WO2024193160A1 - 一种登录流程的触发方法、装置、设备及介质 - Google Patents
一种登录流程的触发方法、装置、设备及介质 Download PDFInfo
- Publication number
- WO2024193160A1 WO2024193160A1 PCT/CN2023/141826 CN2023141826W WO2024193160A1 WO 2024193160 A1 WO2024193160 A1 WO 2024193160A1 CN 2023141826 W CN2023141826 W CN 2023141826W WO 2024193160 A1 WO2024193160 A1 WO 2024193160A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- login
- user account
- target application
- credential
- trusted
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 205
- 230000008569 process Effects 0.000 title claims abstract description 104
- 238000012795 verification Methods 0.000 claims description 100
- 238000012790 confirmation Methods 0.000 claims description 44
- 230000001960 triggered effect Effects 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 23
- 230000006870 function Effects 0.000 description 13
- 238000004590 computer program Methods 0.000 description 9
- 230000006872 improvement Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 7
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 4
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 3
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 3
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 3
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000006227 byproduct Substances 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229920001296 polysiloxane Polymers 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Definitions
- the present application relates to the field of computer technology, and in particular to a method, device, equipment and medium for triggering a login process.
- users may have multiple terminal devices and may need to switch to log in to the same account of the user on different terminal devices.
- the embodiments of the present specification provide a method, device, equipment and medium for triggering a login process to solve the problems of high operating cost and time consumption in existing login methods.
- a method for triggering a login process includes: obtaining a login request for logging into a target application sent by a first device; the login request includes a first login credential and a first device identifier of the first device; determining a second login credential corresponding to the first device identifier; the second login credential is a credential for logging into the user account of the target application by the first device after a trust relationship is established between the first device and the user account of the target application; determining whether the first login credential is consistent with the second login credential to obtain a first judgment result; if the first judgment result indicates that the first login credential is consistent with the second login credential, triggering a process for logging into the target application on the first device with the user account.
- a method for triggering a login process includes: a first device obtains a first operation of a user to open a target application; based on the first operation, a login page is displayed; the login page includes account information of a user account and a login operation control for indicating that the first device is used as a trusted device to log in to the target application using the user account; a second operation of the user on the login operation control is obtained; based on the second operation, a login request is generated for requesting to log in to the target application using the user account; the login request includes the first login credential and the first device identifier of the first device; and the login request is sent to a server so that the server triggers a process of logging in to the target application on the first device using the user account after the first login credential is verified.
- a method for setting a trusted device includes: a second device obtains a trusted device setting page containing device information of a historical login device sent by a server; the historical login device is a device that has logged in to a target application using a user account; the trusted device setting page is displayed; the trusted device setting page contains a first confirmation control; a first confirmation operation of the user on the first confirmation control is obtained; based on the first confirmation operation, a trusted device setting request is generated; the trusted device setting request includes a device identifier of the historical login device determined by the user to be set as a trusted device; the trusted device setting request is sent to the server so that the server generates a login credential corresponding to the trusted device; the login credential is a login credential used to log in to the target application using the user account.
- the embodiment of the present specification provides a triggering device for a login process, comprising: an information acquisition module, used to acquire a login request sent by a first device for logging into a target application; the login request includes a first login credential and the target application; A first device identifier of the first device; a credential determination module, used to determine a second login credential corresponding to the first device identifier; the second login credential is a credential for logging into the user account of the target application by the first device after the first device establishes a trust relationship with the user account of the target application; a judgment module, used to judge whether the first login credential is consistent with the second login credential, and obtain a first judgment result; a login process triggering module, used to trigger a process of logging into the target application on the first device with the user account if the first judgment result indicates that the first login credential is consistent with the second login credential.
- a triggering device for a login process includes: a first operation acquisition module, used to acquire a first operation of a user to open a target application; a page display module, used to display a login page based on the first operation; the login page includes account information of a user account and a login operation control used to indicate that the first device is used as a trusted device to log in to the target application using the user account; a second operation acquisition module, used to acquire a second operation of the user on the login operation control; a request generation module, used to generate a login request for requesting to log in to the target application using the user account based on the second operation; the login request includes the first login credential and the first device identifier of the first device; a request sending module, used to send the login request to a server, so that the server triggers the process of logging in to the target application on the first device with the user account after the first login credential is verified.
- An apparatus for setting a trusted device includes: a setting page acquisition module, used to acquire a trusted device setting page containing device information of a historical login device sent by a server; the historical login device is a device that has logged in to a target application using a user account; a setting page display module, used to display the trusted device setting page; the trusted device setting page contains a first confirmation control; a confirmation operation acquisition module, used to acquire a first confirmation operation of the user on the first confirmation control; a setting request generation module, used to generate a trusted device setting request based on the first confirmation operation; the trusted device setting request includes a device identifier of the historical login device determined by the user to be set as a trusted device; a setting request sending module, used to send the trusted device setting request to the server so that the server generates a login credential corresponding to a second identification; the login credential is a credential used to log in to the target application using the user account.
- a login process triggering device includes: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can: obtain a login request sent by a first device for logging into a target application; the login request includes a first login credential and a first device identifier of the first device; determine a second login credential corresponding to the first device identifier; the second login credential is a credential generated after a trust relationship is established between the first device and the user account of the target application and used for the first device to log in to the user account; determine whether the first login credential is consistent with the second login credential to obtain a first judgment result; if the first judgment result indicates that the first login credential is consistent with the second login credential, trigger the process of logging in to the target application on the first device with the user account.
- a login process triggering device includes: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can: obtain a first operation of a user to open a target application; based on the first operation, display a login page; the login page includes account information of a user account and a login operation control for indicating that the first device is used as a trusted device to log in to the target application using the user account; obtain a second operation of the user on the login operation control; based on the second operation, generate a login request for requesting to log in to the target application using the user account; the login request includes the first login credential and the first device identifier of the first device; send the login request to a server so that after the first login credential is verified, the server triggers a process of logging in to the target application on the first device using the user account.
- An embodiment of the present specification provides a device for setting a trusted device, comprising: at least one processor; and a memory connected to the at least one processor in communication; wherein the memory stores information that can be used by the at least one processor.
- Instructions executed by a processor the instructions are executed by the at least one processor so that the at least one processor can: obtain a trusted device setting page containing device information of a historical login device sent by a server; the historical login device is a device that has logged in to a target application using a user account; display the trusted device setting page; the trusted device setting page contains a first confirmation control; obtain a first confirmation operation of the user on the first confirmation control; based on the first confirmation operation, generate a trusted device setting request; the trusted device setting request includes a device identifier of the historical login device that is determined by the user to be set as a trusted device; send the trusted device setting request to the server so that the server generates a login credential corresponding to the trusted device; the login credential is a login credential used to log in
- a login request for logging into a target application sent by a first device includes a first login credential. If it is determined that the first login credential is consistent with a second login credential used to log into a user account on the first device, then a process of logging into the target application on the first device with the user account can be triggered.
- account verification information such as a password or verification code
- FIG1 is a schematic diagram of an overall solution flow chart of a method for triggering a login process in an embodiment of this specification
- FIG2 is a flow chart of a method for triggering a login process provided in an embodiment of this specification
- FIG3 is a schematic diagram of a trusted device setting page provided in an embodiment of this specification.
- FIG4 is a flow chart of a method for triggering a login process provided in an embodiment of this specification.
- FIG5 is a schematic diagram of a login page provided in an embodiment of this specification.
- FIG6 is a flow chart of a method for setting a trusted device provided in an embodiment of this specification.
- FIG7 is a swimlane diagram of a method for triggering a login process provided in an embodiment of this specification.
- FIG8 is a schematic diagram of the structure of a triggering device corresponding to a login process of FIG2 provided in an embodiment of this specification;
- FIG9 is a schematic diagram of the structure of a triggering device for a login process corresponding to FIG4 provided in an embodiment of this specification;
- FIG10 is a schematic diagram of a structure of an apparatus for setting a trusted device corresponding to FIG6 provided in an embodiment of this specification;
- FIG. 11 is a schematic diagram of the structure of a triggering device corresponding to a login process in FIG. 2 or FIG. 4 or a device for setting a trusted device corresponding to FIG. 6 provided in an embodiment of this specification.
- FIG1 is a schematic diagram of the overall scheme flow of a method for triggering a login process in an embodiment of the present specification.
- the scheme may include a first device 1 and a server 2, wherein the first device may be a device for logging into a target application.
- the first device may be a device for logging into a target application.
- a login page for logging into the target application through a user account may be displayed in the terminal page, and the page may also include a login control.
- the first device 1 may carry the first login credential in the login request and send it to the server 2, wherein the first login credential may be a credential for logging into the target application stored in the first device.
- the server 2 may obtain the first login credential contained in the login request, verify the credential, and allow the first device to log into the target application using the user account after the verification is passed. Among them, the server may determine the second login credential for the first device to log in to the user account generated after the first device establishes a trust relationship with the user account of the target application, and determine whether the first login credential is consistent with the second login credential. If consistent, it may be determined that the login request sent by the first device can be verified, and the first device may be allowed to log in to the target application using the user account.
- the password, verification code and other verification information input by the user in the related art can be replaced by the login credential.
- the method of logging in with the login credential does not require the user to input verification information, which can simplify user operations and improve login efficiency.
- Figure 2 is a flowchart of a method for triggering a login process provided in an embodiment of the specification. From a program perspective, the execution subject of the process can be a program or application client installed on an application server.
- the process may include the following steps 202 to 208 .
- Step 202 Obtain a login request sent by a first device for logging into a target application; the login request includes a first login credential and a first device identifier of the first device.
- Step 204 Determine a second login credential corresponding to the first device identifier; the second login credential is a credential used for the first device to log in to the user account after a trust relationship is established between the first device and the user account of the target application.
- the first login credential can be a login credential for logging into the target application stored locally on the first device;
- the second login credential can be a login credential corresponding to the first device stored on a server or in the cloud.
- the second login credential can be a credential generated for the first device for logging into the target application using the user account after the first device establishes a trust relationship with the user account of the target application, which can also be understood as setting the first device as a trusted device of the user account.
- the second login credential corresponds to the first device, and different devices correspond to different login credentials.
- the second login credential can only be used to log in to the target application using the user account in the first device.
- the credential after the login credential is generated for the first device, the credential can be saved on the server or in the cloud and can also be sent to the first device. In actual applications, if the first device is not attacked or has other security issues, the first login credential saved in the first device should be consistent with the second login credential determined by the server.
- the login credentials saved in the first device may be changed due to some unsafe factors
- the first login credential is used here to represent the login credentials saved in the first device that may be changed
- the second login credential is used to represent the login credentials corresponding to the first device that are not changed and saved in the server or the cloud, where the first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any actual order between these entities or operations.
- the login credential may be a string containing specific characters.
- the server may extract the first login credential contained in the login request based on the specific characters.
- the first device identifier of the first device may be a unique identifier of the first device.
- the identifier may be used by the server to distinguish different devices.
- Step 206 Determine whether the first login credential is consistent with the second login credential, and obtain a first determination result.
- Step 208 If the first determination result indicates that the first login credential is consistent with the second login credential, a process of logging in to the target application on the first device with the user account is triggered.
- the first login credential can indicate that the login request sent by the first device has been verified, and the first device can be allowed to log in to the target application using the user account.
- the server can trigger the process of the user account logging in to the target application on the first device. Specifically, it can send a prompt message indicating a successful login to the first device, or send a certain page in the target application after the user account is used to log in to the target application, such as the homepage, the page that the user last browsed, etc., and the first device can display the corresponding page content.
- the first login credential is inconsistent with the second login credential, it can indicate that the login method of the first device logging in to the target application through the login credential cannot be verified.
- a prompt message indicating a trusted login failure can be sent to the first device, and a verification login page by entering verification information such as a password and a verification code can also be sent to the first device, so that the first device can log in to the target application based on the verification information provided by the user.
- the target application can be understood as a terminal application that can be logged in by the first device.
- the user account can be the login account determined when the user registers as a user of the target application. It can be an email number, mobile phone number, user ID number, etc., or it can be custom characters that meet the login requirements of the target application, etc. The specific form is not limited here.
- the login request for logging into the target application sent by the first device includes a first login credential. If it is determined that the first login credential is consistent with the second login credential used to log in to the user account of the first device, then the process of logging in to the target application on the first device with the user account can be triggered. Therefore, when the user logs in to the target application in the first device, there is no need for the user to enter account verification information such as a password and a verification code, which can reduce user operations and login time, thereby improving the convenience of login.
- it may also include: determining whether the first login credential is within the validity period of the first login credential, and obtaining a second judgment result.
- the above-mentioned process of triggering the login of the target application on the first device with the user account may specifically include: if the second judgment result indicates that the first login credential is within the validity period of the first login credential, then triggering the process of logging in the target application on the first device with the user account.
- the first login credential sent by the first device may include the generation time of the first login credential
- the above-mentioned determination of whether the first login credential is within the validity period of the first login credential may include: determining whether the time difference between the generation time of the first login credential and the time when the login request is obtained is less than or equal to a preset threshold. If the time difference between the generation time of the first login credential and the time when the login request is obtained is less than or equal to the preset threshold, it can be indicated that the first login credential is within the validity period.
- determining whether the login credentials are valid can also be performed by the first device.
- the login request sent by the first device can be generated based on the login operation performed by the user on the first device. After the first device obtains the user's login operation, it can determine whether the time difference between the generation time of the first login credential and the time when the user operation is obtained is less than or equal to the preset threshold. If the time difference between the generation time of the first login credential and the time when the user operation is obtained is less than or equal to the preset threshold, it can be determined that the first login credential is within the validity period, and a login request can be sent to the server.
- the first device can display a page for the user to enter verification information, so as to send a verification login request to the server based on the verification information provided by the user. After the verification is successful, the first device can send a verification request to the server. After that, the first device can log in to the target application using the user account.
