描第二功能图形码的传输,也可以根据第一电子设备的显示屏幕与第二电子设备的显示屏幕之间的绑定关系,根据第一提示信息直接显示第二电子设备显示屏幕上的内容。
上述实施过程,通过确定共享的应用程序并提前绑定信任设备,结合控件和信息传输的辅助功能,完成图形码扫描功能的共享使用,实现第一电子设备对第二电子设备授权应用程序内扫描图形码的功能。且图形码即时生效,不需要额外存储和在社交软件内转发,减少了信息泄露的风险。
综上,为第二电子设备侧的验证信息共享方法的实施过程,通过接收用户通过目标应用程序所输入的与第一电子设备关联的标识信息,在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序,且第一电子设备接收到与目标应用程序关联的验证信息的情况下,接收第一电子设备发送的验证信息,可以通过提前绑定信任设备并确定授权绑定程序,快速安全地完成验证信息共享,提高信息共享效率,解决验证信息共享不便的问题。
本发明实施例提供一种电子设备,该电子设备为第一电子设备,如图6所示,包括:
第一接收模块10,用于接收与目标应用程序关联的验证信息;
第一发送模块20,用于在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备。
可选的,验证信息包含与第二电子设备关联的标识信息;
第一发送模块进一步用于:
在与第二电子设备关联的标识信息包含在预设信任列表的情况下,将验证信息发送给第二电子设备。
可选的,电子设备还包括:
第一建立模块,用于在第一接收模块接收与目标应用程序关联的验证信息之前,针对至少一个第一应用程序,建立第一电子设备与第二电子设备之间的授权绑定关系;
第一确定模块,用于根据授权绑定关系,确定至少一个第一应用程序为授权绑定程序。
可选的,第一建立模块包括:
第一选择子模块,用于在所安装的应用程序中,选择与第二电子设备共享的至少一个第一应用程序;
建立子模块,用于针对至少一个第一应用程序,通过验证码方式或者图形码扫描方式建立第一电子设备与第二电子设备之间的授权绑定关系。
可选的,第一接收模块进一步用于:
接收目标应用程序的应用平台所发送的包括第一验证码以及与第二电子设备关联的标识信息的验证信息,其中,应用平台用于在第二电子设备通过第一电子设备的信息采用验证码方式登录目标应用程序且发送携带与第二电子设备关联的标识信息的验证请求时,发送验证信息;
第一发送模块包括:
检测子模块,用于检测验证信息是否由第二电子设备请求获取以及与验证信息关联的目标应用程序是否属于授权绑定程序;
转发子模块,用于在检测到验证信息由第二电子设备请求获取且与验证信息关联的目标应用程序属于授权绑定程序时,向第二电子设备转发验证信息。
可选的,第一接收模块进一步用于:
接收目标应用程序的应用平台所发送的第一功能图形码;
第一发送模块包括:
第一处理子模块,用于在接收到对第一控件的第一输入的情况下,显示共享设备选择界面,并接收对第二电子设备的第一选择操作;
传输子模块,用于响应第一选择操作,将第一功能图形码传输至第二电子设备。
可选的,第一接收模块包括:
第二处理子模块,用于在接收到对第一控件的第二输入的情况下,显示共享设备选择界面,并接收对第二电子设备的第二选择操作;
第二选择子模块,用于响应第二选择操作,选择第二电子设备;
第三处理子模块,用于在接收到第二电子设备执行扫码操作的第一提示信息的情况下,接收并显示第二电子设备上所显示的待扫描第二功能图形码;
第一发送模块进一步用于:
扫描第二功能图形码获取扫描结果,并将扫描结果同步至第二电子设备。
本发明实施例的第一电子设备,通过接收与目标应用程序关联的验证信息,在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备,可以通过提前绑定信任设备并确定授权绑定程序,快速安全地完成验证信息共享,提高信息共享效率,解决验证信息共享不便的问题。
本发明实施例还提供一种电子设备,该电子设备为第二电子设备,如图7所示,包括:
第二接收模块30,用于接收用户通过目标应用程序输入的身份信息,身份信息为与第一电子设备关联的标识信息;
第三接收模块40,用于在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序,且第一电子设备接收到与目标应用程序关联的验证信息的情况下,接收第一电子设备发送的验证信息。
可选的,验证信息包含与第二电子设备关联的标识信息;
第三接收模块进一步用于:
在与第二电子设备关联的标识信息包含在预设信任列表的情况下,接收第一电子设备发送的验证信息。
可选的,电子设备还包括:
第二建立模块,用于在第二接收模块接收用户通过目标应用程序输入的身份信息之前,针对至少一个第一应用程序,通过验证码方式或者图形码扫描方式建立第二电子设备与第一电子设备之间的授权绑定关系;
第二确定模块,用于确定至少一个第一应用程序为授权绑定程序。
可选的,第三接收模块包括:
第一发送子模块,用于在通过第一电子设备的信息采用验证码方式登录目标应用程序时,向目标应用程序的应用平台发送携带与第二电子设备关联的标识信息的验证请求;
第一接收子模块,用于接收第一电子设备转发的包括第一验证码以及与第二电子设备关联的标识信息的验证信息,验证信息为应用平台响应于验证请求时所发送的信息。
