CN107454040B - Application login method and device - Google Patents

Application login method and device Download PDF

Info

Publication number
CN107454040B
CN107454040B CN201610375655.6A CN201610375655A CN107454040B CN 107454040 B CN107454040 B CN 107454040B CN 201610375655 A CN201610375655 A CN 201610375655A CN 107454040 B CN107454040 B CN 107454040B
Authority
CN
China
Prior art keywords
application
terminal
information
routing information
local area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610375655.6A
Other languages
Chinese (zh)
Other versions
CN107454040A (en
Inventor
陈慧明
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610375655.6A priority Critical patent/CN107454040B/en
Publication of CN107454040A publication Critical patent/CN107454040A/en
Application granted granted Critical
Publication of CN107454040B publication Critical patent/CN107454040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a login method and a login device for an application. The login method of the application comprises the following steps: acquiring account information of a first application logged in a terminal through a local area network, wherein the account information is an identity used for identifying a user logged in the first application; detecting whether a second application requests to log in a terminal in a local area network through account information or not; and when detecting that the second application requests to log in the terminal in the local area network through the account information, sending the account information to the second application through the local area network, wherein the second application executes login in the terminal according to the account information. The invention solves the technical problem of low login rate of the application on the terminal in the related technology.

Description

Application login method and device
Technical Field
The invention relates to the field of internet, in particular to a login method and a login device for an application.
Background
Currently, a user account in the internet is an account for identifying the user identity of a user in a specific project, such as a user account in a Tencent video mobile phone version and a Tencent video TV version. When a user installs applications with the same service on different terminals, the applications are usually logged in using the same account, such as WeChat, QQ, etc. When a user logs in an application on different terminals using the same account, the following methods are currently used:
(1) the application on each terminal needs to enter the user name and password of the user account separately to log in.
(2) The application on one terminal inputs a user name and a password to log in, the same application on the other terminal can provide a two-dimensional code to the logged-in terminal, and the logged-in terminal scans the two-dimensional code, so that the application on the terminal can log in.
For the application on the terminal which needs the user to log in for many times, especially the application on the terminal which uses the remote controller like a television, the method has the characteristics of inconvenient operation, unobvious entrance and the like, so the proportion of the user logging in the application of the terminal is low, and the popularization of the payment service and the implementation progress of the personalized recommendation based on the account background big data are slow.
An effective solution is not provided at present for the problem of low login rate of applications on the terminal in the related art.
Disclosure of Invention
The embodiment of the invention provides an application login method and device, which at least solve the technical problem of low login rate of an application on a terminal in the related art.
According to one aspect of the embodiment of the invention, a login method of an application is provided. The login method of the application comprises the following steps: acquiring account information of a first application logged in a terminal through a local area network, wherein the account information is an identity used for identifying a user logged in the first application; detecting whether a second application requests to log in a terminal in a local area network through account information or not; and when detecting that the second application requests to log in the terminal in the local area network through the account information, sending the account information to the second application through the local area network, wherein the second application executes login in the terminal according to the account information.
According to another aspect of the embodiment of the invention, the login device of the application is also provided. The login device of the application comprises: the terminal comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring account information of a first application logged in the terminal through a local area network, and the account information is an identity used for identifying a user logged in the first application; the detection unit is used for detecting whether the second application requests to log in the terminal in the local area network through the account information; and the sending unit is used for sending the account information to the second application through the local area network when detecting that the second application requests to log in the terminal in the local area network through the account information, wherein the second application executes login in the terminal according to the account information.