- the verification of the login request sent by the first device is passed by judging the validity period of the second login credential.
- the time difference between the generation time of the second login credential and the time when the login request is obtained is equal to or equal to a preset threshold. If the time difference is less than or equal to the preset threshold, it can be determined that the second login credential is within the validity period. If the second login credential is within the validity period, the second login credential can be used to verify the login request sent by the first device.
- the above-mentioned preset threshold can be set according to actual needs, for example, 10 days, 20 days, 30 days, etc., and the specific threshold is not specifically limited here.
- the login credential may also include time information indicating the validity period of the login credential, such as the start time and end time of the validity period of the login credential.
- whether the login credential is valid may also be determined based on the time information of the validity period.
- the first device may determine whether the time when the user login is obtained is within the validity period between the start time and end time of the validity period of the first login credential
- the server may also determine whether the time when the login request is obtained is within the validity period between the start time and end time of the validity period of the second login credential.
- a specific determination method may be set according to actual needs, and no specific limitation is made here.
- the login credentials generated by the server for the device may also include the device identification of the device.
- the method may also include: parsing the first login credentials to obtain the second device identification included in the first login credentials; determining whether the second device identification is consistent with the first device identification to obtain a third judgment result.
- the determining of the second login credential corresponding to the first device identifier may specifically include: if the third judgment result indicates that the second device identifier is consistent with the first device identifier, searching for the second login credential corresponding to the first device identifier.
- the server can terminate the request sent to the first device to log in to the target application through the login credentials, and can send information indicating that the trusted login failed to the first device, or send a verification login page to the first device.
- the number of trusted logins can also be set. For example, the number of times a user account is allowed to log in to the target application by trusted login is 10 times in one day. For example, the number of times a user account is allowed to log in to the target application by trusted login is 20 times in a week. If the number exceeds this number, the user needs to log in by entering a password, verification code, and other verification information.
- the method in the embodiment of this specification may also include: based on the user account, judging whether the number of times the target application logs in to the user account by means of login credentials within a preset time period before obtaining the login request sent by the first device is greater than or equal to the preset number; if it is less than the preset number, the verification process for the first login credential can be executed, such as the above steps 204 to 208. If the number of times the target application logs in to the user account by means of login credentials within the preset time period is greater than or equal to the preset number, the processing of the login request can be terminated, it can be determined that the current trusted login fails, and a reminder message can be sent to the first device, or a verification login page can be sent to the first device.
- the preset number of times may indicate the total number of times different devices are allowed to log in to the user account by means of login credentials; a single device may be used as a dimension to indicate the number of times the same device is allowed to log in to the user account by means of login credentials.
- the judgment process of whether the preset number of times is exceeded can also be executed in the first device.
- the first device can count the number of times the device has logged in to the target application using the user account by means of login credentials within the preset time period, and can judge whether the number of times the first device has logged in to the target application using the user account by means of login credentials within the preset time period is greater than or equal to the preset number of times.
- the first device may no longer be allowed to log in to the user account by means of trusted login, and a page for verifying the login may be displayed; if the number of times the first device has logged in to the target application using the user account by means of login credentials within the preset time period is less than the preset number of times, then the page for verifying the login may be displayed.
- the login page for trusted login is displayed.
- the user can set up a trusted device in the device according to actual needs, and the device determined as a trusted device can quickly log in to the target application by means of login credentials.
- it can also include: acquiring device information of the historical login device that has used the user account to log in to the target application; the historical login device includes the first device; generating a trusted device setting page containing the device information of the historical login device; the device information includes at least one of the device model and the device custom name; sending the trusted device setting page to the second device; the second device is a device that is in a login state of logging in to the target application using the user account before the first device sends the login request; acquiring the trusted device setting request sent by the second device based on the trusted device setting page; the trusted device setting request includes the device identification of the first device; based on the device identification of the first device, determining the first
- FIG3 is a schematic diagram of a trusted device setting page provided in an embodiment of the present specification.
- the page may be a setting page displayed in the second device.
- the page may include device information of each historical login device, which may be the model, code, etc. of the device, or a name defined by the user.
- "someone's A device”, “someone's B device”, and “someone's C device” may be device names set by the user.
- the setting function of the terminal application may include the setting of the device name, and the server may obtain the user-defined device name.
- the page may include a first confirmation control 301 for confirming a trusted device, such as a “confirm to turn on” control.
- the second device may send a trusted device setting request to the server, and the trusted device setting request may include the device identification of the first device confirmed by the user as a trusted device.
- the page may also include a selection control 302 for selecting a device. When the control is in a selected state, it can be considered that the user confirms that the selected device is set as a trusted device.
- the second device may generate a trusted device setting request based on the state of the selection control, and the request may include the device identification of each selected device. The user may select one or more devices as the devices set as trusted devices.
- the server After the server obtains the trusted device setting request sent by the second device, it may determine the corresponding device as a trusted device with the permission to log in to the user account in the target application using the login credentials using the device identification contained in the request. For example, a corresponding trusted device list may be generated for the user account and the target application.
- the trusted device determination page may also include the device information of the second device, such as "someone's A device” as shown in Figure 3.
- the page may include a status identifier of a device in a logged-in state, such as "current" as shown in Figure 3, which may indicate that "someone's A device” is the device that currently uses the user account to log in to the target application, and other unmarked devices may be devices that have logged in to the user account before device A logged in to the user account.
- the method in the embodiment of this specification may further include: determining the second device as the trusted device. Specifically, the device identification of the second device may be saved in a trusted device list.
- the first device and the second device may be the same device or different devices.
- the server can generate login credentials for each trusted device.
- the login credentials are corresponding to the device, and different devices correspond to different login credentials.
- it can also include: generating the second login credential corresponding to the first device based on the device identification of the first device; sending the second login credential to the first device; and saving the corresponding relationship between the second login credential and the first device.
- the server can save the second login credential and the corresponding relationship between the second login credential and the first device.
- the second login credential, the first device and the user account have a corresponding relationship.
- each trusted device and the login credentials corresponding to the device can be maintained in the trusted device list.
- the above information can be saved to the server, or it can be saved in the cloud, or it can be saved in the blockchain system.
- the server can also send the generated second login credential to the first device so that the first device can log in based on the login credential.
- the second device may also include: generating the third login credential corresponding to the second device based on the device identification of the second device; sending the third login credential to the second device; and saving the correspondence between the third login credential and the second device.
- the server can save the third login credential and the correspondence between the third login credential and the second device.
- the third login credential, the second device and the user account have a correspondence, and the correspondence can be saved in a trusted device list. It can also be saved to a storage space such as a server, a cloud, a blockchain system, etc.
- the server can also send the generated third login credential to the second device so that the second device can log in based on the login credential.
- the user can set up a trusted device in the second device. It can be understood that when setting up the trusted device, the second device is in the logged-in state. After the trusted device is set up, the server can send the generated login credentials for the second device to the second device.
- the user's verification information may also be collected, and the device determined by the user can be determined as a trusted device only after the verification is passed.
- it may also include: obtaining the first information to be verified sent by the second device; judging whether the first information to be verified is consistent with the first preset verification information, and obtaining a fourth judgment result;
- the first preset verification information includes at least one of registration verification information and identity authentication information;
- the registration verification information is the verification information provided by the user when registering the target application with the user account;
- the identity authentication information is the identity information provided by the user during the user authentication process based on the user account;
- determining the first device as a trusted device may specifically include: if the fourth judgment result indicates that the first information to be verified is consistent with the first preset verification information, then determining the first device as a trusted device.
- the second device may also display a page for obtaining the first information to be verified provided by the user.
- the second device may display a page prompting the user to enter an account password and a verification code, or may display a user identity information collection page, such as a page for collecting user face, fingerprint, iris, and other information.
- the first information to be verified may include information indicating the user's identity, such as face, fingerprint, iris, etc., and may also include information that can verify the account, such as account password, verification code, etc.
- the specific verification information is not specifically limited here and can be set according to actual needs.
- the server after the server obtains the trusted device setting request sent by the second device, it can send a verification information acquisition request to the second device so that the second device displays an information collection page to obtain the verification information provided by the user.
- the second device can also actively display a page for obtaining verification information. For example, after obtaining the user's confirmation operation on the trusted device, it can display a page for obtaining the first information to be verified provided by the user.
- the second device can generate a trusted device setting request based on the obtained first information to be verified and the device identifier of the trusted device selected by the user and send it to the server.
- the first information to be verified can also be combined with the trusted device setting request.
- the configuration requests are sent to the server respectively, and the specific sending form is not limited here.
- the server After the server obtains the first information to be verified provided by the user, it can compare the first information to be verified with the first preset verification information of the user account stored in advance to determine the consistency between the two. If the first information to be verified is consistent with the first preset verification information, it can indicate that the setting of the trusted device is approved by the user, and the server can determine the device for which the setting request is made as a trusted device.
- the first preset verification information may include the registration verification information provided by the user when registering the target application with the user account, such as a login password, etc.; it may also include the identity information provided by the user during the user authentication process based on the user account, such as the face, iris, fingerprint and other biometric information that can represent the user's identity determined during the real-name authentication process, or the information in the identity document provided by the user.
- the specific information to be verified and the corresponding preset verification information can be set according to actual needs and are not specifically limited here.
- the settings page may also include terms for users to understand trusted devices and trusted login services. After the user understands the terms, he or she may check the corresponding terms, which indicates that the user has authorized the server to obtain the user information required to execute the trusted login process.
- judging whether two pieces of information are consistent can be understood as whether the similarity between the two pieces of information is greater than or equal to a preset threshold.
- the similarity is greater than or equal to the preset threshold, the two pieces of information can be considered similar.
- the first device after the first device is determined as a trusted device, the first device needs to log in to the target application through verification, and then obtain the second login credentials sent by the server so that the first device can log in using the login credentials in subsequent login processes.
- the second login credential before sending the second login credential to the first device as described in the embodiment of this specification, it may also include: obtaining a verification login request sent by the first device, the verification login request including account information of the user account and second information to be verified provided by the user in the first device; judging whether the second information to be verified is consistent with the second preset verification information, and obtaining a fifth judgment result;
- the second preset verification information includes at least one of registration verification information and identity authentication information;
- the registration verification information is the verification information provided by the user when registering the target application with the user account;
- the identity authentication information is the identity information provided by the user during user authentication based on the user account; if the fifth judgment result indicates that the second information to be verified is consistent with the second preset verification information, the first device is allowed to log in to the target application using the user account; sending the second login credential to the first device specifically includes: when the first device is in a login state of using the target account to log in to the target application, sending the second login credential to the first device
- the account information may include account name, email address, mobile phone number, etc.
- the second information to be verified may be account information such as account password, verification code, etc., or user biometric information such as user face and fingerprint.
- the specific verification process may be similar to the above, and will not be repeated here.
- the number of times the same login credential in the embodiments of this specification is used may be limited. After the number of uses reaches a preset number, the login credential may be determined to be invalid. When the login credential is used again subsequently, it cannot be verified, that is, the login credential can no longer be used to execute a trusted login process that does not require entering a password, verification code, and other information.
- the login credential in the embodiment of this specification may be a credential that can be used once.
- the server triggers the process of logging in to the target application on the first device with the user account, the correspondence between the second login credential and the first device may be deleted, and the second login credential may be determined as an invalid credential.
- the server can also generate a new credential so that the device can subsequently use the new credential to log in to the user account through trusted login.
- the method in the embodiment of this specification can also include: generating a fourth login credential based on the device identification of the first device; saving the corresponding relationship between the fourth login credential and the first device; and sending the fourth login credential to the first device.
- the server can delete or mark the second login credential used for this login as invalid, and can also generate a fourth login credential for the first device.
- the fourth login credential is sent to the first device.
- the first login credential, the second login credential, the third login credential and the fourth login credential are named for the purpose of clearly explaining the different names of the methods provided in the embodiments of this specification.
- the composition, generation and use of each login credential may be similar, and the above description may be used for reference.
- the login experience of multi-device users can be greatly improved by cyclically issuing copy-proof one-time login credentials on trusted devices.
- the same user account can be used in one device at the same time. After logging in to the first device, the other devices will be logged out.
- the above-mentioned triggering process of logging in to the target application on the first device with the user account in the embodiment of this specification it can also include: canceling the login status of the user account in other devices.
- a reminder message for prompting the user to set up a trusted device may also be sent to the user's device.
- the method in the embodiments of this specification may also include: determining whether the user account has logged into multiple devices within a preset time period, and obtaining a fifth judgment result; if the fifth judgment result indicates that the user account has logged into multiple devices within the preset time period, a reminder message for prompting the user to set up a trusted device is sent to at least one of the multiple devices; the trusted device is used to represent a device that has the authority to log in to the user account in the target application using the login credentials.
- the reminder message may include a control for pointing to a setting page for setting up a trusted device in the target application.
- FIG. 4 is a flowchart of a method for triggering a login process provided in the embodiments of this specification. As shown in Figure 4, the method may include steps 402 to 410.
- Step 404 Based on the first operation, a login page is displayed; the login page includes account information of the user account and a login operation control for indicating that the first device is used as a trusted device to log in to the target application using the user account.
- Fig. 5 is a schematic diagram of a login page provided in an embodiment of the present specification.
- the login page may include account information 501 of a user account, and may also include a login operation control 502 for logging into the user account.
- page information such as page content, layout, and description information of controls may be set according to actual needs, and are not specifically limited here.
- Step 406 Obtain the second operation of the user on the login operation control.
- Step 408 Based on the second operation, a login request is generated for requesting to log in to the target application using the user account; the login request includes the first login credential and the first device identifier of the first device.
- the user can click the login operation control 502, and the first device can generate a login request based on the user's second operation and send it to the server.
- the login request may include the account information of the user account, and may also include the first login credential existing in the first device and the device identification of the first device.