可选的,第三接收模块进一步用于:
在接收到对第二控件的第三输入的情况下,接收第一电子设备传输的第一功能图形码并显示。
可选的,第三接收模块包括:
第四处理子模块,用于在接收到对第二控件的第四输入的情况下,控制第二电子设备朝向待扫描的第二功能图形码,并在扫码界面显示第二功能图形码;
第二发送子模块,用于向第一电子设备发送执行扫码操作的第一提示信息;
第二接收子模块,用于接收第一电子设备对第二功能图形码扫描后发送的扫描结果,其中,第一电子设备根据第一提示信息接收并显示第二功能图形码,并对第二功能图形码扫描后、向第二电子设备同步扫描结果。
本发明实施例的第二电子设备,通过接收用户通过目标应用程序所输入的与第一电子设备关联的标识信息,在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序,且第一电子设备接收到与目标应用程序关联的验证信息的情况下,接收第一电子设备发送的验证信息,可以通过提前绑定信任设备并确定授权绑定程序,快速安全地完成验证信息共享,提高信息共享效率,解决验证信息共享不便的问题。
图8为实现本发明各个实施例的一种电子设备的硬件结构示意图,该电子设备800包括但不限于:射频单元801、网络模块802、音频输出单元803、输入单元804、传感器805、显示单元806、用户输入单元807、接口单 元808、存储器809、处理器810、以及电源811等部件。
本领域技术人员可以理解,图8中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。在本发明实施例中,电子设备包括但不限于手机、平板电脑、笔记本电脑、掌上电脑、车载终端、可穿戴设备、以及计步器等。
其中,电子设备可以为第一电子设备或者第二电子设备,当电子设备为第一电子设备时,射频单元801:接收与目标应用程序关联的验证信息;在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备。
可选的,验证信息包含与第二电子设备关联的标识信息;将验证信息发送给第二电子设备时,射频单元801还用于:在与第二电子设备关联的标识信息包含在预设信任列表的情况下,将验证信息发送给第二电子设备。
可选的,接收与目标应用程序关联的验证信息之前,处理器810用于:针对至少一个第一应用程序,建立第一电子设备与第二电子设备之间的授权绑定关系;根据授权绑定关系,确定至少一个第一应用程序为授权绑定程序。
可选的,针对至少一个第一应用程序,建立第一电子设备与第二电子设备之间的授权绑定关系时,处理器810还用于:在所安装的应用程序中,选择与第二电子设备共享的至少一个第一应用程序;针对至少一个第一应用程序,通过验证码方式或者图形码扫描方式建立第一电子设备与第二电子设备之间的授权绑定关系。
可选的,接收与目标应用程序关联的验证信息时,射频单元801还用于:接收目标应用程序的应用平台所发送的包括第一验证码以及与第二电子设备关联的标识信息的验证信息,其中,应用平台用于在第二电子设备通过第一电子设备的信息采用验证码方式登录目标应用程序且发送携带与第二电子设备关联的标识信息的验证请求时,发送验证信息;
在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备时,处理器810还用于:检测验证信息是否由第二电子设备请求获取以及与验证信息关联的目标应用程序是 否属于授权绑定程序;在检测到验证信息由第二电子设备请求获取且与验证信息关联的目标应用程序属于授权绑定程序时,控制射频单元801向第二电子设备转发验证信息。
可选的,接收与目标应用程序关联的验证信息时,射频单元801还用于:接收目标应用程序的应用平台所发送的第一功能图形码;将验证信息发送给第二电子设备时,用户输入单元807用于:在接收到对第一控件的第一输入的情况下,通知处理器810控制显示单元806显示共享设备选择界面,并接收对第二电子设备的第一选择操作;射频单元801还用于:响应第一选择操作,将第一功能图形码传输至第二电子设备。
可选的,接收与目标应用程序关联的验证信息时,用户输入单元807还用于:在接收到对第一控件的第二输入的情况下,通知处理器810控制显示单元806显示共享设备选择界面,并接收对第二电子设备的第二选择操作;处理器810还用于:响应第二选择操作,选择第二电子设备;射频单元801还用于:在接收到第二电子设备执行扫码操作的第一提示信息的情况下,接收并通知处理器810控制显示单元806显示第二电子设备上所显示的待扫描第二功能图形码;将验证信息发送给第二电子设备时,射频单元801还用于:扫描第二功能图形码获取扫描结果,并将扫描结果同步至第二电子设备。
这样,通过接收与目标应用程序关联的验证信息,在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序的情况下,将验证信息发送给第二电子设备,可以通过提前绑定信任设备并确定授权绑定程序,快速安全地完成验证信息共享,提高信息共享效率,解决验证信息共享不便的问题。
当电子设备为第二电子设备时,用户输入单元807用于:接收用户通过目标应用程序输入的身份信息,身份信息为与第一电子设备关联的标识信息;射频单元801用于:在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序,且第一电子设备接收到与目标应用程序关联的验证信息的情况下,接收第一电子设备发送的验证信息。