In the embodiment of the invention, the account information of the first application logged in the terminal through the local area network is acquired, and the account information is an identity used for identifying a user logged in the first application; detecting whether a second application requests to log in a terminal in a local area network through account information or not; when the fact that the second application requests to log in the terminal in the local area network through the account information is detected, the account information is sent to the second application through the local area network, the second application executes login in the terminal according to the account information, the purpose that the second application executes login by sharing the account information of the first application in the local area network is achieved, the technical effect of improving the login rate of the application on the terminal is achieved, and the technical problem that the login rate of the application on the terminal is low in the related technology is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a block diagram of a hardware structure of a computer terminal of a login method of an application according to an embodiment of the present invention;
fig. 2 is a flowchart of a login method of an application according to a first embodiment of the present invention;
fig. 3 is a flowchart of a method of detecting whether a second application requests to log in a terminal in a local area network through account information according to an embodiment of the present invention;
FIG. 4 is a flow chart of a method of determining whether a first application and a second application are legitimate, according to an embodiment of the invention;
fig. 5 is a flowchart of a login method of an application according to a second embodiment of the present invention;
fig. 6 is a flowchart of a method for determining whether a logged application corresponding to the same routing information as the second routing information exists in the local area network according to the embodiment of the present invention;
fig. 7 is a flowchart of a login method of an application according to a third embodiment of the present invention;
fig. 8 is a flowchart of a login method of an application according to a fourth embodiment of the present invention;
fig. 9 is a schematic diagram of a login apparatus of an application according to a first embodiment of the present invention;
fig. 10 is a schematic diagram of a login apparatus of an application according to a second embodiment of the present invention;
fig. 11 is a schematic diagram of a login apparatus of an application according to a third embodiment of the present invention;
fig. 12 is a schematic diagram of a login apparatus of an application according to a fourth embodiment of the present invention;
fig. 13 is a schematic diagram of a login apparatus of an application according to a fifth embodiment of the present invention; and
fig. 14 is a block diagram of a computer terminal according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present invention, there is provided an embodiment of a login method for an application, it should be noted that the steps illustrated in the flowchart of the figure may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in an order different than here.
The method provided by the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking the example of running on a computer terminal, fig. 1 is a hardware structure block diagram of a computer terminal of the login method of the application according to the embodiment of the present invention. As shown in fig. 1, the computer terminal 1 may comprise one or more (only one shown in the figure) processors 102 (the processors 102 may comprise, but are not limited to, a processing means such as a microprocessor MCU or a programmable logic device FPGA), a memory 104 for storing data, and a transmission means 106 for communication functions. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device. For example, the computer terminal 1 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store software programs and modules of application software, such as program instructions/modules corresponding to the login method of the application in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the software programs and modules stored in the memory 104, that is, implements the login method of the application. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 1 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 1. In one example, the transmission device 106 includes a Network adapter (NIC), which can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
Under the above operating environment, the present application provides a login method of an application as shown in fig. 2. The method can be applied to intelligent terminal equipment, and is executed by a processor in the intelligent terminal equipment, and the intelligent terminal equipment can be an intelligent mobile phone, a tablet personal computer and the like. The intelligent terminal device is provided with at least one application program, and the embodiment of the invention does not limit the types of the application programs, and can be a system application program or a software application program. The application program in the embodiment of the present invention includes at least one application function.
Fig. 2 is a flowchart of a login method of an application according to a first embodiment of the present invention. As shown in fig. 2, an alternative scheme of the login method of the application includes the following steps:
step S202, account information logged in on the terminal by the first application through the local area network is obtained.
In the scheme provided in the foregoing step S202 of the present application, account information that the first application logs in the terminal through the local area network is obtained, where the account information is an identity that is used to identify a user that logs in the first application. The first application is an application installed on the terminal, for example, a WeChat application, a QQ application, and the like installed on a mobile terminal or a computer. The first application logs in through account information when logging in on the terminal, wherein the account information is login information of the first application on the terminal, is an identification of a user identity in a specific item, and can be an account name of the user and a password corresponding to the account name. The first application successfully logs in the terminal through the local area network, and can log in the terminal through Wireless Fidelity (WIFI for short), account information of a user is recorded on the terminal, and the account information is obtained from the terminal. Optionally, the account information is stored after being acquired.
Step S204, detecting whether the second application requests to log in the terminal in the local area network through the account information.