- Step 410 Send the login request to the server, so that the server triggers a process of logging in to the target application on the first device with the user account after the first login credential is verified.
- the server can verify the login request sent by the first device.
- the specific verification method can refer to the triggering method of the login process described above with the server as the execution subject, which will not be repeated here.
- the first device can use the user account to log in to the target application.
- the user account can be logged in through the login credentials existing in the device, without the user entering verification information such as a password and verification code, which can simplify user operations and improve login efficiency.
- the login credential may have an expiration date, such as 10 days or 30 days.
- the first login credential stored in the first device may include the expiration date information of the credential.
- the method may further include: obtaining the first login credential stored in the first device based on the first operation; determining whether the first login credential is within the expiration date of the first login credential; and displaying the login page may specifically include: if the first login credential is within the expiration date, displaying the login page.
- a verification information login page may be displayed.
- the user may enter verification information such as an account password, a verification code, and identity information on the verification information login page.
- the first device may also use the user account to log in to the target application.
- the method of logging in to the target application through the verification information login page may be the same as or similar to the existing login method.
- the maximum number of times the user account can use the login credentials for trusted login can also be set, for example, 10 times in one day.
- the first device displays the login page, it can also determine whether the cumulative number of times the user account has logged in using the trusted login method within a preset time period exceeds the preset number. If it does not exceed, the login page can be displayed, and if it has exceeded, the login page for verifying the login can be displayed.
- users usually do not frequently log in to the same user account in the same device or different devices in a relatively short period of time.
- the login credential may be a credential generated by the server for the device after the server determines that the device is a trusted device and can be used to log in to the target application using a user account.
- the login credential before the above-mentioned generation of a login request for requesting to log in to the target application using the user account, it may also include: obtaining a second login credential sent by the server; the second login credential is a login credential generated by the server corresponding to the first device after the first device is determined to be a trusted device and used to log in to the target application using the user account; the trusted device is used to represent a device that has the authority to log in to the user account in the target application using the login credential.
- the first device accurately receives the second login credential sent by the server and is safe during the period of storing the credential, that is, after the second login credential is obtained in the first device, the credential is not changed, and the first login credential included in the login request generated by the first device and the second login credential sent by the server to the first device can be the same. If the first device has a security problem or the login credential stored in the first device has been maliciously operated, the first login credential stored in the first device may change and be inconsistent with the second login credential sent by the server to the first device.
- Step 602 The second device obtains a trusted device setting page sent by the server that contains device information of a historically logged-in device; the historically logged-in device is a device that has logged into the target application using a user account.
- the second device may be a device in a login state using a user account to log in to a target application. After the second device logs in to the target application using a user account, it may enter a trusted device settings page, which may include device information of historically logged-in devices, such as device name, model, and other information.
- the target application may include a setting item for setting the target application
- setting the trusted device may be an item in the application settings.
- the specific path can be set according to the actual needs of the application.
- Step 604 Display the trusted device setting page; the trusted device setting page includes a first confirmation control.
- Step 606 Obtain a first confirmation operation of the user on the first confirmation control.
- Step 608 Based on the first confirmation operation, a trusted device setting request is generated; the trusted device setting request includes a device identifier of the historical login device that is determined by the user to be set as a trusted device.
- Step 610 Send a trusted device setting request to the server so that the server generates a login credential corresponding to the device determined by the user to be set as a trusted device for logging into the target application using the user account.
- the page may include a first confirmation control 301.
- the second device may obtain the user's first confirmation operation on the first confirmation control, and generate a trusted device setting request and send it to the server.
- the user may select one or more devices to be set as trusted devices, and the trusted device setting request may include the device identification of each device selected by the user, so that the server can determine the trusted device and generate login credentials for the trusted device.
- the user's verification information can also be collected during the process of setting the trusted device. After the verification is passed, the device selected by the user can be determined as a trusted device. After sending the trusted device setting request to the server, it can also include: displaying an information acquisition page; based on the information acquisition page, obtaining the first information to be verified provided by the user; sending the first information to be verified to the server, so that the server determines the device set as a trusted device by the user as a trusted device after the first information to be verified is verified.
- the information acquisition page can be a page for users to input verification information, or it can be a page for collecting user biometric information. It can be set according to actual needs and is not specifically limited here.
- the second device that performs the trusted device setting in the embodiment of this specification may also be used as a trusted device, and the server may also generate a login credential for the second device.
- the device determined by the user to be set as a trusted device in the embodiment of this specification may include the second device, and the above method may also include: obtaining a third login credential sent by the server; the third login credential is a login credential corresponding to the second device generated by the server based on the device identification of the second device after the second device is determined as a trusted device.
- the set trusted device after completing the setting of the trusted device in the second device, the set trusted device can also be canceled.
- the path to cancel the setting can be the same as the path to confirm the setting.
- the setting page can display a control for canceling the setting.
- the "Confirm to Enable" control shown in Figure 3 can be changed to "Confirm to Cancel”.
- the second device can send a cancellation request to the server for the device selected to cancel the trust setting.
- the server can delete the device from the trusted device list based on the request.
- the device needs to log in to the target application by entering verification information.
- the server may obtain a request sent by the second device for de-trusting the device.
- the request may include the device identifier of the trusted device whose trust relationship is to be terminated, and then based on the request, the corresponding relationship between the device and the user account may be deleted, the device may be deleted from the trusted device list, or the login credentials corresponding to the device may be deleted.
- any device among the trusted devices corresponding to the user account can display the information of the associated trusted device. For example, if the user completes the setting of the trusted device in the second device, after logging into the user account in the first device, the information of the trusted device can also be displayed in the setting page of the target application of the first device. The user can subsequently perform editing operations such as deletion and addition on the set trusted devices in the first device or in the second device. In the process of editing the trusted device, the user can also perform editing operations or save the result information after the user's editing only after passing the verification.
- Figure 7 is a swim lane diagram of a triggering method of the login process provided in the embodiment of this specification. As shown in Figure 7, the scheme may include a device setting stage and a login stage, specifically including steps 702 to 728.
- Step 702 After the second device logs in to the target application using a user account, the user can enter a setting page for setting a trusted device according to a preset path, and the trusted device setting page can be displayed in the second device.
- Step 704 the user can select a trusted device on the page and can also perform a determination operation.
- the second device can generate a trusted device setting request based on the user's operation on the page and send the request to the server.
- Step 706 The server obtains the trusted device setting request sent by the second device, determines the trusted device according to the device identifier contained in the request, and can also generate corresponding login credentials for each trusted device. Assuming that the trusted device includes the first device and the second device, the server can generate a second login credential corresponding to the first device and send it to the first device, and can also generate a third login credential corresponding to the second device and send it to the second device.
- Step 708 The second device may obtain the third login credential sent by the server, so that the second device may log in to the user account based on the login credential after logging out of the user account.
- Step 710 The first device may also obtain the second login credential sent by the server. After the first device is determined as a trusted device, the first device needs to log in to the target application using a user account through verification, and then the first device may obtain the second login credential sent by the server.
- Step 712 Assuming that the first device logs out of the user account after obtaining the second login credential, and then uses the user account to log in to the target application again, the first device can obtain the user's operation of opening the target application and determine whether the local first login credential is valid.
- the first login credential can be understood as the login credential saved locally on the device after obtaining the second login credential sent by the server.
- Step 714 If the first login credential is valid, a trusted login page may be displayed.
- the page may include a login control, and a login request including the first login credential may be generated based on the user's operation on the control and sent to the server.
- Step 716 If the first login credential is invalid, the login verification process may be executed, and a login verification page may be displayed, in which the user may enter verification information such as a password, verification code, or biometric information.
- verification information such as a password, verification code, or biometric information.
- Step 718 After the server obtains the login request sent by the first device, it can determine whether the first login credential contained in the request is consistent with the second login credential.
- Step 720 If the first login credential is consistent with the second login credential, a process of logging into the target application on the first device with the user account may be triggered, and the state of the first device may be determined as a logged-in state.
- Step 722 The server may also determine that the second login credential is in an invalid state, for example, the second login credential may be deleted, or a new login credential may be generated for the first device and sent to the first device.
- Step 724 The first device may display the application page corresponding to the target application after logging into the user account, such as the homepage of the application, the page that the user last browsed using the user account, etc. It may also receive the The new login credentials may also invalidate the previously saved first login credentials, for example, the first login credentials may be deleted.
- Step 726 If the first login credential is inconsistent with the second login credential, the trusted login process may be terminated, and a prompt message indicating that the trusted login failed is generated and fed back to the first device.
- Step 728 The first device may receive the prompt information fed back by the server.
- the first device may also display a login verification page so that the user can log in to the user account by providing verification information.
- the second device is in the login state of the user account. After the first device logs in to the user account, the second device will be kicked out. One user account is allowed to be logged in and used on one device at the same time. Assume that the user wants to use the second device to log in to the user account again. Since the third login credential has been obtained in the second device, the login credential saved in the second device can be used to log in to the user account in a similar manner to the above. In addition, after the second device initiates a login request using the saved login credential, it can also invalidate the used login credential and obtain the new login credential generated and sent by the server. The specific process will not be described in detail here.
- the user when the user needs to switch to log in the same user account in different devices, the user can log in with trust through the login credentials, without the need for the user to enter the account password, verification code and other verification information each time, which can improve convenience.
- the user account since the user account is logged in by means of login credentials, the user does not need to provide verification information for login each time, so that devices that do not have the function of obtaining verification information can also log in to the user account. For example, assuming that the user account is used to log in to the target application in accordance with the verification method, it is necessary to collect the user's face and other biometric information, that is, the device currently used needs to have the function of collecting biometrics, such as a camera.
- the device does not have a camera, it will not be able to log in to the device.
- the method in the embodiments of this specification does not require the user to provide verification information, the user account can be logged in to the device even if the device does not have a camera.
- FIG. 8 is a schematic diagram of the structure of a trigger device for a login process corresponding to Figure 2 provided in the embodiments of this specification.
- the device may include: an information acquisition module 802, used to obtain a login request sent by a first device for logging into a target application; the login request contains a first login credential and a first device identifier of the first device; a credential determination module 804, used to determine a second login credential corresponding to the first device identifier; the second login credential is a credential generated after the first device and the user account of the target application establish a trust relationship and is used for the first device to log in to the user account; a judgment module 806, used to judge whether the first login credential is consistent with the second login credential, and obtain a first judgment result; a login process triggering module 808, used to trigger the process of logging in to the target application on the first device with the user account if the first
- Figure 9 is a structural schematic diagram of a trigger device for a login process corresponding to Figure 4 provided in the embodiment of this specification.
- the device may include: a first operation acquisition module 902, used to obtain the first operation of the user to open the target application; a page display module 904, used to display a login page based on the first operation; the login page includes the account information of the user account and a login operation control for indicating that the first device is used as a trusted device to log in to the target application using the user account; a second operation acquisition module 906, used to obtain the user's second operation on the login operation control; a request generation module 908, used to generate a login request for requesting to log in to the target application using the user account based on the second operation; the login request contains the first login credential and the first device identifier of the first device; a request sending module 910, used to send the login request to the server, so that after the first login cred
- a request sending module 910 used to send the login request to the server, so that after the first login
- Figure 10 is a schematic diagram of the structure of a device for setting a trusted device corresponding to Figure 6 provided in the embodiment of this specification.
- the device may include: a setting page acquisition module 1002, which is used to obtain a trusted device setting page containing device information of a historical login device sent by the server; the historical login device is a device that has logged in to the target application using a user account.
- a setting page display module 1004 used to display the trusted device setting page; the trusted device setting page includes a first confirmation control; a confirmation operation acquisition module 1006, used to obtain the user's first confirmation operation on the first confirmation control; a setting request generation module 1008, used to generate a trusted device setting request based on the first confirmation operation; the trusted device setting request includes the device identifier of the historical login device determined by the user to be set as a trusted device; a setting request sending module 1010, used to send the trusted device setting request to the server, so that the server generates a login credential corresponding to the trusted device; the login credential is a credential used to log in to the target application using the user account.
- the embodiments of this specification also provide a device corresponding to the above method.
- FIG11 is a schematic diagram of a triggering device for a login process in FIG2 or FIG4 or a device for setting a trusted device in FIG6 according to an embodiment of the present specification.
- the device 1100 may include: at least one processor 1110; and a memory 1130 in communication with the at least one processor; wherein, corresponding to the triggering method of a login process shown in FIG2, the memory 1130 stores instructions 1120 executable by the at least one processor 1110, and the instructions are executed by the at least one processor 1110 so that the at least one processor 1110 can: obtain a login request for logging in to a target application sent by a first device; the login request includes a first login credential and a first device identifier of the first device; determine a second login credential corresponding to the first device identifier; the second login credential is a credential generated after the first device establishes a trust relationship with the user account of the target application and used for the first device to log in to the user account; determine whether the first login credential
- the memory 1130 stores instructions 1120 that can be executed by the at least one processor 1110, and the instructions are executed by the at least one processor 1110 so that the at least one processor 1110 can: obtain a first operation of the user to open the target application; based on the first operation, display a login page; the login page includes account information of the user account and a login operation control for indicating that the first device is used as a trusted device to log in to the target application using the user account; obtain a second operation of the user on the login operation control; based on the second operation, generate a login request for requesting to log in to the target application using the user account; the login request includes the first login credential and the first device identifier of the first device; send the login request to the server, so that after the first login credential is verified, the server triggers the process of logging in to the target application on the first device with the user account.
- the memory 1130 stores instructions 1120 that can be executed by the at least one processor 1110, and the instructions are executed by the at least one processor 1110 so that the at least one processor 1110 can: the second device obtains a trusted device setting page containing device information of a historical login device sent by the server; the historical login device is a device that has logged in to the target application using a user account; the trusted device setting page is displayed; the trusted device setting page contains a first confirmation control; the user's first confirmation operation on the first confirmation control is obtained; based on the first confirmation operation, a trusted device setting request is generated; the trusted device setting request includes the device identifier of the historical login device determined by the user to be set as a trusted device; the trusted device setting request is sent to the server so that the server generates login credentials corresponding to the trust information; the login credentials are credentials used to log in to the target application using the user account.