可选的,验证信息包含与第二电子设备关联的标识信息;在接收第一电子设备发送的验证信息时,射频单元801还用于:在与第二电子设备关联 的标识信息包含在预设信任列表的情况下,接收第一电子设备发送的验证信息。
可选的,接收用户通过目标应用程序输入的身份信息之前,处理器810用于:针对至少一个第一应用程序,通过验证码方式或者图形码扫描方式建立第二电子设备与第一电子设备之间的授权绑定关系;确定至少一个第一应用程序为授权绑定程序。
可选的,接收第一电子设备发送的验证信息时,射频单元801还用于:在通过第一电子设备的信息采用验证码方式登录目标应用程序时,向目标应用程序的应用平台发送携带与第二电子设备关联的标识信息的验证请求;接收第一电子设备转发的包括第一验证码以及与第二电子设备关联的标识信息的验证信息,验证信息为应用平台响应于验证请求时所发送的信息。
可选的,接收第一电子设备发送的验证信息时,射频单元801还用于:在用户输入单元807接收到对第二控件的第三输入的情况下,接收第一电子设备传输的第一功能图形码并通知处理器810控制显示单元806显示。
可选的,接收第一电子设备发送的验证信息时,处理器810还用于:在用户输入单元807接收到对第二控件的第四输入的情况下,控制第二电子设备朝向待扫描的第二功能图形码,并控制显示单元806在扫码界面显示第二功能图形码;射频单元801还用于:向第一电子设备发送执行扫码操作的第一提示信息;接收第一电子设备对第二功能图形码扫描后发送的扫描结果,其中,第一电子设备根据第一提示信息接收并显示第二功能图形码,并对第二功能图形码扫描后、向第二电子设备同步扫描结果。
这样,通过接收用户通过目标应用程序所输入的与第一电子设备关联的标识信息,在目标应用程序为第一电子设备与第二电子设备之间的授权绑定程序,且第一电子设备接收到与目标应用程序关联的验证信息的情况下,接收第一电子设备发送的验证信息,可以通过提前绑定信任设备并确定授权绑定程序,快速安全地完成验证信息共享,提高信息共享效率,解决验证信息共享不便的问题。
应理解的是,本发明实施例中,射频单元801可用于收发信息或通话过程中,信号的接收和发送,具体的,将来自基站的下行数据接收后,给处 理器810处理;另外,将上行的数据发送给基站。通常,射频单元801包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元801还可以通过无线通信系统与网络和其他设备通信。
电子设备通过网络模块802为用户提供了无线的宽带互联网访问,如帮助用户收发电子邮件、浏览网页和访问流式媒体等。
音频输出单元803可以将射频单元801或网络模块802接收的或者在存储器809中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元803还可以提供与电子设备800执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元803包括扬声器、蜂鸣器以及受话器等。
输入单元804用于接收音频或视频信号。输入单元804可以包括图形处理器(Graphics Processing Unit,GPU)8041和麦克风8042,图形处理器8041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元806上。经图形处理器8041处理后的图像帧可以存储在存储器809(或其它存储介质)中或者经由射频单元801或网络模块802进行发送。麦克风8042可以接收声音,并且能够将这样的声音处理为音频数据。处理后的音频数据可以在电话通话模式的情况下转换为可经由射频单元801发送到移动通信基站的格式输出。
电子设备800还包括至少一种传感器805,比如光传感器、运动传感器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板8061的亮度,接近传感器可在电子设备800移动到耳边时,关闭显示面板8061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别电子设备姿态(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;传感器805还可以包括指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等,在此不再赘述。
显示单元806用于显示由用户输入的信息或提供给用户的信息。显示单元806可包括显示面板8061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板8061。