In the solution provided in the foregoing step S204 of the present application, the second application is an application that is not logged in the terminal, and after the account information that the first application logs in the terminal through the local area network is acquired, it is detected whether the second application requests to log in the terminal through the account information in the local area network. The second application may be the same as the first application, may be different from the first application, may be registered on the same terminal as the first application, or may be registered on a different terminal from the first application. When the first application and the second application log in on the same terminal, the first application and the second application are different applications, and when the first application and the second application log in on different terminals, the first application and the second application can be the same or different, wherein the first application and the second application provide the same service for the first application and the second application, and the first application and the second application are different and mean that the first application and the second application provide different services. However, the account information of the second application when it logs in on the terminal is the same as the account information of the first application when it logs in on the terminal.
After the account information of the first application logged in on the terminal through the local area network is acquired, the account information of the logged-in first application can be shared in the local area network. Whether the second application requests to log in the terminal in the local area network through the account information shared by the first application is detected. Optionally, whether the second application meets a preset condition is detected, when the second terminal meets the preset condition, it is determined that the second application requests to log in the terminal in the local area network through the account information, and when the second terminal does not meet the preset condition, it is determined that the second application does not request to log in the terminal in the local area network through the account information, so that it is determined whether the second application which is not logged in and can log in through the account information exists in the local area network.
Step S206, when detecting that the second application requests to log in the terminal in the local area network through the account information, sending the account information to the second application through the local area network.
In the solution provided in step S206 of the present application, after detecting whether the second application requests to log in the lan through the account information, when detecting that the second application requests to log in the terminal through the account information, the account information of the first application is sent to the second application through the lan, after the second application receives the account information of the first application, the login is executed on the terminal according to the account information of the first application, and the login of the second application on the terminal can be realized without user intervention, so that the unregistered application executes login on the terminal according to the account information of the logged-in application, the login rate of the application on the terminal is increased, and the experience performance of the user in logging in the application is increased.
Through the steps S202 to S206, the scheme provided by the present invention can realize that account information logged in on the terminal through the local area network by obtaining the first application, wherein the account information is an identity for identifying a user logging in the first application; detecting whether a second application requests to log in a terminal in a local area network through account information or not; when the second application requests to log in the terminal in the local area network through the account information, the account information is sent to the second application through the local area network, the second application executes logging in the terminal according to the account information, the technical effect of improving the logging rate of the application on the terminal is achieved, and the technical problem that the logging rate of the application on the terminal is low in the related technology is solved.
As an optional implementation manner, the step S204 of detecting whether the second application requests to log in the terminal in the local area network through the account information includes: whether the second application requests to log in the terminal in the local area network through the account information is detected by detecting first routing information of the application and second routing information of the second routing and judging whether the first application and the second application are legal or not.
Fig. 3 is a flowchart of a method for detecting whether a second application requests to log in a terminal in a local area network through account information according to an embodiment of the present invention. As shown in fig. 3, the detecting whether the second application requests to log in the terminal in the local area network through the account information includes the following steps:
step S301, respectively obtaining first routing information of the first application and second routing information of the second application.
In the solution provided in step S301 of the present application, a first application logged in on a terminal may report account information and first routing information, and a second application not logged in on the terminal only reports second routing information, where the first routing information and the second routing information include relevant information of a router. The method comprises the steps of respectively obtaining first routing information of a first application and second routing information of a second application, and storing the first routing information and the second routing information, so that the routes accessed by the first application and the second application are determined through the first routing information and the second routing information.
Step S302, determining whether the first routing information and the second routing information are the same routing information.
In the solution provided in the foregoing step S302 of the present application, after the first routing information of the first application and the second routing information of the second application are respectively obtained, it is determined whether the first routing information and the second routing information are the same routing information, that is, it is determined whether information included in the first routing information and the second routing information is the same, so that it is ensured that the collected routing information has uniqueness by determining whether the first routing information and the second routing information are the same routing information, and further it is ensured that the first application and the second application access the same route.
Step S303, determining whether the first application and the second application are legal.
In the solution provided in step S303 of the present application, it is determined whether the first application and the second application are legal, that is, whether the first application and the second application are applications that the terminal allows to log in, and whether the first application and the second application are legal may be determined through the identification codes of the first application and the second application.
Step S304, determining that the second application request is detected to log in the terminal in the local area network through the account information.