- the embodiment of this specification also provides a computer-readable medium corresponding to the above method.
- the computer-readable medium stores computer-readable instructions, which can be executed by a processor to implement the above login process triggering method or the method of setting a trusted device.
- a programmable logic device such as a field programmable gate array (FPGA)
- FPGA field programmable gate array
- HDL Hardware Description Language
- HDL Very-High-Speed Integrated Circuit Hardware Description Language
- ABEL Advanced Boolean Expression Language
- AHDL Altera Hardware Description Language
- HDCal Joint CHDL
- JHDL Java Hardware Description Language
- Lava Lava
- Lola MyHDL
- PALASM RHDL
- VHDL Very-High-Speed Integrated Circuit Hardware Description Language
- Verilog Verilog
- the controller may be implemented in any suitable manner, for example, the controller may take the form of a microprocessor or processor and a computer readable medium storing a computer readable program code (e.g., software or firmware) executable by the (micro)processor, a logic gate, a switch, an application specific integrated circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, and the memory controller may also be implemented as part of the control logic of the memory.
- a computer readable program code e.g., software or firmware
- the controller may be implemented in the form of a logic gate, a switch, an application specific integrated circuit, a programmable logic controller, and an embedded microcontroller by logically programming the method steps. Therefore, such a controller may be considered as a hardware component, and the means for implementing various functions included therein may also be considered as a structure within the hardware component. Or even, the means for implementing various functions may be considered as both a software module for implementing the method and a structure within the hardware component.
- a typical implementation device is a computer.
- the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
- the embodiments of the present application may be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment in combination with software and hardware. Moreover, the present application may adopt the form of a computer program product implemented in one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) that contain computer-usable program code.
- a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer-readable memory produce a manufactured product including an instruction device that implements the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
- These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
- a computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory.
- the memory may include non-permanent storage in a computer-readable medium, random access memory (RAM) and/or non-volatile memory in the form of read-only memory (ROM) or flash memory (flash RAM).
- RAM random access memory
- ROM read-only memory
- flash RAM flash memory
- Computer readable media include permanent and non-permanent, removable and non-removable media that can be implemented by any method or technology to store information.
- Information can be computer readable instructions, data structures, program modules or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disk read-only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic disk storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by a computing device.
- computer readable media does not include temporary computer readable media (transitory media), such as modulated data signals and carrier waves.
- the embodiments of the present application may be provided as methods, systems or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment or an embodiment in combination with software and hardware.
- the present application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) that contain computer-usable program code.
- the present application may be described in the general context of computer-executable instructions executed by a computer, such as program modules.
- program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
- the present application may also be practiced in distributed computing environments where tasks are performed by remote processing devices connected through a communication network.
- program modules may be located in local and remote computer storage media, including storage devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本说明书实施例公开了一种登录流程的触发方法、装置、设备及介质。方案包括:获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所述第一设备的第一设备标识;确定所述第一设备标识对应的第二登录凭证;所述第二登录凭证为所述第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证;判断所述第一登录凭证与所述第二登录凭证是否一致,得到第一判断结果;若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
Description
本申请涉及计算机技术领域,尤其涉及一种登录流程的触发方法、装置、设备及介质。
随着计算机技术的发展以及人们生活的需求,用户可能拥有多个终端设备,可能需要在不同的终端设备中切换登录用户的同一账号,针对有需要频繁地在自己常用多个设备上切换登录账号的用户,用户每次都会需要进行登录核验,例如通过输入密码或验证短信等方式登录,操作成本和耗时都较高。
因此,需要提供一种可以更便捷的登录账号的方法。
发明内容
本说明书实施例提供一种登录流程的触发方法、装置、设备及介质,以解决现有的登录方法存在的操作成本以及耗时较高的问题。
为解决上述技术问题,本说明书实施例是这样实现的。
本说明书实施例提供的一种登录流程的触发方法,包括:获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所述第一设备的第一设备标识;确定所述第一设备标识对应的第二登录凭证;所述第二登录凭证为所述第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证;判断所述第一登录凭证与所述第二登录凭证是否一致,得到第一判断结果;若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
本说明书实施例提供的一种登录流程的触发方法,包括:第一设备获取用户开启目标应用的第一操作;基于所述第一操作,显示登录页面;所述登录页面包括用户账号的账号信息以及用于表示将所述第一设备作为信任设备采用所述用户账号登录所述目标应用的登录操作控件;获取用户对所述登录操作控件的第二操作;基于所述第二操作,生成用于请求采用所述用户账号登录所述目标应用的登录请求;所述登录请求中包含所述第一登录凭证和所述第一设备的第一设备标识;发送所述登录请求至服务器,以便在所述第一登录凭证通过验证后所述服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
本说明书实施例提供的一种设置信任设备的方法,包括:第二设备获取服务器发送的包含历史登录设备的设备信息的信任设备设置页面;所述历史登录设备为采用用户账号登录过目标应用的设备;显示所述信任设备设置页面;所述信任设备设置页面中包含第一确认控件;获取用户对所述第一确认控件的第一确认操作;基于所述第一确认操作,生成信任设备设置请求;所述信任设备设置请求中包括所述历史登录设备中被用户确定设置为信任设备的设备标识;发送所述信任设备设置请求至所述服务器,以便所述服务器生成所述信任设备对应的登录凭证;所述登录凭证为用于采用所述用户账号登录所述目标应用的登录凭证。
本说明书实施例提供的一种登录流程的触发装置,包括:信息获取模块,用于获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所
述第一设备的第一设备标识;凭证确定模块,用于确定所述第一设备标识对应的第二登录凭证;所述第二登录凭证为所述第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证;判断模块,用于判断所述第一登录凭证与所述第二登录凭证是否一致,得到第一判断结果;登录流程触发模块,用于若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
本说明书实施例提供的一种登录流程的触发装置,包括:第一操作获取模块,用于获取用户开启目标应用的第一操作;页面显示模块,用于基于所述第一操作,显示登录页面;所述登录页面包括用户账号的账号信息以及用于表示将所述第一设备作为信任设备采用所述用户账号登录所述目标应用的登录操作控件;第二操作获取模块,用于获取用户对所述登录操作控件的第二操作;请求生成模块,用于基于所述第二操作,生成用于请求采用所述用户账号登录所述目标应用的登录请求;所述登录请求中包含所述第一登录凭证和所述第一设备的第一设备标识;请求发送模块,用于发送所述登录请求至服务器,以便在所述第一登录凭证通过验证后所述服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
本说明书实施例提供的一种设置信任设备的装置,包括:设置页面获取模块,用于获取服务器发送的包含历史登录设备的设备信息的信任设备设置页面;所述历史登录设备为采用用户账号登录过目标应用的设备;设置页面显示模块,用于显示所述信任设备设置页面;所述信任设备设置页面中包含第一确认控件;确认操作获取模块,用于获取用户对所述第一确认控件的第一确认操作;设置请求生成模块,用于基于所述第一确认操作,生成信任设备设置请求;所述信任设备设置请求中包括所述历史登录设备中被用户确定设置为信任设备的设备标识;设置请求发送模块,用于发送所述信任设备设置请求至所述服务器,以便所述服务器生成第二识别对应的登录凭证;所述登录凭证为用于采用所述用户账号登录所述目标应用的凭证。
本说明书实施例提供的一种登录流程的触发设备,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所述第一设备的第一设备标识;确定所述第一设备标识对应的第二登录凭证;所述第二登录凭证为所述第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证;判断所述第一登录凭证与所述第二登录凭证是否一致,得到第一判断结果;若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