用户输入单元807可用于接收输入的数字或字符信息,以及产生与电子设备的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元807包括触控面板8071以及其他输入设备8072。触控面板8071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板8071上或在触控面板8071附近的操作)。触控面板8071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器810,接收处理器810发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板8071。除了触控面板8071,用户输入单元807还可以包括其他输入设备8072。具体地,其他输入设备8072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
进一步的,触控面板8071可覆盖在显示面板8061上,当触控面板8071检测到在其上或附近的触摸操作后,传送给处理器810以确定触摸事件的类型,随后处理器810根据触摸事件的类型在显示面板8061上提供相应的视觉输出。虽然在图8中,触控面板8071与显示面板8061是作为两个独立的部件来实现电子设备的输入和输出功能,但是在某些实施例中,可以将触控面板8071与显示面板8061集成而实现电子设备的输入和输出功能,具体此处不做限定。
接口单元808为外部装置与电子设备800连接的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(Input/Output,I/O)端口、视频I/O端口、耳机端口等等。接口单元808可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接 收到的输入传输到电子设备800内的一个或多个元件或者可以用于在电子设备800和外部装置之间传输数据。
存储器809可用于存储软件程序以及各种数据。存储器809可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器809可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
处理器810是电子设备的控制中心,利用各种接口和线路连接整个电子设备的各个部分,通过运行或执行存储在存储器809内的软件程序和/或模块,以及调用存储在存储器809内的数据,执行电子设备的各种功能和处理数据,从而对电子设备进行整体监控。处理器810可包括一个或多个处理单元;优选的,处理器810可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器810中。
电子设备800还可以包括给各个部件供电的电源811(比如电池),优选的,电源811可以通过电源管理系统与处理器810逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
另外,电子设备800包括一些未示出的功能模块,在此不再赘述。
优选的,本发明实施例还提供一种电子设备,包括处理器和存储器,存储在存储器上并可在处理器上运行的计算机程序,该计算机程序被处理器执行时实现验证信息共享方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本发明实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述验证信息共享方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本公开各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上 述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来控制相关的硬件来完成,所述的程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储器(Read-Only Memory,ROM)或随机存取存储器(Random Access Memory,RAM)等。
可以理解的是,本公开实施例描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,模块、单元、子单元可以实现在一个或多个专用集成电路(Application Specific Integrated Circuits,ASIC)、数字信号处理器(Digital Signal Processor,DSP)、数字信号处理设备(DSP Device,DSPD)、可编程逻辑设备(Programmable Logic Device,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本公开所述功能的其它电子单元或其组合中。
对于软件实现,可通过执行本公开实施例所述功能的模块(例如过程、函数等)来实现本公开实施例所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。
上面结合附图对本发明的实施例进行了描述,但是本发明并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本发明的启示下,在不脱离本发明宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本发明的保护之内。