In the solution provided in step S304 of the present application, if it is determined that the first routing information and the second routing information are the same routing information and the first application and the second application are legal, it is determined that the second application is detected to request to log in the terminal in the local area network through the account information under the condition that the legal logged-in first application and the legal unregistered second application access the same route.
The embodiment respectively acquires first routing information of a first application and second routing information of a second application; judging whether the first routing information and the second routing information are the same routing information or not; judging whether the first application and the second application are legal or not; if the first routing information and the second routing information are judged to be the same routing information, and the first application and the second application are legal, the fact that the second application requests to log in the terminal in the local area network through the account information is determined to be detected, and the fact that the unregistered application in the local area network can log in through the account information of the logged application is achieved.
As another alternative implementation, the step S303 determines whether the first application and the second application are legal or not, and may determine whether the first application and the second application are legal or not by using the first identification information of the first application and the second identification information of the second application.
Fig. 4 is a flowchart of a method of determining whether a first application and a second application are legitimate according to an embodiment of the present invention. As shown in fig. 4, the determining whether the first application and the second application are legal includes the following steps:
step S401, respectively acquiring first identification information of the first application and second identification information of the second application.
In the solution provided in the foregoing step S401 of the present application, first identification information of a first application and second identification information of a second application are respectively obtained. The first identification information is identification information of a first application, the second identification information is identification information of a second application, the first identification information and the second identification information may be Global Unique Identifiers (GUIDs), the GUIDs are digital identifiers with a binary length of 128 bits generated by an algorithm, the GUIDs are mainly used in a network or a system with a plurality of nodes and a plurality of computers, and any computer and computer cluster cannot generate two identical GUIDs, so that the first application and the second application can be represented by the GUIDs. The first and second identification information may also be QUA identification codes.
Step S402, judging whether the first application and the second application are legal or not according to the first identification information and the second identification information respectively.
In the solution provided in the foregoing step S402 of the present application, after the first identification information of the first application and the second identification information of the second application are respectively obtained, whether the first application and the second application are legal is respectively determined according to the first identification information and the second identification information, that is, whether the first application and the second application are applications that the terminal allows to log in is determined according to the first identification information and the second identification information. Alternatively, if the second application is illegal, the second application is not allowed to log in on the terminal through the account information of the first user.
According to the embodiment, the first identification information of the first application and the second identification information of the second application are respectively obtained, and whether the first application and the second application are legal or not is judged according to the first identification information and the second identification information, so that the legality of the first application and the legality of the second application are judged.
As an optional implementation manner, before obtaining account information that a first application logs in a terminal through a local area network, the validity of a second application is judged through identification information of the second application, and it is determined whether a logged application corresponding to routing information that is the same as the second routing information exists in the local area network, so as to determine the first application.
Fig. 5 is a flowchart of a login method of an application according to a second embodiment of the present invention. As shown in fig. 5, the login method of the application includes the following steps:
in step S501, second identification information of the second application is acquired.
In the solution provided in the foregoing step S501 of the present application, before obtaining account information that a first application logs in a terminal through a local area network, an unregistered second application accesses the local area network, and obtains second identification information of the second application. The second identification information includes, but is not limited to, GUID and QUA.
Step S502, judging whether the second application is legal or not according to the second identification information.
In the solution provided in the foregoing step S502 of the present application, after the second identification information of the second application is acquired, whether the second application is legal is determined according to the second identification information. If the second application is judged to be legal according to the second identification information, step S503 is executed.
Step S503 is to determine whether the logged-in application corresponding to the routing information identical to the second routing information exists in the local area network.
In the solution provided in step S503 of the present application, if it is determined that the second application is legal according to the second identification information, it is determined whether a logged application corresponding to the routing information that is the same as the second routing information exists in the local area network, that is, whether routing information that is the same as the second routing information exists is searched in the local area network, if the routing information that is the same as the second routing information is found in the local area network, it is determined whether an application corresponding to the routing information is logged in, and if it is determined that the application corresponding to the routing information is logged in, it is determined that a logged application corresponding to the routing information that is the same as the second routing information exists in the local area network.
Step S504, the logged application is determined to be the first application.