本说明书实施例提供的一种登录流程的触发设备,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取用户开启目标应用的第一操作;基于所述第一操作,显示登录页面;所述登录页面包括用户账号的账号信息以及用于表示将所述第一设备作为信任设备采用所述用户账号登录所述目标应用的登录操作控件;获取用户对所述登录操作控件的第二操作;基于所述第二操作,生成用于请求采用所述用户账号登录所述目标应用的登录请求;所述登录请求中包含所述第一登录凭证和所述第一设备的第一设备标识;发送所述登录请求至服务器,以便在所述第一登录凭证通过验证后所述服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
本说明书实施例提供的一种设置信任设备的设备,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个
处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取服务器发送的包含历史登录设备的设备信息的信任设备设置页面;所述历史登录设备为采用用户账号登录过目标应用的设备;显示所述信任设备设置页面;所述信任设备设置页面中包含第一确认控件;获取用户对所述第一确认控件的第一确认操作;基于所述第一确认操作,生成信任设备设置请求;所述信任设备设置请求中包括所述历史登录设备中被用户确定设置为信任设备的设备标识;发送所述信任设备设置请求至所述服务器,以便所述服务器生成所述信任设备对应的登录凭证;所述登录凭证为用于采用所述用户账号登录所述目标应用的登录凭证。
本说明书实施例提供的一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现一种上述登录流程的触发方法或设置信任设备的方法。
本说明书一个实施例实现了能够达到以下有益效果:本说明书实施例中第一设备发送的用于登录目标应用的登录请求中包含第一登录凭证,若确定第一登录凭证与用于第一设备登录用户账号的第二登录凭证一致,则可以触发以所述用户账号在所述第一设备上登录所述目标应用的流程,从而用户在第一设备中登录目标应用时,无需用户输入密码、验证码等账号验证信息,可减少用户操作以及减少登录耗时,提高登录的便捷性。
为了更清楚地说明本说明书实施例或相关技术中的技术方案,下面将对实施例或相关技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本说明书实施例中一种登录流程的触发方法的整体方案流程示意图;
图2为本说明书实施例提供的一种登录流程的触发方法的流程示意图;
图3为本说明书实施例提供的一种信任设备设置页面的示意图;
图4为本说明书实施例中提供的一种登录流程的触发方法的流程示意图;
图5为本说明书实施例中提供的一种登录页面的示意图;
图6为本说明书实施例中提供的一种设置信任设备的方法的流程示意图;
图7为本说明书实施例中提供的一种登录流程的触发方法的泳道图;
图8为本说明书实施例提供的对应于图2的一种登录流程的触发装置的结构示意图;
图9为本说明书实施例提供的对应于图4的一种登录流程的触发装置的结构示意图;
图10为本说明书实施例提供的对应于图6的一种设置信任设备的装置的结构示意图;
图11为本说明书实施例提供的对应于图2或图4中的一种登录流程的触发设备或者对应于图6的一种设置信任设备的设备的结构示意图。
为使本说明书一个或多个实施例的目的、技术方案和优点更加清楚,下面将结合本说明书具体实施例及相应的附图对本说明书一个或多个实施例的技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本说明书的一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本说明书一个或多个实施例保护的范围。
以下结合附图,详细说明本说明书各实施例提供的技术方案。
相关技术中,终端设备的终端应用退出用户账号的登录后,若需要再次登录,需要通过输入密码、验证码等验证登录的方式再次登录该账号,在不同的设备中交替登录时,每次都需要输入密码、验证码等操作。
为了解决相关技术中的缺陷,本方案给出了以下实施例。
图1为本说明书实施例中一种登录流程的触发方法的整体方案流程示意图。如图1所示,该方案可以包括第一设备1以及服务器2,其中第一设备可以是用于登录目标应用的设备。用户在第一设备1中开启目标应用后,终端页面中可以显示用于通过用户账号登录目标应用的登录页面,该页面中还可以包含登录控件,用户点击或者通过其他方式触发第一设备登录目标应用,第一设备1可以将第一登录凭证携带在登录请求中发送至服务器2,其中,第一登录凭证可以是第一设备中保存的用于登录目标应用的凭证。服务器2可以在获取登录请求中包含的第一登录凭证,对该凭证进行验证,在验证通过后可允许第一设备采用该用户账号登录目标应用。其中,服务器可以确定第一设备与目标应用的用户账号建立信任关系后生成的用于第一设备登录用户账号的第二登录凭证,判断第一登录凭证与第二登录凭证是否一致,若一致,可可以确定第一设备发送的登录请求可以被验证通过,可允许第一设备采用用户账号登录目标应用。本说明书实施例中可以通过登录凭证代替相关技术中用户输入的密码、验证码等核验信息,通过登录凭证登录的方式无需用户输入验证信息,可简化用户操作,提高登录效率。
接下来,将针对说明书实施例提供的一种登录流程的触发方法结合附图进行具体说明:图2为本说明书实施例提供的一种登录流程的触发方法的流程示意图。从程序角度而言,流程的执行主体可以为搭载于应用服务器的程序或应用客户端。
如图2所示,该流程可以包括以下步骤202至步骤208。
步骤202:获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所述第一设备的第一设备标识。
步骤204:确定所述第一设备标识对应的第二登录凭证;所述第二登录凭证为所述第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证。
其中,第一登录凭证可以是第一设备本地保存的用于登录目标应用的登录凭证;第二登录凭证可以是服务器或云端存储的与第一设备对应的登录凭证。第二登录凭证可以是第一设备与目标应用的用户账号建立信任关系后,也可以理解为将第一设备设定为用户账号的信任设备后,针对第一设备生成的用于采用该用户账号登录目标应用的凭证,第二登录凭证与第一设备具有对应性,不同的设备对应不同的登录凭证。第二登录凭证仅可用于在第一设备中采用用户账号登录目标应用。本说明书实施例中针对第一设备生成登录凭证后可以将凭证保存在服务器或云端的同时也可以发送该登录凭证至第一设备。实际应用中若第一设备没有被攻击或出现其他安全问题,第一设备中保存的第一登录凭证应该与服务器确定出的第二登录凭证一致。
考虑到实际应用中可能由于一些不安全的因素可能造成第一设备中保存的登录凭证发送变化,这里用第一登录凭证表示第一设备中保存的可能发送变化的登录凭证,用第二登录凭证表示服务器或云端保存的未发送变化的与第一设备对应的登录凭证,其中第一、第二仅是用于将一个实体或操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何实际的顺序。
从计算机角度而言,登录凭证可以是一段包含特定字符的字符串,服务器在获取到第一设备发送的登录请求后可以根据特定字符提取该登录请求中包含的第一登录凭证。
第一设备的第一设备标识可以是第一设备的唯一标识,例如,该标识可以用于服务器区分不同的设备。
步骤206:判断第一登录凭证与第二登录凭证是否一致,得到第一判断结果。
步骤208:若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
其中,若第一登录凭证与第二登录凭证一致,可以表示第一设备发送的登录请求被验证通过,可以允许第一设备采用用户账号登录目标应用。服务器可以触发用户账号在第一设备上登录所述目标应用的流程,具体的,可以发送表示登录成功的提示信息至第一设备,也可以发送采用用户账号登录目标应用后目标应用中的某个页面,如首页、用户上次浏览的页面等等,第一设备可以显示对应的页面内容。实际应用中,若第一登录凭证与第二登录凭证不一致,可以说明第一设备通过登录凭证登录目标应用的登录方式不能被通过验证,可以发送表示信任登录失败的提示信息至第一设备,还可以发送通过输入密码、验证码等验证信息的验证登录页面至第一设备,以便第一设备可以基于用户提供的验证信息登录目标应用。
目标应用可以理解为第一设备可以登录的终端应用,用户账号可以是用户注册为目标应用的用户时确定出的登录账号,可以是邮箱号码、手机号码、用户证件编号等等,也可以是符合目标应用的登录要求的自定义字符等等,这里对具体形式不作具体限定。
应当理解,本说明书一个或多个实施例所述的方法其中部分步骤的顺序可以根据实际需要相互交换,或者其中的部分步骤也可以省略或删除。
图2中的方法,第一设备发送的用于登录目标应用的登录请求中包含第一登录凭证,若确定第一登录凭证与用于第一设备登录用户账号的第二登录凭证一致,则可以触发以所述用户账号在所述第一设备上登录所述目标应用的流程,从而用户在第一设备中登录目标应用时,无需用户输入密码、验证码等账号验证信息,可减少用户操作以及减少登录耗时,提高登录的便捷性。
基于图2的方法,本说明书实施例还提供了一些具体实施方案,下面进行说明。
为进一步保障用户账号安全,可选的,本说明书实施例中触发以所述用户账号在所述第一设备上登录所述目标应用的流程之前,还可以包括:判断所述第一登录凭证是否位于第一登录凭证的有效期内,得到第二判断结果。
其中,上述触发以所述用户账号在所述第一设备上登录所述目标应用的流程,具体可以包括:若所述第二判断结果表示所述第一登录凭证位于所述第一登录凭证的有效期内,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
实际应用中,第一设备发送的第一登录凭证中可以包含第一登录凭证的生成时间,上述判断所述第一登录凭证是否位于所述第一登录凭证的有效期内,可以包括:判断所述第一登录凭证的生成时间与获取到所述登录请求的时间的时间差是否小于或等于预设阈值。其中,若第一登录凭证的生成时间与获取到所述登录请求的时间的时间差小于或等于预设阈值,可以表示第一登录凭证位于有效期内。
实际应用中,判断登录凭证是否有效也可以是由第一设备执行的,实际应用中,第一设备发送的登录请求可以是基于用户在第一设备上执行的登录操作生成的,第一设备获取到用户的登录操作后,可以判断第一登录凭证的生成时间与获取到用户操作的时间的时间差是否小于或等于预设阈值。如第一登录凭证的生成时间与获取到用户操作的时间的时间差小于或等于预设阈值,则可以确定第一登录凭证位于有效期内,可以发送登录请求至服务器。若第一登录凭证未位于有效期内,第一设备可以显示用于用户输入验证信息的页面,以便基于用户提供的验证信息发送验证登录请求至服务器,在验证通过
后,第一设备可以采用用户账号登录目标应用。
本说明书实施例中也可以通过判断第二登录凭证的有效期,来确定是否通过对第一设备发送的登录请求的验证。作为一种实施方式,确定出第二登录凭证后,还可以判断所述第二登录凭证的生成时间与获取到登录请求的时间的时间差是否或等于预设阈值,若该时间差小于或等于预设阈值,可以确定第二登录凭证位于有效期内。若第二登录凭证位于有效期内,则可以采用第二登录凭证对第一设备发送的登录请求进行验证。其中,上述预设阈值可以根据实际需求进行设定,例如,10天、20天、30天等等,这里对具体阈值不作具体限定。
实际应用中,登录凭证中也可以包含表示登录凭证有效期的时间信息,例如登录凭证的有效期的起始时间以及截止时间,本说明书实施例中还可以基于有效期的时间信息来判断登录凭证是否有效,例如,第一设备可以判断获取到用户登录的时间是否位于第一登录凭证的有效期的起始时间以及截止时间之间的有效期限内,服务器也可以判断获取到登录请求的时间是否位于第二登录凭证的有效期的起始时间以及截止时间之间的有效期限内。实际应用中,可以根据实际需求设定具体的判断方式,这里不作具体限定。
本说明书实施例中服务器针对设备生成的登录凭证中还可以包含设备的设备标识,可选的,上述确定所述第一设备标识对应的第二登录凭证之前,还可以包括:解析所述第一登录凭证,得到所述第一登录凭证中包含的第二设备标识;判断所述第二设备标识与所述第一设备标识是否一致,得到第三判断结果。
其中,上述确定所述第一设备标识对应的第二登录凭证,具体可以包括:若所述第三判断结果表示所述第二设备标识与所述第一设备标识一致,则查找所述第一设备标识对应的第二登录凭证。
实际应用中,若第三判断结果表示第二设备标识与第一设备标识不一致,则可以说明第一设备发送的不是针对该设备的登录凭证,该登录凭证是无效的,服务器可以终止对第一设备发送的请求通过登录凭证登录目标应用的登录请求,可以发送表示信任登录失败的信息至第一设备,也可以发送验证登录页面至第一设备。
实际应用中,用户通常不会频繁的在不同设备上登录同一账号,为保证安全,还可以设置信任登录的次数,例如允许用户账号一天内通过信任登录的方式登录目标应用的次数为10次,又如,允许用户账号一周内通过信任登录的方式登录目标应用的次数为20次,若超过了该次数,需要用户通过输入密码、验证码等核验信息的方式登录。本说明书实施例中的方法还可以包括:基于所述用户账号,判断在获取到第一设备发送的登录请求之前的预设时间段内所述目标应用采用登录凭证的方式登录所述用户账号的次数是否大于或等于预设次数;若小于所述预设次数,则可以执行对所述第一登录凭证的验证流程,如上述步骤204至步骤208。若预设时间段内所述目标应用采用登录凭证的方式登录所述用户账号的次数大于或等于预设,则可以终止对所述登录请求的处理,可以确定当前信任登录失败,还可以发送提醒信息至第一设备,也可以发送验证登录页面至第一设备。其中,预设次数的具体数值可以根据实际需求设定。其中预设次数可以表示允许不同的设备通过登录凭证的方式登录用户账号的总的次数;可以以单个设备为维度,可以表示允许同一个设备通过登录凭证的方式登录用户账号的次数。
实际应用中,是否超过预设次数的判断流程也可以在第一设备中执行,第一设备中可以统计预设时间段内该设备通过登录凭证的方式采用用户账号登录过目标应用的次数,可以判断第一设备在预设时间段内通过登录凭证的方式采用用户账号登录过目标应用的次数是否大于或等于预设次数,若大于或等于预设次数,则可以不再允许第一设备通过信任登录的方式登录用户账号,可以显示核验登录的页面;若第一设备在预设时间段内通过登录凭证的方式采用用户账号登录过目标应用的次数小于预设次数,则可以显
示信任登录的登录页面。
本说明书实施例中用户可以在设备中按照实际需求设定信任设备,确定为信任设备的设备可以通过登录凭证的方式快捷的登录目标应用。可选的,本说明书实施例中的上述所述获取第一设备发送的用于登录目标应用的登录请求之前,还可以包括:获取采用所述用户账号登录过所述目标应用的历史登录设备的设备信息;所述历史登录设备包括所述第一设备;生成包含所述历史登录设备的设备信息的信任设备设置页面;所述设备信息包括设备型号、设备自定义名称中至少一种;将所述信任设备设置页面发送至第二设备;所述第二设备为在所述第一设备发送所述登录请求之前处于采用所述用户账号登录所述目标应用的登录状态的设备;获取所述第二设备基于所述信任设备设置页面发送的信任设备设置请求;所述信任设备设置请求中包括所述第一设备的设备标识;基于所述第一设备的设备标识,将所述第一设备确定为信任设备;所述信任设备用于表示具有采用登录凭证在所述目标应用中登录所述用户账号的权限的设备。
其中,历史登录设备可以包含预设时间段内采用用户账号登录过目标应用的设备,例如可以是最近一个月、三个月、一年等时间段内采用用户账号登录过目标应用的设备。若采用用户账号登录目标应用后仍处于登录状态的设备也可以作为历史登录设备。
图3为本说明书实施例提供的一种信任设备设置页面的示意图。如图3所示,假设第二设备为在所述第一设备发送所述登录请求之前处于采用所述用户账号登录所述目标应用的登录状态的设备,该页面可以是显示在第二设备中的设置页面。其中,页面中的可以包含各个历史登录设备的设备信息,可以是设备的型号、编码等,也可以是用户自行定义的名称等。如图3所示的“某某的A设备”、“某某的B设备”、“某某的C设备”可以是用户自行设定的设备名称。实际应用中,在终端应用的设置功能中可以包含对设备名称的设置,服务器可以获取用户自定义的设备名称。