Claims (19)

  1. 一种验证信息共享方法,应用于第一电子设备,包括:
    接收与目标应用程序关联的验证信息;
    在所述目标应用程序为所述第一电子设备与第二电子设备之间的授权绑定程序的情况下,将所述验证信息发送给所述第二电子设备。
  2. 根据权利要求1所述的方法,其中,所述验证信息包含与所述第二电子设备关联的标识信息;
    所述将所述验证信息发送给所述第二电子设备,具体包括:
    在与所述第二电子设备关联的所述标识信息包含在预设信任列表的情况下,将所述验证信息发送给所述第二电子设备。
  3. 根据权利要求1所述的方法,其中,所述接收与目标应用程序关联的验证信息之前,还包括:
    针对至少一个第一应用程序,建立所述第一电子设备与所述第二电子设备之间的授权绑定关系;
    根据所述授权绑定关系,确定所述至少一个第一应用程序为所述授权绑定程序。
  4. 根据权利要求3所述的方法,其中,所述针对至少一个第一应用程序,建立所述第一电子设备与所述第二电子设备之间的授权绑定关系,包括:
    在所安装的应用程序中,选择与所述第二电子设备共享的至少一个第一应用程序;
    针对所述至少一个第一应用程序,通过验证码方式或者图形码扫描方式建立所述第一电子设备与所述第二电子设备之间的授权绑定关系。
  5. 根据权利要求1所述的方法,其中,
    所述接收与目标应用程序关联的验证信息,包括:
    接收所述目标应用程序的应用平台所发送的包括第一验证码以及与所述第二电子设备关联的标识信息的验证信息,其中,所述应用平台用于在所述第二电子设备通过所述第一电子设备的信息采用验证码方式登录所述目标应用程序且发送携带与所述第二电子设备关联的标识信息的验证请求时,发送 所述验证信息;
    所述在所述目标应用程序为所述第一电子设备与第二电子设备之间的授权绑定程序的情况下,将所述验证信息发送给所述第二电子设备,包括:
    检测所述验证信息是否由所述第二电子设备请求获取以及与所述验证信息关联的目标应用程序是否属于所述授权绑定程序;
    在检测到所述验证信息由所述第二电子设备请求获取且与所述验证信息关联的目标应用程序属于所述授权绑定程序时,向所述第二电子设备转发所述验证信息。
  6. 根据权利要求1所述的方法,其中,
    所述接收与目标应用程序关联的验证信息,包括:
    接收所述目标应用程序的应用平台所发送的第一功能图形码;
    所述将所述验证信息发送给所述第二电子设备,包括:
    在接收到对第一控件的第一输入的情况下,显示共享设备选择界面,并接收对所述第二电子设备的第一选择操作;
    响应所述第一选择操作,将所述第一功能图形码传输至所述第二电子设备。
  7. 根据权利要求1所述的方法,其中,
    所述接收与目标应用程序关联的验证信息,包括:
    在接收到对第一控件的第二输入的情况下,显示共享设备选择界面,并接收对所述第二电子设备的第二选择操作;
    响应所述第二选择操作,选择所述第二电子设备;
    在接收到所述第二电子设备执行扫码操作的第一提示信息的情况下,接收并显示所述第二电子设备上所显示的待扫描第二功能图形码;
    所述将所述验证信息发送给所述第二电子设备,包括:
    扫描所述第二功能图形码获取扫描结果,并将所述扫描结果同步至所述第二电子设备。
  8. 一种验证信息共享方法,应用于第二电子设备,包括:
    接收用户通过目标应用程序输入的身份信息,所述身份信息为与第一电子设备关联的标识信息;
    在所述目标应用程序为所述第一电子设备与第二电子设备之间的授权绑定程序,且所述第一电子设备接收到与所述目标应用程序关联的验证信息的情况下,接收所述第一电子设备发送的所述验证信息。
  9. 根据权利要求8所述的方法,其中,所述验证信息包含与所述第二电子设备关联的标识信息;