In the solution provided in step S504 above, if it is determined that the logged application corresponding to the routing information that is the same as the second routing information exists in the local area network, the logged application is determined to be the first application, so that the first application that has the same routing information as the second routing information and is logged on the terminal is searched in the local area network.
In the embodiment, before the account information that the first application logs in the terminal through the local area network is obtained, the second identification information of the second application is obtained, whether the second application is legal is judged according to the second identification information, if the second application is judged to be legal according to the second identification information, whether a logged application corresponding to the routing information which is the same as the second routing information exists in the local area network is judged, and if the logged application corresponding to the routing information which is the same as the second routing information exists in the local area network is judged, the logged application is determined to be the first application, so that the logged first application is searched in the local area network.
As an optional implementation manner, the step S503 of determining whether the logged application corresponding to the routing information that is the same as the second routing information exists in the local area network includes: and determining that the logged application corresponding to the routing information which is the same as the second routing information exists by acquiring the MAC address, the SSID and the user outlet IP in the second routing information.
Fig. 6 is a flowchart of a method for determining whether a logged-in application corresponding to the same routing information as the second routing information exists in the local area network according to the embodiment of the present invention. As shown in fig. 6, the method for determining whether the logged-in application corresponding to the routing information that is the same as the second routing information exists in the local area network includes the following steps:
step S601, acquiring the MAC address, SSID, and user exit IP in the second routing information.
In the solution provided in the foregoing step S601 of the present application, the second routing information includes a Media Access Control (MAC) address of a router in the lan, that is, a physical address of the router, where a host has a MAC address and each network location has an IP address dedicated to the host; acquiring a Service Set Identifier (SSID) of the wireless router, wherein the SSID divides the wireless local area network into a plurality of sub-networks needing different identity authentication, each sub-network needs independent identity authentication, and only a user passing the identity authentication can enter the corresponding sub-network, so that unauthorized users are prevented from entering the local network; and acquiring the user outlet IP, namely acquiring the Internet address of the user.
Step S602, searching in a preset database whether there is routing information that is the same as the MAC address, SSID, and user exit IP.
In the solution provided in the foregoing step S602 in the present application, the MAC address, SSID, and user exit IP are stored in the preset database. After the MAC address, the SSID and the user outlet IP in the second routing information are obtained, whether the routing information which is the same as the MAC address, the SSID and the user outlet IP in the second routing information exists or not is searched in a preset database, and the MAC address, the SSID and the user outlet IP in the second routing information are verified.
Step S603, it is determined that there is a logged-in application corresponding to the same routing information as the second routing information.
In the solution provided in step S603 of the present application, if the routing information that is the same as the MAC address, the SSID, and the user exit IP is found in the preset database, it is determined that there is a logged-in application corresponding to the routing information that is the same as the second routing information, where the logged-in application is the first application.
In the embodiment, the MAC address, the SSID and the user exit IP in the second routing information are obtained; searching whether routing information identical to the MAC address, the SSID and the user outlet IP exists in a preset database; if the routing information which is the same as the MAC address, the SSID and the user outlet IP is found in the preset database, the logged application corresponding to the routing information which is the same as the second routing information is determined to exist, and the judgment of whether the logged application corresponding to the routing information which is the same as the second routing information exists in the local area network is realized.
As an optional implementation, sending the account information to the second application through the local area network includes: and sending the OPENID of the first application to a second application, wherein the second application requests to acquire the TOKEN of the first application according to the OPENID of the first application, and outputting prompt information for prompting to log in the second application after the second application acquires the TOKEN of the first application.
After determining that the logged-in application corresponding to the routing information identical to the second routing information exists, acquiring the OPENID of the first application, wherein the OPENID is an identification number identification framework with a user as a center and has openness and dispersity. And sending the OPENID of the first application to the second application, and after receiving the OPENID of the first application, the second application requests to acquire a computer TOKEN (TOKEN) of the first application according to the OPENID of the first application. And after the second application acquires the TOKEN of the first application, outputting prompt information for prompting the user to log in the second application so as to prompt the user that the user can log in the second application on the terminal.