如图3所示,该页面中可以包含用于确认信任设备的第一确认控件301,如“确认开启”控件,用户点击该控件,第二设备可以发送信任设备设置请求至服务器,该信任设备设置请求中可以包含被用户确认设定为信任设备的第一设备的设备标识。如图3所示,该页面中还可以包含对设备进行选择的选择控件302,该控件处于被选中状态时,可以认为用户确认将该被选中的设备设定为信任设备,第二设备可以基于选择控件的状态生成信任设备设置请求,该请求中可以包含被选中的各个设备的设备标识。用户可以选择一个也可以选择多个设备作为被设定为信任设备的设备。服务器获取到第二设备发送的信任设备设置请求后,可以该请求中包含的设备标识,将对应的设备确定为具有采用登录凭证在所述目标应用中登录所述用户账号的权限的信任设备。例如可以针对用户账号以及目标应用,生成对应的信任设备列表。
本说明书实施例中信任设备确定页面还可以包括所述第二设备的设备信息,图如3所示的“某某的A设备”,该页面中可以包含处于登录状态的设备的状态标识,如图3所示的“当前”,可以表示“某某的A设备”为当前采用用户账号登录目标应用的设备,其他未标注的可以为A设备登录用户账号之前登录过用户账号的设备。
本说明书实施例中的方法还可以包括:将所述第二设备确定为所述信任设备。具体的,可以将第二设备的设备标识保存到信任设备列表中。
实际应用中,还可以根据登录频率、登录状态连续的时长、登录时间等因素对各个历史登录设备进行排序,将用户经常使用的设备优先显示。例如,可以对各个因素设定权重,登录频率越高权重可以越高,登录状态连续的时长越长权重可以越高,登录时间越靠近当前时间权重可以越高,可以将各个权重进行加权求和,确定各个设备对应的综合评分,按照评分由高到低的顺序显示。实际应用中,若用户的历史登录设备较多,可以按照排序选择排在前预设位数的设备显示在设置页面中。
实际应用中,第一设备与第二设备可以为同一个设备,也可以为不同的设备。
本说明书实施例中服务器可以针对各个信任设备生成登录凭证,登录凭证是对于设备对应的,不同的设备对应不同的登录凭证。可选的,本说明书实施例中将所述第一设备确定为信任设备之后,还可以包括:基于所述第一设备的设备标识,生成所述第一设备对应的所述第二登录凭证;发送所述第二登录凭证至所述第一设备;保存所述第二登录凭证与所述第一设备的对应关系。
其中,服务器可以保存第二登录凭证以及第二登录凭证与第一设备的对应关系。实际应用中,第二登录凭证、第一设备以及用户账号三者具有对应关系。例如,可以在信任设备列表中维护各个信任设备以及设备分别对应的登录凭证。实际应用中可以将上述信息保存到服务器中,也可以保存在云端,也可以保存在区块链系统中。服务器还可以将生成的第二登录凭证发送中第一设备,以便第一设备基于登录凭证进行登录。
同理,本说明书实施例中上述将第二设备确定为所述信任设备之后,还可以包括:基于所述第二设备的设备标识,生成所述第二设备对应的所述第三登录凭证;发送所述第三登录凭证至所述第二设备;保存所述第三登录凭证与所述第二设备的对应关系。
与上述方法类似,服务器可以保存第三登录凭证以及第三登录凭证与第二设备的对应关系。实际应用中,第三登录凭证、第二设备以及用户账号三者具有对应关系,可以将该对应关系保存在信任设备列表中。也可以保存到服务器、云端、区块链系统等存储空间中。服务器还可以将生成的第三登录凭证发送中第二设备,以便第二设备基于登录凭证进行登录。
实际应用中,用户在第二设备中登录用户账号后,并且在第二设备处于登录状态中时,用户可以在第二设备中设置信任设备,可以理解为在设置信任设备时,第二设备是处于登录状态的,在信任设备设置完成后,服务器可以将生成的针对第二设备的登录凭证发送中第二设备。
为保证用户账号安全,本说明书实施例中在用户设置信任设备时,也可以采集用户的核验信息,在验证通过后才可以将用户确定的设备确定为信任设备。可选的,本说明书实施例中所述将所述第一设备确定为信任设备之前,还可以包括:获取所述第二设备发送的第一待核验信息;判断所述第一待核验信息与第一预设核验信息是否一致,得到第四判断结果;所述第一预设核验信息包括注册核验信息、身份认证信息中至少一种;所述注册核验信息为所述用户以所述用户账号注册所述目标应用时提供的核验信息;所述身份认证信息为所述用户基于所述用户账户进行用户认证的过程中提供的身份信息;所述将所述第一设备确定为信任设备,具体可以包括:若所述第四判断结果表示所述第一待核验信息与第一预设核验信息一致,则将所述第一设备确定为信任设备。
本说明书实施例中在设置信任设备的过程中,第二设备还可以显示用于获取用户提供的第一待核验信息的页面,例如,第二设备中可以显示提示用户输入账号密码、验证码的页面,也可以显示用户身份信息采集页面,如用于采集用户的人脸、指纹、虹膜等信息采集页面。第一待核验信息可以包括表示用户身份的信息,如人脸、指纹、虹膜等,也可以包含可以对账号进行验证的信息,如,账号密码、验证码等。这里对具体的核验信息不作具体限定,可根据实际需求进行设定。
实际应用中,服务器获取到第二设备发送的信任设备设置请求之后,可以发送核验信息获取请求至所述第二设备,以便第二设备显示信息采集页面获取用户提供的核验信息。作为另一种实施方式,第二设备也可以主动显示获取核验信息的页面,例如,获取到用户针对信任设备的确认操作后,可以显示用于获取用户提供的第一待核验信息的页面。第二设备可以基于获取到的第一待核验信息以及用户选定的信任设备的设备标识生成信任设备设置请求发送至服务器。实际应用中,第一待核验信息也可以与信任设备设
置请求分别发送至服务器,具体发送形式这里不作限定。
服务器获取到用户提供的第一待核验信息后,可以将第一待核验信息与预先存储的该用户账号的第一预设核验信息进行比对,判断两者的一致性。判断第一待核验信息与第一预设核验信息一致,可以表示设置信任设备是经过用户同意的,服务器可以将设置请求针对的设备确定为信任设备。
本说明书实施例中第一预设核验信息可以包括用户以所述用户账号注册所述目标应用时提供的注册核验信息,例如登录密码等;也可以包括用户基于所述用户账户进行用户认证的过程中提供的身份信息,例如进行实名认证过程中确定出的能够表示用户的身份的人脸、虹膜、指纹等生物特征信息,还可以是用户提供的身份证件中的信息。具体的待核验信息以及对应的预设核验信息可根据实际需求进行设定,这里不作具体限定。
实际应用中,在设置页面还可以包含用于用户了解信任设备以及信任登录服务的条款,在用户了解该条款后可以勾选对应的条款,可以表示用户已经授权服务器获取用于执行信任登录流程需要获取的用户信息。
对于图像类信息,判断两个信息是否一致,可以理解为两个信息的相似度是否大于或等于预设阈值,在相似度大于或等于预设阈值时可以认为两个信息是相似的。
为保证信息用户账号信息的安全性,本说明书实施例中在将第一设备确定为信任设备后,第一设备需要通过核验的方式登录目标应用后,可以获取服务器发送的第二登录凭证,以便第一设备在后续的登录过程中可以使用登录凭证的方式登录。可选的,本说明书实施例中所述发送所述第二登录凭证至所述第一设备之前,还可以包括:获取所述第一设备发送的验证登录请求,所述验证登录请求中包括所述用户账号的账号信息以及所述第一设备中用户提供的第二待核验信息;判断所述第二待核验信息与第二预设核验信息是否一致,得到第五判断结果;所述第二预设核验信息包括注册核验信息、身份认证信息中至少一种;所述注册核验信息为所述用户以所述用户账号注册所述目标应用时提供的核验信息;所述身份认证信息为所述用户基于所述用户账户进行用户认证的过程中提供的身份信息;若所述第五判断结果表示所述第二待核验信息与第二预设核验信息一致,则允许所述第一设备采用所述用户账号登录所述目标应用;所述发送所述第二登录凭证至所述第一设备,具体包括:在所述第一设备处于采用所述目标账号登录所述目标应用的登录状态的时,发送所述第二登录凭证至所述第一设备。
账号信息可以包括账号名称、邮箱、手机号等表示账号的信息。与上述第一待核验信息类似,第二待核验信息可以是账号密码、验证码等账号信息,也可以是用户人脸、指纹等用户生物特征信息,具体的核验过程可以与上述类似,这里不再赘述。
本说明书实施例中的同一个登录凭证的被使用次数可以是有限的,可以在被使用次数达到预设次数后,将该登录凭证确定为失效的,后续再使用该登录凭证时,不能被核验通过,即不能再使用该登录凭证执行无需输入密码、验证码等信息的信任登录流程。
作为一种实施方式,本说明书实施例中的登录凭证可以是能够被使一次的凭证,在服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程之后,还可以删除所述第二登录凭证与所述第一设备的对应关系,将第二登录凭证确定为失效凭证。
在第二登录凭证失效后,服务器还可以生成新的凭证,以便设备后续利用新的凭证通过信任登录的方式登录用户账号。可选的,本说明书实施例中的方法还可以包括:基于所述第一设备的设备标识,生成第四登录凭证;保存所述第四登录凭证与所述第一设备的对应关系;发送所述第四登录凭证至所述第一设备。
实际应用中,第一设备通过第一登录凭证登录用户账号后,服务器可以将本次登录使用的第二登录凭证删除或者标记为失效状态,还可以针对第一设备生成第四登录凭证,
在第一设备处于登录状态时,将第四登录凭证发送至第一设备。
本说明书实施例中第一登录凭证、第二登录凭证、第三登录凭证以及第四登录凭证是为了比较清楚的说明本说明书实施例中提供的方法进行的不同命名,各个登录凭证的组成、生成以及使用的方式可以是类似的,上述描述内容可以相关参考。本说明书实施例中通过循环在可信设备颁发防拷贝的一次性登录凭证的方式,可以大大改善多设备用户的登录体验。
本说明书实施例中同一用户账号可以同时在一个设备中使用,在第一设备登录后,其他设备会被退出登录。可选的,本说明书实施例中的上述触发以所述用户账号在所述第一设备上登录所述目标应用的流程之后,还可以包括:注销所述用户账号在其他设备中的登录状态。
为使得用户可以比较便捷的使用信任登录的功能,本说明书实施例中还可以将用于提示用户设置信任设备的提醒信息发送至用户的设备。可选的,本说明书实施例中的方法还可以包括:判断所述用户账号在预设时间段内是否登录过多台设备,得到第五判断结果;若所述第五判断结果表示所述用户账号在预设时间段内登录过多台设备,则发送用于提示用户设置信任设备的提醒信息至所述多台设备中的至少一台设备;所述信任设备用于表示具有采用登录凭证在所述目标应用中登录所述用户账号的权限的设备。其中,所述提醒信息中可以包含用于指向该目标应用中用于设置信任设备的设置页面的控件。
实际应用中,提醒信息可以发送至用户账号处于登录状态的登录设备中,登录设备中可以显示该提醒信息,用户可以对该提醒信息执行预设操作,可跳转至用于设置信任设备的设置页面,如上述图3所示的信任设备设置页面。其中,该提示信息中也可以包含进入信任设备设置页面的路径描述信息,用户也可以根据该路径描述信息逐步进入信任设备设置页面。
实际应用中,提示信息可以通过信息浮层、系统消息等方式发送至用户设备,服务器还可以统计用户关闭或未读、忽略该提示信息的次数,若该次数超过预设次数,可确定用户不想使用信任登录,为减少对用户打扰,可在预设时间段内,如一个月、三个月内不再发送该提示信息至该用户账号。
基于同样的思路,本说明书实施例中还提供与上述方法对应的以第一设备为执行主体的登录流程的触发方法。图4为本说明书实施例中提供的一种登录流程的触发方法的流程示意图。如图4所示,该方法可以包括步骤402至步骤410。
步骤402:第一设备获取用户开启目标应用的第一操作。
本说明书实施例中目标应用可以是搭载于第一设备中的终端应用、小程序等应用,第一设备的显示页面中可以包含目标应用的标识,例如图标、名称等等,用户可以点击该标识打开目标应用。目标应用可以是用户预先通过输入用户名或用户账号、密码等信息进行过注册的应用。实际应用中用户名和用户账号可以相同也可以不同,目标应用可以是支付类、聊天类、娱乐类、生活服务类等类型的应用,这里不作具体限定。
步骤404:基于所述第一操作,显示登录页面;所述登录页面包括用户账号的账号信息以及用于表示将所述第一设备作为信任设备采用所述用户账号登录所述目标应用的登录操作控件。
图5为本说明书实施例中提供的一种登录页面的示意图。如图5所示,登录页面中可以包括用户账号的账号信息501,还可以包括用于登录该用户账号的登录操作控件502,实际应用中,页面内容以及布局、控件的描述信息等页面信息可以根据实际需求进行设定,这里不作具体限定。
步骤406:获取用户对所述登录操作控件的第二操作。
步骤408:基于所述第二操作,生成用于请求采用所述用户账号登录所述目标应用的登录请求;所述登录请求中包含所述第一登录凭证和所述第一设备的第一设备标识。
接续上述图5的介绍,用户可以点击登录操作控件502,第一设备可以基于用户的第二操作,生成登录请求发送至服务器。其中,登录请求中可以包括用户账号的账号信息,还可以包括第一设备中存在的第一登录凭证以及第一设备的设备标识。
步骤410:发送所述登录请求至服务器,以便在所述第一登录凭证通过验证后所述服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
服务器可以对第一设备发送的登录请求进行验证,具体的验证方式可以参考上述以服务器为执行主体描述的登录流程的触发方法,这里不再赘述,在验证通过后第一设备可以采用用户账号登录目标应用。本说明书实施例中可通过设备中存在的登录凭证登录用户账号,无需用户输入密码、验证码等验证信息,可简化用户操作,提高登录效率。
登录凭证可以是具有有效期限的,例如10天,30天。第一设备中保存的第一登录凭证中可以包含该凭证的有效期限信息,上述显示登录页面之前,还可以包括:基于所述第一操作,获取所述第一设备中保存的第一登录凭证;判断所述第一登录凭证的是否位于所述第一登录凭证的有效期内;所述显示登录页面,具体可以包括:若所述第一登录凭证位于所述有效期内,则显示登录页面。
其中,若第一登录凭证未位于有效期限内,则可以显示核验信息登录页面。用户可以在该核验信息登录页面中输入账号密码、验证码、身份信息等等核验信息,在核验通过后,第一设备也可以采用用户账号登录目标应用。通过核验信息登录页面登录目标应用的方式可以与现有的登录方式相同或类似。
本说明书实施例中为确保用户账号安全,还可以设定用户账号可采用登录凭证进行信任登录的最大次数,例如一天内10次。上述第一设备显示登录页面之前,还可以判断预设时间段内所述用户账号采用信任登录的方式登录的累计次数是否超过预设次数,若未超过可以显示该登录页面,若已超过则可以显示核验登录的登录页面。
实际应用中,用户通常不会在同一个设备或者不同的设备中在比较短的时间内频繁的登录同一个用户账号,本说明书实施例中还可以基于用户账号在同一设备或者不同设备中登录的频率来判断用户设定的信任设备或用户账号是否存在安全风险。例如,预设时间段内,采用信任登录的方式该用户账号被登录的次数大于或等于预设次数,可以认为该用户账号或用户设定的信任设备存在风险,可以发送安全提示信息至用户,也可以解除该用户账号的信任登录,或者解除存在风险的信任设备的信任登录权限。
本说明书实施例中登录凭证可以是服务器在确定设备为信任设备后针对设备生成的可以用于采用用户账号登录目标应用的凭证。本说明书实施例中上述生成用于请求采用所述用户账号登录所述目标应用的登录请求之前,还可以包括:获取所述服务器发送的第二登录凭证;所述第二登录凭证是所述第一设备被确定为信任设备之后,所述服务器生成的与所述第一设备对应的用于采用所述用户账号登录所述目标应用的登录凭证;所述信任设备用于表示具有采用登录凭证在所述目标应用中登录所述用户账号的权限的设备。
实际应用中,若第一设备准确接收到了服务器发送的第二登录凭证,并且在保存该凭证的期间也是安全的,即第一设备中获取到第二登录凭证后,该凭证没有被改变,第一设备生成的登录请求中包含的第一登录凭证与服务器发送给第一设备的第二登录凭证可以是相同的。若第一设备出现了安全问题或者第一设备中保存的登录凭证被恶意操作过,可能会造成第一设备中保存的第一登录凭证发生变化,与服务器发送给第一设备的第二登录凭证不一致。
基于同样的思路,本说明书实施例中还提供与上述方法对应的以第二设备为执行主体的设置信任设备的方法。图6为本说明书实施例中提供的一种设置信任设备的方法的流程示意图。如图6所示,该方法可以包括步骤602至步骤610。
步骤602:第二设备获取服务器发送的包含历史登录设备的设备信息的信任设备设置页面;所述历史登录设备为采用用户账号登录过目标应用的设备。
第二设备可以是处于采用用户账号登录目标应用的登录状态的设备,第二设备采用用户账号登录目标应用后,可以进入信任设备设置页面,该页面中可以包含历史登录设备的设备信息,例如设备名称、型号等信息。