    所述接收所述第一电子设备发送的所述验证信息,具体包括:
    在与所述第二电子设备关联的标识信息包含在预设信任列表的情况下,接收所述第一电子设备发送的所述验证信息。
  10. 根据权利要求8所述的方法,其中,所述接收用户通过目标应用程序输入的身份信息之前,还包括:
    针对至少一个第一应用程序,通过验证码方式或者图形码扫描方式建立所述第二电子设备与所述第一电子设备之间的授权绑定关系;
    确定所述至少一个第一应用程序为所述授权绑定程序。
  11. 根据权利要求8所述的方法,其中,所述接收所述第一电子设备发送的所述验证信息,包括:
    在通过所述第一电子设备的信息采用验证码方式登录所述目标应用程序时,向所述目标应用程序的应用平台发送携带与所述第二电子设备关联的标识信息的验证请求;
    接收所述第一电子设备转发的包括第一验证码以及与所述第二电子设备关联的标识信息的验证信息,所述验证信息为所述应用平台响应于所述验证请求时所发送的信息。
  12. 根据权利要求8所述的方法,其中,所述接收所述第一电子设备发送的所述验证信息,包括:
    在接收到对第二控件的第三输入的情况下,接收所述第一电子设备传输的第一功能图形码并显示。
  13. 根据权利要求8所述的方法,其中,所述接收所述第一电子设备发送的所述验证信息,包括:
    在接收到对第二控件的第四输入的情况下,控制所述第二电子设备朝向待扫描的第二功能图形码,并在扫码界面显示所述第二功能图形码;
    向所述第一电子设备发送执行扫码操作的第一提示信息;
    接收所述第一电子设备对所述第二功能图形码扫描后发送的扫描结果,其中,所述第一电子设备根据所述第一提示信息接收并显示所述第二功能图形码,并对所述第二功能图形码扫描后、向所述第二电子设备同步扫描结果。
  14. 一种电子设备,所述电子设备为第一电子设备,包括:
    第一接收模块,用于接收与目标应用程序关联的验证信息;
    第一发送模块,用于在所述目标应用程序为所述第一电子设备与第二电子设备之间的授权绑定程序的情况下,将所述验证信息发送给所述第二电子设备。
  15. 一种电子设备,所述电子设备为第二电子设备,包括:
    第二接收模块,用于接收用户通过目标应用程序输入的身份信息,所述身份信息为与第一电子设备关联的标识信息;
    第三接收模块,用于在所述目标应用程序为所述第一电子设备与第二电子设备之间的授权绑定程序,且所述第一电子设备接收到与所述目标应用程序关联的验证信息的情况下,接收所述第一电子设备发送的所述验证信息。
  16. 一种电子设备,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求1至7或者8至13中任一项所述的验证信息共享方法的步骤。
  17. 一种计算机可读存储介质,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现如权利要求1至7或者8至13中任一项所述的验证信息共享方法的步骤。
  18. 一种计算机程序产品,所述计算机程序产品被存储在非易失的存储介质中,所述程序产品被配置成被至少一个处理器执行以实现如权利要求1至7或者8至13中任一项所述的验证信息共享方法的步骤。
  19. 一种电子设备,所述电子设备被配置成用于执行如权利要求1至7或者8至13中任一项所述的验证信息共享方法的步骤。
PCT/CN2020/133780 2019-12-11 2020-12-04 验证信息共享方法及电子设备 WO2021115199A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911268134.0A CN111062026B (zh) 2019-12-11 2019-12-11 一种验证信息共享方法及电子设备
CN201911268134.0 2019-12-11