As an optional implementation manner, the obtaining account information that the first application logs in the terminal through the local area network includes: the method for acquiring account information of a first application logged in a first terminal through a local area network and detecting whether a second application requests to log in the terminal through the account information comprises the following steps: and detecting whether the second application requests to log in the second terminal in the local area network through the account information.
The first application logs in on the first terminal, the second application logs in on the second terminal, the first terminal and the second terminal are different terminals, for example, the first terminal is a mobile terminal, and the second terminal is a computer in the same local area network with the first terminal. The first application logs in the first terminal through the local area network, and account information of the first application logged in the first terminal through the local area network is obtained. The second application logs in the second terminal through the account information of the first application, and detects whether the second application requests to log in the second terminal in the local area network through the account information, that is, whether the second application meets the preset condition of logging in the second terminal, for example, whether the second routing information of the second application is the same as the first routing information of the first application and whether the first application and the second application are legal is detected, if the second routing information of the second application is the same as the first routing information of the first application and the second application are legal are detected, the second application is detected to meet the preset condition of logging in the second terminal, so that the second application is detected to log in the second terminal in the local area network through the account information, the purpose of fast logging in the local area network by sharing the account information by multiple terminals is realized, and the experience performance of logging in the applications on the multiple terminals by a user is improved, and further achieves the technical effect of improving the login rate of the application on the terminal.
The technical solution of the present invention will be described below with reference to preferred embodiments.
Fig. 7 is a flowchart of a login method of an application according to a third embodiment of the present invention. As shown in fig. 7, the login method of the application includes the following steps:
step S701, determining a first application of the first terminal.
A first application requiring shared account information is determined on a first terminal.
Step S702, judging whether the first application is logged in.
After determining the first application of the first terminal, it is determined whether the first application is logged in. If the first application is judged to be logged in, step S703 is executed.
Step S703, collecting account information of the first application.
If the first application is logged in, the first terminal has account information of the first application, that is, login information of the first application, such as an account name and a password corresponding to the account name, logged in by the first application on the first terminal. And when the first application is judged to be logged in at the first terminal, collecting account information of the first application.
Step S704, collect the first routing information of the first application.
The account information of the first application is collected while the first routing information of the first application is collected. The first routing information includes, but is not limited to, the MAC address of the router, the SSID of the wireless router, and the user egress IP.
Step S705, determining a second application of the second terminal.
And determining a second application on the second terminal while the steps S701 to S704 are executed, wherein the second application performs the application to be logged in on the second terminal for receiving the account information of the first application.
Step S706, determining whether the second application is logged in.
After determining the second application of the second terminal, it is determined whether the second application is logged in. If it is determined that the second application is logged in, step S707 is performed.
Step S707 collects second routing information of the second application.
Second routing information for the second application is collected, including but not limited to the MAC address of the router, the SSID of the wireless router, and the user egress IP.
Step S708, reporting the first routing information and the second routing information to the account management system.
After the first routing information and the second routing information are collected, the first routing information and the second routing information are reported to an account management system for storage and verification.
Step S709, determines whether the first routing information and the second routing information are the same, and determines whether the first application and the second application are legal.
And judging whether the MAC address of the router, the SSID of the wireless router and the user outlet IP in the first routing information and the second routing information are the same, and judging whether the first application and the second application are legal according to the first identification information of the first application and the second identification information of the second application respectively. If the first routing information and the second routing information are the same, and the first application and the second application are judged to be legal, step S710 is executed.
Step S710, sending the account information of the first application to the second application.
If the first routing information and the second routing information are identical, and the first application and the second application are judged to be legal, the account information of the first application is sent to the second application, so that the second application can realize automatic login according to the account information of the first application, namely, when the legal logged-in application and the legal unregistered application start to operate and access the same route in a local area network, the account management system can return the account information of the logged-in application to the unregistered application, so that the unregistered application can realize automatic login according to the account information of the logged-in application.
The embodiment is applied to an account sharing login system, realizes a technical scheme of realizing multi-terminal sharing login in the local area network, and shares the account information logged in by the user in the local area network. And reporting the current account information and the routing information to an account management background by the application running in different terminals, and storing and verifying the account information and the routing information by the account management background. When the legal logged-in application and the legal non-logged-in application start to run and the same route is accessed in the local area network, the account management system can return the account information of the logged-in application to the non-logged-in application, and the non-logged-in application realizes automatic login according to the account information.