实际应用中,用户可以按照预设路径进入信任设备设置页面,例如,目标应用中可以包含用于对目标应用进行设置的设置项,设置信任设备可以是应用设置中的一项。具体的路径可根据应用的实际需求进行设定。
步骤604:显示所述信任设备设置页面;信任设备设置页面中包含第一确认控件。
步骤606:获取用户对所述第一确认控件的第一确认操作。
步骤608:基于所述第一确认操作,生成信任设备设置请求;所述信任设备设置请求中包括所述历史登录设备中被用户确定设置为信任设备的设备标识。
步骤610:发送信任设备设置请求至所述服务器,以便所述服务器生成被用户确定设置为信任设备的设备对应的用于采用所述用户账号登录所述目标应用的登录凭证。
如上述介绍的图3,为本说明书实施例提供的一种信任设备设置页面的示意图,该页面可以包含第一确认控件301,用户点击该控件,第二设备可以获取到用户对所述第一确认控件的第一确认操作,并生成信任设备设置请求发送至服务器。在该页面中用户可以选择设定为信任设备的一个或多个设备,信任设备设置请求中可以包括用户选定的各个设备的设备标识,以便服务器确定信任设备,针对信任设备生成登录凭证。
为保证用户账号的安全性,本说明书实施例中在设置信任设备的过程中还可以采集用户的核验信息,在核验通过后,可将用户选定的设备确定为信任设备。上述发送所述信任设备设置请求至所述服务器之后,还可以包括:显示信息获取页面;基于所述信息获取页面,获取用户提供的第一待核验信息;发送所述第一待核验信息至所述服务器,以便所述服务器在所述第一待核验信息通过核验后将被用户确定设置为信任设备的设备确定为信任设备。
其中,信息获取页面可以是用于用户输入核验信息的页面,也可以是用于采集用户生物特征信息的页面,可以根据实际需求进行设定,这里不作具体限定。
本说明书实施例中进行信任设备设置的第二设备也可以作为信任设备,服务器也可以生成针对第二设备的登录凭证。本说明书实施例中的被用户确定设置为信任设备的设备可以包括所述第二设备,上述方法还可以包括:获取所述服务器发送的第三登录凭证;所述第三登录凭证是将所述第二设备确定为信任设备后,所述服务器基于第二设备的设备标识生成的对应于第二设备的登录凭证。
本说明书实施例中在第二设备中完成对信任设备的设置后,还可以取消设置的信任设备,取消设置的路径可以与确定设置的路径相同,进入信任设备设置页面后,选中已经被设定为信任设备,该设置页面中可以显示用于取消设置的控件,例如图3所示的“确认开启”控件可以变更为“确认取消”,用户点击该控件后,第二设备可以发送针对被选中取消设置信任的设备的取消设置请求至服务器,服务器可以根据该请求将该设备从信任设备列表中删除,取消后该设备需要采用输入验证信息的方式登录目标应用。
本说明书实施例中服务器可以获取第二设备发送的用于解除信任设备的请求,该请
求中可以包含待解除信任关系的信任设备的设备标识,然后基于该请求,可以删除该设备与用户账号的对应关系,也可以将该设备从信任设备列表中删除,也可以删除该设备对应的登录凭证。
实际应用中,与用户账号对应的信任设备中的任意设备中可以显示关联的信任设备的信息,例如,若用户在第二设备中完成了对于信任设备的设定,在第一设备中登录用户账号后,也可以在第一设备的目标应用的设置页面中显示信任设备的信息,后续用户可以在第一设备中也可以在第二设备中对设置的信任设备进行删减、新增等编辑操作。在对信任设备进行编辑的过程中,也可以在用户通过验证后才可以用户进行编辑操作,或者才可以保存用户编辑后的结果信息。
为更清楚的说明本说明书实施例中提供的登录流程的触发方法,图7为本说明书实施例中提供的一种登录流程的触发方法的泳道图。如图7所示,该方案可以包括设备设置阶段以及登录阶段,具体可以包括步骤702至步骤728。
步骤702:第二设备采用用户账号登录目标应用后,用户可以按照预设路径进入用于设置信任设备的设置页面,第二设备中可以显示信任设备设置页面。
步骤704:用户可以在该页面选择信任设备,还可以执行确定操作,第二设备可以基于用户在该页面中的操作生成信任设备设置请求,并将该请求发送至服务器。
步骤706:服务器获取第二设备发送的信任设备设置请求,根据该请求中包含设备标识,确定信任设备,还可以针对各个信任设备生成对应的登录凭证。假设信任设备中包括第一设备和第二设备,服务器可以生成第一设备对应的第二登录凭证并发送至第一设备,还可以生成第二设备对应的第三登录凭证并发送至第二设备。
步骤708:第二设备可以获取服务器发送的第三登录凭证,以便第二设备退出用户账号的登录后可以基于该登录凭证登录该用户账号。
步骤710:第一设备也可以获取服务器发送的第二登录凭证。其中,在将第一设备确定为信任设备后,第一设备需要通过核验的方式采用用户账号登录过目标应用后,第一设备可以获取到服务器发送的第二登录凭证。
步骤712:假设第一设备获取到第二登录凭证后退出该用户账号的登录后,再次采用该用户账号登录目标应用,第一设备可以获取用户开启目标应用的操作,判断本地的第一登录凭证是否有效。其中,第一登录凭证可以理解为获取到服务器发送的第二登录凭证后保存在设备本地的登录凭证。
步骤714:若第一登录凭证有效,则可以显示信任登录的页面。该页面中可以包括登录控件,基于用户对该控件的操作可以生成包含第一登录凭证的登录请求,并发送至服务器。
步骤716:若第一登录凭证无效,则可以执行核验登录的流程,显示核验登录页面。用户在该页面中可以输入密码、验证码、生物特征信息等核验信息。
步骤718:服务器获取到第一设备发送的登录请求后,可以判断该请求中包含的第一登录凭证与第二登录凭证是否一致。
步骤720:若第一登录凭证与第二登录凭证一致,则可以触发以所述用户账号在所述第一设备上登录所述目标应用的流程,可以将第一设备的状态确定为登录状态。
步骤722:服务器还可以将第二登录凭证确定为失效状态,例如,可以将第二登录凭证删除,还可以针对第一设备生成新的登录凭证并发送至第一设备。
步骤724:第一设备中可以显示登录该用户账号后目标应用对应的应用页面,例如应用的首页,用户采用该用户账号最近一次浏览的页面等等。还可以接收服务器发送的
新的登录凭证,还可以将之前保存的第一登录凭证作废,例如可以删除第一登录凭证。
步骤726:若第一登录凭证与第二登录凭证不一致,则可以终止信任登录的流程,生成表示信任登录失败的提示信息,反馈至第一设备。
步骤728:第一设备可以接收服务器反馈的提示信息。第一设备中还可以显示核验登录的页面,以便用户通过提供核验信息的方式登录所述用户账号。
假设第一设备在登录该用户账号之前,第二设备处于该用户账号的登录状态。在第一设备登录该用户账号之后,第二设备会被踢登,一个用户账号允许同时在一台设备上登录使用。假设用户再次想使用第二设备登录用户账号,由于第二设备中已经获取到了第三登录凭证,可以按照上述类似的方式采用第二设备中保存的登录凭证登录所述用户账号。并且,第二设备在使用过保存的登录凭证发起登录请求后,也可将该被使用过的登录凭证作废,获取服务器生成并发送的新的登录凭证,具体过程这里不再详细赘述。
本说明书实施例中用户需要在不同的设备中切换登录同一个用户账号时,可以通过登录凭证的方式进行信任登录,无需用户每次都输入账号密码、验证码等核验信息,可提高便捷性。另一方面,由于采用登录凭证的方式登录用户账号,无需用户每次都提供用于登录的核验信息,使得不具有获取核验信息功能的设备,也可以登录用户账号。例如,假设按照核验的方式采用用户账号登录目标应用,需要采集用户的人脸等生物特征信息,即需要当前使用的设备具有采集生物特征的功能,例如需要有摄像头,假设该设备不具有摄像头将不能在该设备中登录,而本说明书实施例中的方法由于无需用户提供核验信息,即使该设备不具有摄像头也可以在该设备中登录用户账号。
基于同样的思路,本说明书实施例还提供了上述方法对应的装置。图8为本说明书实施例提供的对应于图2的一种登录流程的触发装置的结构示意图。如图8所示,该装置可以包括:信息获取模块802,用于获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所述第一设备的第一设备标识;凭证确定模块804,用于确定所述第一设备标识对应的第二登录凭证;所述第二登录凭证为所述第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证;判断模块806,用于判断所述第一登录凭证与所述第二登录凭证是否一致,得到第一判断结果;登录流程触发模块808,用于若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
基于同样的思路,本说明书实施例还提供了上述方法对应的装置。图9为本说明书实施例提供的对应于图4的一种登录流程的触发装置的结构示意图。如图9所示,该装置可以包括:第一操作获取模块902,用于获取用户开启目标应用的第一操作;页面显示模块904,用于基于所述第一操作,显示登录页面;所述登录页面包括用户账号的账号信息以及用于表示将所述第一设备作为信任设备采用所述用户账号登录所述目标应用的登录操作控件;第二操作获取模块906,用于获取用户对所述登录操作控件的第二操作;请求生成模块908,用于基于所述第二操作,生成用于请求采用所述用户账号登录所述目标应用的登录请求;所述登录请求中包含所述第一登录凭证和所述第一设备的第一设备标识;请求发送模块910,用于发送所述登录请求至服务器,以便在所述第一登录凭证通过验证后所述服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
基于同样的思路,本说明书实施例还提供了上述方法对应的装置。图10为本说明书实施例提供的对应于图6的一种设置信任设备的装置的结构示意图。如图10所示,该装置可以包括:设置页面获取模块1002,用于获取服务器发送的包含历史登录设备的设备信息的信任设备设置页面;所述历史登录设备为采用用户账号登录过目标应用的设
备;设置页面显示模块1004,用于显示所述信任设备设置页面;所述信任设备设置页面中包含第一确认控件;确认操作获取模块1006,用于获取用户对所述第一确认控件的第一确认操作;设置请求生成模块1008,用于基于第一确认操作,生成信任设备设置请求;所述信任设备设置请求中包括所述历史登录设备中被用户确定设置为信任设备的设备标识;设置请求发送模块1010,用于发送所述信任设备设置请求至所述服务器,以便所述服务器生成所述信任设备对应的登录凭证;所述登录凭证为用于采用所述用户账号登录所述目标应用的凭证。
基于同样的思路,本说明书实施例还提供了上述方法对应的设备。
图11为本说明书实施例提供的对应于图2或图4中的一种登录流程的触发设备或者对应于图6的一种设置信任设备的设备的结构示意图。如图11所示,设备1100可以包括:至少一个处理器1110;以及,与所述至少一个处理器通信连接的存储器1130;其中,对应于图2所示的一种登录流程的触发方法,所述存储器1130存储有可被所述至少一个处理器1110执行的指令1120,所述指令被所述至少一个处理器1110执行,以使所述至少一个处理器1110能够:获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所述第一设备的第一设备标识;确定所述第一设备标识对应的第二登录凭证;第二登录凭证为第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证;判断所述第一登录凭证与所述第二登录凭证是否一致,得到第一判断结果;若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
其中,对应于图4所示的一种登录流程的触发方法,所述存储器1130存储有可被所述至少一个处理器1110执行的指令1120,所述指令被所述至少一个处理器1110执行,以使所述至少一个处理器1110能够:获取用户开启目标应用的第一操作;基于所述第一操作,显示登录页面;登录页面包括用户账号的账号信息以及用于表示将所述第一设备作为信任设备采用所述用户账号登录所述目标应用的登录操作控件;获取用户对所述登录操作控件的第二操作;基于所述第二操作,生成用于请求采用所述用户账号登录所述目标应用的登录请求;所述登录请求中包含所述第一登录凭证和所述第一设备的第一设备标识;发送所述登录请求至服务器,以便在所述第一登录凭证通过验证后所述服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
其中,对应于图6所示的一种设置信任设备的方法,所述存储器1130存储有可被所述至少一个处理器1110执行的指令1120,所述指令被所述至少一个处理器1110执行,以使所述至少一个处理器1110能够:第二设备获取服务器发送的包含历史登录设备的设备信息的信任设备设置页面;所述历史登录设备为采用用户账号登录过目标应用的设备;显示所述信任设备设置页面;所述信任设备设置页面中包含第一确认控件;获取用户对所述第一确认控件的第一确认操作;基于所述第一确认操作,生成信任设备设置请求;所述信任设备设置请求中包括所述历史登录设备中被用户确定设置为信任设备的设备标识;发送所述信任设备设置请求至所述服务器,以便所述服务器生成所述信任信息对应的登录凭证;所述登录凭证为用于采用所述用户账号登录所述目标应用的凭证。
基于同样的思路,本说明书实施例还提供了上述方法对应的计算机可读介质。计算机可读介质上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现上述登录流程的触发方法或设置信任设备的方法。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于图11所示的设备而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计
算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带式磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
以上所述仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。
Claims (22)
- 一种登录流程的触发方法,包括:获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所述第一设备的第一设备标识;确定所述第一设备标识对应的第二登录凭证;所述第二登录凭证为所述第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证;判断所述第一登录凭证与所述第二登录凭证是否一致,得到第一判断结果;若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
- 根据权利要求1所述的方法,所述触发以所述用户账号在所述第一设备上登录所述目标应用的流程之前,还包括:判断所述第一登录凭证是否位于所述第一登录凭证的有效期内,得到第二判断结果;所述触发以所述用户账号在所述第一设备上登录所述目标应用的流程,具体包括:若所述第二判断结果表示所述第一登录凭证位于所述第一登录凭证的有效期内,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
- 根据权利要求1所述的方法,所述确定所述第一设备标识对应的第二登录凭证之前,还包括:解析所述第一登录凭证,得到所述第一登录凭证中包含的第二设备标识;判断所述第二设备标识与所述第一设备标识是否一致,得到第三判断结果;所述确定所述第一设备标识对应的第二登录凭证,具体包括:若所述第三判断结果表示所述第二设备标识与所述第一设备标识一致,则查找所述第一设备标识对应的第二登录凭证。
- 根据权利要求1所述的方法,所述获取第一设备发送的用于登录目标应用的登录请求之前,还包括:获取采用所述用户账号登录过所述目标应用的历史登录设备的设备信息;所述历史登录设备包括所述第一设备;生成包含所述历史登录设备的设备信息的信任设备设置页面;所述设备信息包括设备型号、设备自定义名称中至少一种;将所述信任设备设置页面发送至第二设备;所述第二设备为在所述第一设备发送所述登录请求之前处于采用所述用户账号登录所述目标应用的登录状态的设备;获取所述第二设备基于所述信任设备设置页面发送的信任设备设置请求;所述信任设备设置请求中包括所述第一设备的设备标识;基于所述第一设备的设备标识,将所述第一设备确定为信任设备;所述信任设备用于表示具有采用登录凭证在所述目标应用中登录所述用户账号的权限的设备。
- 根据权利要求4所述的方法,所述将所述第一设备确定为信任设备之后,还包括:基于所述第一设备的设备标识,生成所述第一设备对应的所述第二登录凭证;发送所述第二登录凭证至所述第一设备;保存所述第二登录凭证与所述第一设备的对应关系。