Publications (1)

Publication Number Publication Date
WO2021115199A1 true WO2021115199A1 (zh) 2021-06-17

Family

ID=70300642

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/133780 WO2021115199A1 (zh) 2019-12-11 2020-12-04 验证信息共享方法及电子设备

Country Status (2)

Country Link
CN (1) CN111062026B (zh)
WO (1) WO2021115199A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407427A (zh) * 2021-06-18 2021-09-17 北京小米移动软件有限公司 校验信息处理方法及装置、终端设备及存储介质

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111062026B (zh) * 2019-12-11 2022-06-17 维沃移动通信有限公司 一种验证信息共享方法及电子设备
CN111756696A (zh) * 2020-05-26 2020-10-09 维沃移动通信有限公司 应用程序的登录方法、第一电子设备和第二电子设备
CN111866885A (zh) * 2020-06-09 2020-10-30 维沃移动通信有限公司 验证信息共享方法、装置及电子设备
CN111818376A (zh) * 2020-07-08 2020-10-23 深圳创维-Rgb电子有限公司 一种密码设置方法、智能电视、电子设备及可读存储介质
CN111723889B (zh) * 2020-07-31 2021-06-11 腾讯科技(深圳)有限公司 扫码登录方法、图形码显示方法、装置、设备及存储介质
CN114006712A (zh) * 2020-08-13 2022-02-01 华为技术有限公司 一种获取验证码的方法、电子设备和系统
CN112637794B (zh) * 2020-12-16 2022-08-05 维沃移动通信有限公司 信息转发方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103399530A (zh) * 2013-07-01 2013-11-20 惠州Tcl家电集团有限公司 智能家电统一控制的方法、系统和管控平台以及控制终端
WO2015103954A1 (en) * 2014-01-09 2015-07-16 Tencent Technology (Shenzhen) Company Limited Information sharing method, information sharing apparatus, and electronic device
CN106130998A (zh) * 2016-06-30 2016-11-16 珠海市魅族科技有限公司 一种验证码传输方法及装置
CN110225040A (zh) * 2019-06-14 2019-09-10 维沃移动通信有限公司 一种信息处理方法、终端设备及服务器
CN111062026A (zh) * 2019-12-11 2020-04-24 维沃移动通信有限公司 一种验证信息共享方法及电子设备