The embodiment determines a first application of a first terminal, judges whether the first application is logged in, collects account information of the first application when the first application is judged to be logged in, collects first routing information of the first application, determines a second application of a second terminal at the same time, judges whether the second application is logged in, collects second routing information of the second application when the second application is judged not to be logged in, reports the first routing information and the second routing information to an account management system, judges whether the first routing information and the second routing information are the same, judges whether the first application and the second application are legal, sends the account information of the first application to the second application when the first routing information and the second routing information are the same and the first application and the second application are judged to be legal, so that the second application realizes automatic login according to the account information of the first application, the method and the device realize the quick login of the multi-terminal shared login in the local area network, improve the experience performance of the user for logging in the application on the plurality of terminals, and further achieve the technical effect of improving the login rate of the application on the terminal.
Fig. 8 is a flowchart of a login method of an application according to a fourth embodiment of the present invention. As shown in fig. 8, the login method of the application includes the following steps:
step S801, a second application is accessed.
The second application is an application which is not logged in the terminal, and the second application is accessed in the local area network.
Step S802, obtain second identification information of the second application.
After accessing the second application, second identification information of the second application is obtained, the second identification information including, but not limited to, GUID and QUA.
Step S803, determine whether the second application is legal according to the second identification information.
After the second identification information of the second application is obtained, whether the second application is legal is judged according to the second identification information, and if the second application is judged to be legal according to the second identification information, the step S804 is executed.
Step S804, a check is performed on the second routing information of the second application.
And if the second application is judged to be legal according to the second identification information, acquiring second routing information of the second application, and checking the second routing information.
Step S805, the preset database is searched for the routing information of the logged-in application that is consistent with the MAC address, SSID, and IP of the second application.
And the preset database stores the MAC address, SSID and IP of the application. And when the second routing information of the second application is checked, searching the routing information of the logged application which is consistent with the MAC address, the SSID and the IP of the second application in a preset database.
Step S806 determines whether the first application is found.
If the routing information of the logged-in application, which is consistent with the MAC address, SSID, and IP of the second application, is found in the preset database, it is determined that the first application is found, and the first application is the application logged in the terminal through the local area network, and then step S807 is executed.
Step S807, access the first application and issue an OPENID of the first application.
And if the first application is found, accessing the first application, acquiring the OPENID of the first application and issuing the OPENID of the first application.
Step S808, the second application requests to obtain TOKEN of the first application according to the OPENID of the first application.
And the second application receives the OPENID of the first application and requests to acquire the TOKEN of the first application according to the OPENID of the first application.
Step S809, outputting prompt information for prompting that the second application is registerable.
And after the second application requests to acquire the TOKEN of the first application according to the OPENID of the first application, outputting prompt information to prompt the user that the second application can log in the terminal.
The embodiment is used for the account system to judge whether the application sharing the account information exists in the local area network. In this embodiment, it needs to be confirmed at 100% that the first application and the second application used by the user are legitimate and that the first application and the second application access the same route. To ensure this, the collected routing information is unique, and includes but is not limited to: the MAC address of the router, the SSID of the wireless router, the user egress IP, second identification information for the second application including, but not limited to, GUID, QUA, OPENID and TOKEN for which the first application collects logins. When the second application which is not logged in starts to run, the account management system searches whether a logged application which is consistent with the MAC address, the SSID and the IP exists in a preset database, if the logged application is found, the logged application is the first application, the second application obtains the account information of the first application, and the rapid login is realized according to the account information of the first application.
The embodiment accesses a second application, acquires second identification information of the second application, judges whether the second application is legal according to the second identification information, when the second application is legal, checks second routing information of the second application, searches routing information of a logged application which is consistent with an MAC address, an SSID and an IP of the second application in a preset database, judges whether the first application is searched, if the first application is searched, accesses the first application and issues an OPENID of the first application, the second application acquires a TOKEN of the first application according to an OPENID request of the first application, and outputs prompt information for prompting the second application to log in, so that quick login of sharing login of multiple terminals in a local area network is realized, the experience performance of logging in the applications of a user on multiple terminals is improved, and the technical effect of improving the login rate of the applications on the terminals is further achieved.