- 根据权利要求4所述的方法,所述将所述第一设备确定为信任设备之前,还包括:获取所述第二设备发送的第一待核验信息;判断所述第一待核验信息与第一预设核验信息是否一致,得到第四判断结果;所述第一预设核验信息包括注册核验信息、身份认证信息中至少一种;所述注册核验信息为所述用户以所述用户账号注册所述目标应用时提供的核验信息;所述身份认证信息为所述用户基于所述用户账户进行用户认证的过程中提供的身份信息;所述将所述第一设备确定为信任设备,具体包括:若所述第四判断结果表示所述第一待核验信息与第一预设核验信息一致,则将所述第一设备确定为信任设备。
- 根据权利要求5所述的方法,所述发送所述第二登录凭证至所述第一设备之前,还包括:获取所述第一设备发送的验证登录请求,所述验证登录请求中包括所述用户账号的账号信息以及所述第一设备中用户提供的第二待核验信息;判断所述第二待核验信息与第二预设核验信息是否一致,得到第五判断结果;所述第二预设核验信息包括注册核验信息、身份认证信息中至少一种;所述注册核验信息为所述用户以所述用户账号注册所述目标应用时提供的核验信息;所述身份认证信息为所述用户基于所述用户账户进行用户认证的过程中提供的身份信息;若所述第五判断结果表示所述第二待核验信息与第二预设核验信息一致,则允许所述第一设备采用所述用户账号登录所述目标应用;所述发送所述第二登录凭证至所述第一设备,具体包括:在所述第一设备处于采用所述目标账号登录所述目标应用的登录状态的时,发送所述第二登录凭证至所述第一设备。
- 根据权利要求4所述的方法,所述信任设备确定页面还包括所述第二设备的设备信息;所述方法还包括:将所述第二设备确定为所述信任设备。
- 根据权利要求8所述的方法,所述将所述第二设备确定为所述信任设备之后,还包括:基于所述第二设备的设备标识,生成所述第二设备对应的第三登录凭证;发送所述第三登录凭证至所述第二设备;保存所述第三登录凭证与所述第二设备的对应关系。
- 根据权利要求1所述的方法,所述方法还包括:在触发以所述用户账号在所述第一设备上登录所述目标应用的流程之后,删除所述第二登录凭证与所述第一设备的对应关系。
- 根据权利要求10所述的方法,所述方法还包括:基于所述第一设备的设备标识,生成第四登录凭证;保存所述第四登录凭证与所述第一设备的对应关系;发送所述第四登录凭证至所述第一设备。
- 根据权利要求1所述的方法,所述触发以所述用户账号在所述第一设备上登录所述目标应用的流程之后,还包括:注销所述用户账号在其他设备中的登录状态。
- 根据权利要求1所述的方法,所述方法还包括:判断所述用户账号在预设时间段内是否登录过多台设备,得到第五判断结果;若所述第五判断结果表示所述用户账号在预设时间段内登录过多台设备,则发送用于提示用户设置信任设备的提醒信息至所述多台设备中的至少一台设备;所述信任设备用于表示具有采用登录凭证在所述目标应用中登录所述用户账号的权限的设备。
- 一种登录流程的触发方法,包括:第一设备获取用户开启目标应用的第一操作;基于所述第一操作,显示登录页面;所述登录页面包括用户账号的账号信息以及用于表示将所述第一设备作为信任设备采用所述用户账号登录所述目标应用的登录操作控件;获取用户对所述登录操作控件的第二操作;基于所述第二操作,生成用于请求采用所述用户账号登录所述目标应用的登录请求;所述登录请求中包含所述第一登录凭证和所述第一设备的第一设备标识;发送所述登录请求至服务器,以便在所述第一登录凭证通过验证后所述服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
- 一种设置信任设备的方法,包括:第二设备获取服务器发送的包含历史登录设备的设备信息的信任设备设置页面;所述历史登录设备为采用用户账号登录过目标应用的设备;显示所述信任设备设置页面;所述信任设备设置页面中包含第一确认控件;获取用户对所述第一确认控件的第一确认操作;基于所述第一确认操作,生成信任设备设置请求;所述信任设备设置请求中包括所述历史登录设备中被用户确定设置为信任设备的设备标识;发送所述信任设备设置请求至所述服务器,以便所述服务器生成所述信任设备对应的登录凭证;所述登录凭证为用于采用所述用户账号登录所述目标应用的凭证。
- 一种登录流程的触发装置,包括:信息获取模块,用于获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所述第一设备的第一设备标识;凭证确定模块,用于确定所述第一设备标识对应的第二登录凭证;所述第二登录凭证为所述第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证;判断模块,用于判断所述第一登录凭证与所述第二登录凭证是否一致,得到第一判断结果;登录流程触发模块,用于若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
- 一种登录流程的触发装置,包括:第一操作获取模块,用于获取用户开启目标应用的第一操作;页面显示模块,用于基于所述第一操作,显示登录页面;所述登录页面包括用户账号的账号信息以及用于表示将所述第一设备作为信任设备采用所述用户账号登录所述目标应用的登录操作控件;第二操作获取模块,用于获取用户对所述登录操作控件的第二操作;请求生成模块,用于基于所述第二操作,生成用于请求采用所述用户账号登录所述目标应用的登录请求;所述登录请求中包含所述第一登录凭证和所述第一设备的第一设备标识;请求发送模块,用于发送所述登录请求至服务器,以便在所述第一登录凭证通过验证后所述服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
- 一种设置信任设备的装置,包括:设置页面获取模块,用于获取服务器发送的包含历史登录设备的设备信息的信任设备设置页面;所述历史登录设备为采用用户账号登录过目标应用的设备;设置页面显示模块,用于显示所述信任设备设置页面;所述信任设备设置页面中包含第一确认控件;确认操作获取模块,用于获取用户对所述第一确认控件的第一确认操作;设置请求生成模块,用于基于所述第一确认操作,生成信任设备设置请求;所述信任设备设置请求中包括所述历史登录设备中被用户确定设置为信任设备的设备标识;设置请求发送模块,用于发送所述信任设备设置请求至所述服务器,以便所述服务器生成所述信任设备对应的登录凭证;所述登录凭证为用于采用所述用户账号登录所述目标应用的登录凭证。
- 一种登录流程的触发设备,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个 处理器执行,以使所述至少一个处理器能够:获取第一设备发送的用于登录目标应用的登录请求;所述登录请求中包含第一登录凭证和所述第一设备的第一设备标识;确定所述第一设备标识对应的第二登录凭证;所述第二登录凭证为所述第一设备与所述目标应用的用户账号建立信任关系后生成的用于所述第一设备登录所述用户账号的凭证;判断所述第一登录凭证与所述第二登录凭证是否一致,得到第一判断结果;若所述第一判断结果表示所述第一登录凭证与所述第二登录凭证一致,则触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
- 一种登录流程的触发设备,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取用户开启目标应用的第一操作;基于所述第一操作,显示登录页面;所述登录页面包括用户账号的账号信息以及用于表示将所述第一设备作为信任设备采用所述用户账号登录所述目标应用的登录操作控件;获取用户对所述登录操作控件的第二操作;基于所述第二操作,生成用于请求采用所述用户账号登录所述目标应用的登录请求;所述登录请求中包含所述第一登录凭证和所述第一设备的第一设备标识;发送所述登录请求至服务器,以便在所述第一登录凭证通过验证后所述服务器触发以所述用户账号在所述第一设备上登录所述目标应用的流程。
- 一种设置信任设备的设备,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取服务器发送的包含历史登录设备的设备信息的信任设备设置页面;所述历史登录设备为采用用户账号登录过目标应用的设备;显示所述信任设备设置页面;所述信任设备设置页面中包含第一确认控件;获取用户对所述第一确认控件的第一确认操作;基于所述第一确认操作,生成信任设备设置请求;所述信任设备设置请求中包括所述历史登录设备中被用户确定设置为信任设备的设备标识;发送所述信任设备设置请求至所述服务器,以便所述服务器生成所述信任设备对应的登录凭证;所述登录凭证为用于采用所述用户账号登录所述目标应用的登录凭证。
- 一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现权利要求1至13中任一项所述的登录流程的触发方法或者权利要求14中所述的登录流程的触发方法或者权利要求15中所述的设置信任设备的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310286596.5A CN116405270A (zh) | 2023-03-17 | 2023-03-17 | 一种登录流程的触发方法、装置、设备及介质 |
CN202310286596.5 | 2023-03-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024193160A1 true WO2024193160A1 (zh) | 2024-09-26 |
Family
ID=87015249
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/141826 WO2024193160A1 (zh) | 2023-03-17 | 2023-12-26 | 一种登录流程的触发方法、装置、设备及介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116405270A (zh) |
WO (1) | WO2024193160A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116405270A (zh) * | 2023-03-17 | 2023-07-07 | 支付宝(杭州)信息技术有限公司 | 一种登录流程的触发方法、装置、设备及介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113690A1 (zh) * | 2016-12-23 | 2018-06-28 | 腾讯科技(深圳)有限公司 | 登录授权方法和装置、登录方法和装置 |
CN109274685A (zh) * | 2018-11-02 | 2019-01-25 | 深圳壹账通智能科技有限公司 | 多系统登录方法、装置、计算机设备和存储介质 |
CN113612756A (zh) * | 2021-07-29 | 2021-11-05 | 广州博冠信息科技有限公司 | 共享登录方法及装置、计算机可读存储介质、电子设备 |
CN116405270A (zh) * | 2023-03-17 | 2023-07-07 | 支付宝(杭州)信息技术有限公司 | 一种登录流程的触发方法、装置、设备及介质 |
-
2023
- 2023-03-17 CN CN202310286596.5A patent/CN116405270A/zh active Pending
- 2023-12-26 WO PCT/CN2023/141826 patent/WO2024193160A1/zh unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113690A1 (zh) * | 2016-12-23 | 2018-06-28 | 腾讯科技(深圳)有限公司 | 登录授权方法和装置、登录方法和装置 |
CN109274685A (zh) * | 2018-11-02 | 2019-01-25 | 深圳壹账通智能科技有限公司 | 多系统登录方法、装置、计算机设备和存储介质 |
CN113612756A (zh) * | 2021-07-29 | 2021-11-05 | 广州博冠信息科技有限公司 | 共享登录方法及装置、计算机可读存储介质、电子设备 |
CN116405270A (zh) * | 2023-03-17 | 2023-07-07 | 支付宝(杭州)信息技术有限公司 | 一种登录流程的触发方法、装置、设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN116405270A (zh) | 2023-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10834075B2 (en) | Declarative techniques for transaction-specific authentication | |
US10691793B2 (en) | Performance of distributed system functions using a trusted execution environment | |
WO2020253225A1 (zh) | 基于区块链的企业认证、认证追溯方法、装置及设备 | |
US10812477B2 (en) | Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device | |
CN110768968B (zh) | 基于可验证声明的授权方法、装置、设备及系统 | |
CN111311251B (zh) | 绑定处理方法、装置及设备 | |
CN107294999B (zh) | 信息验证处理方法、装置、系统、客户端及服务器 | |
CN109691057A (zh) | 经由私人内容分发网络可交换地取回敏感内容 | |
WO2024193160A1 (zh) | 一种登录流程的触发方法、装置、设备及介质 | |
CN110378091A (zh) | 一种身份验证方法、装置及设备 | |
CN109787989B (zh) | 一种密码修改方法、系统及目标服务器和存储介质 | |
EP3005210B1 (en) | Secure automatic authorized access to any application through a third party | |
JP2022502692A (ja) | 音声処理方法、装置、デバイス、プログラム及びコンピュータ記憶媒体 | |
US20200286006A1 (en) | Method and apparatus for secure check-in | |
RU2673401C2 (ru) | Способ и устройство для получения удостоверяющего документа | |
JP2017045462A (ja) | コンタクトリストを利用してユーザを認証するシステムおよび方法 | |
US9049211B1 (en) | User challenge using geography of previous login | |
CN113221142A (zh) | 授权业务的处理方法、装置、设备及系统 | |
CN111382422B (zh) | 在非法访问用户数据的威胁下更改账户记录的密码的系统和方法 | |
JP6494990B2 (ja) | サービスアカウントに対するユーザ認証方法とユーザ認証システム、および記憶媒体 | |
US20120284781A1 (en) | System and method for user friendly detection of spammers | |
WO2023239849A1 (en) | Internet protocol (ip) whitelisting for signed uniform resource locators (urls) | |
JP6378727B2 (ja) | メッセージ送信方法、メッセージ送信用プログラム、及びメッセージ送信装置 | |
CN118449783B (zh) | 一种账户操作控制方法、装置、介质及设备 | |
CN118449783A (zh) | 一种账户操作控制方法、装置、介质及设备 |