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426962B (zh) * 2013-08-29 2019-11-15 腾讯科技(深圳)有限公司 多终端绑定的方法、绑定服务器、终端及系统
CN105306210B (zh) * 2014-08-01 2020-06-23 腾讯科技(深圳)有限公司 一种利用应用程序实现授权的方法、装置及系统
CN105429949B (zh) * 2015-10-28 2017-11-28 广东欧珀移动通信有限公司 密码的推送方法及推送系统
CN105743916A (zh) * 2016-04-03 2016-07-06 北京动石科技有限公司 一种增强访问安全的信息处理方法,系统及设备
CN106331073A (zh) * 2016-08-17 2017-01-11 北京小米移动软件有限公司 共享智能设备的方法和装置
CN106878153A (zh) * 2017-03-06 2017-06-20 宇龙计算机通信科技(深圳)有限公司 一种消息共享方法及装置和移动终端、服务器
CN109544807A (zh) * 2017-08-20 2019-03-29 凌子龙 智能充电宝共享系统及智能充电宝在共享流通过程中的身份识别方法和用户绑定方法(c)
CN108134773B (zh) * 2017-11-09 2023-10-24 珠海格力电器股份有限公司 共享设备绑定方法、装置、存储介质及服务器
CN109302415B (zh) * 2018-11-09 2019-11-01 四川虹微技术有限公司 一种认证方法、区块链节点及存储介质
CN109753784B (zh) * 2018-12-24 2021-07-30 维沃移动通信有限公司 一种基于多维码的授权方法、移动终端及服务器

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103399530A (zh) * 2013-07-01 2013-11-20 惠州Tcl家电集团有限公司 智能家电统一控制的方法、系统和管控平台以及控制终端
WO2015103954A1 (en) * 2014-01-09 2015-07-16 Tencent Technology (Shenzhen) Company Limited Information sharing method, information sharing apparatus, and electronic device
CN106130998A (zh) * 2016-06-30 2016-11-16 珠海市魅族科技有限公司 一种验证码传输方法及装置
CN110225040A (zh) * 2019-06-14 2019-09-10 维沃移动通信有限公司 一种信息处理方法、终端设备及服务器
CN111062026A (zh) * 2019-12-11 2020-04-24 维沃移动通信有限公司 一种验证信息共享方法及电子设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407427A (zh) * 2021-06-18 2021-09-17 北京小米移动软件有限公司 校验信息处理方法及装置、终端设备及存储介质

Also Published As

Publication number Publication date
CN111062026B (zh) 2022-06-17
CN111062026A (zh) 2020-04-24

Similar Documents

Publication Publication Date Title
WO2021115199A1 (zh) 验证信息共享方法及电子设备
US11057376B2 (en) Method, apparatus, and system for controlling intelligent device, and storage medium
WO2021098678A1 (zh) 投屏控制方法及电子设备
WO2017020630A1 (zh) 一种处理订单信息的方法、装置和系统
CN108256853B (zh) 一种支付方法和移动终端
WO2021136106A1 (zh) 群组创建方法、电子设备及服务器
CN110457888B (zh) 一种验证码输入方法、装置、电子设备及存储介质
WO2021190373A1 (zh) 一种交互方法、交互系统和显示设备
WO2020199987A1 (zh) 信息显示方法及移动终端
CN109376519B (zh) 一种指纹解锁方法及终端设备
WO2019206039A1 (zh) 未读消息处理方法及终端
WO2021078272A1 (zh) 显示方法及电子设备
WO2021115220A1 (zh) 信息共享方法、电子设备及计算机可读存储介质
WO2021104261A1 (zh) 付款码共享方法及电子设备
CN108156537B (zh) 一种移动终端的远程操作方法及移动终端
WO2020238453A1 (zh) 应用程序的处理方法及终端设备
CN110287719B (zh) 文件加密方法及移动终端
WO2021083086A1 (zh) 信息处理方法及设备
WO2021057243A1 (zh) 便签信息显示方法、便签信息发送方法及电子设备
WO2021017785A1 (zh) 数据传输方法及终端设备
WO2021083108A1 (zh) 文件压缩方法、文件解压方法和电子设备
CN111159738B (zh) 权限配置方法、应用登录方法及装置
CN111209031B (zh) 一种数据获取方法、装置、终端设备及存储介质
CN109446794B (zh) 一种密码输入方法及其移动终端
CN109753784B (zh) 一种基于多维码的授权方法、移动终端及服务器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20899578

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20899578

Country of ref document: EP

Kind code of ref document: A1