According to the embodiment, the account information of the first application and the second application which are accessed into the same local area network is shared, the terminal can be logged in without the intervention of a user, the problem that the login rate of some terminals is low at present is solved, and a foundation is laid for the personalized recommendation implementation of the payment page and the background big data based on the account number.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium, such as a readable Memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, and includes several instructions for enabling a terminal device (which may be a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
According to the embodiment of the invention, the device for implementing the login method of the application is also provided. Fig. 9 is a schematic diagram of a login apparatus of an application according to a first embodiment of the present invention. As shown in fig. 9, the login device of the application includes: a first acquisition unit 10, a detection unit 20 and a transmission unit 30.
The first obtaining unit 10 is configured to obtain account information that the first application logs in the terminal through the local area network, where the account information is an identity that is used to identify a user logging in the first application.
The first application is an application installed on the terminal, for example, a WeChat application, a QQ application, and the like installed on a mobile terminal or a computer. The first application logs in through account information when logging in on the terminal, wherein the account information is login information of the first application on the terminal, is an identification of a user identity in a specific item, and can be an account name of the user and a password corresponding to the account name. The first application logs in the terminal through the local area network, can log in the terminal through the WIFI, records account information of a user on the terminal, and acquires the account information from the terminal through the first acquiring unit 10. Alternatively, the account information is stored after the first acquisition unit 10 acquires the account information.
The detecting unit 20 is configured to detect whether the second application requests to log in the terminal in the local area network through the account information.
After the first acquiring unit 10 acquires the account information that the first application logs in the terminal through the local area network, it is detected by the detecting unit 20 whether the second application requests to log in the terminal through the account information in the local area network. The second application may be the same as the first application, may be different from the first application, may be registered on the same terminal as the first application, or may be registered on a different terminal from the first application. When the first application and the second application log in on the same terminal, the first application and the second application are different applications, and when the first application and the second application log in on different terminals, the first application and the second application can be the same or different, wherein the first application and the second application provide the same service for the first application and the second application, and the first application and the second application are different and mean that the first application and the second application provide different services. However, the account information of the second application when it logs in on the terminal is the same as the account information of the first application when it logs in on the terminal.
After the first acquiring unit 10 acquires the account information that the first application logs in on the terminal through the local area network, the account information of the first application that has logged in may be shared within the local area network. The detection unit 20 detects whether the second application requests the account information shared by the first application to log in the terminal in the local area network. Optionally, the detecting unit 20 detects whether the second application meets a preset condition, when the second terminal meets the preset condition, it is determined that the detecting unit 20 detects that the second application requests to log in the terminal in the lan through the account information, and when the second terminal does not meet the preset condition, it is determined that the detecting unit 20 detects that the second application does not request to log in the terminal in the lan through the account information, so that it is determined whether there is the second application which is not logged in the lan and can log in through the account information.
The sending unit 30 is configured to send the account information to the second application through the local area network when it is detected that the second application requests to log in the terminal through the account information in the local area network, where the second application performs login in the terminal according to the account information.
After the detecting unit 20 detects whether the second application requests to log in the local area network through the account information, when it is detected that the second application requests to log in the terminal in the local area network through the account information, the sending unit 30 sends the account information of the first application to the second application through the local area network, after the second application receives the account information of the first application, the login of the second application on the terminal is executed according to the account information of the first application, and the login of the second application on the terminal can be realized without user intervention in the process, so that the login of the unregistered application on the terminal is executed according to the account information of the logged-in application, the login rate of the application on the terminal is improved, and the experience performance of the user for logging in the application is further improved.
In this embodiment, the first obtaining unit 10 obtains account information that the first application logs in the terminal through the local area network, where the account information is an identity for identifying a user logging in the first application. Whether the second application requests to log in the terminal in the local area network through the account information is detected through the detection unit 20, when the second application requests to log in the terminal in the local area network through the account information is detected, the sending unit 30 sends the account information to the second application through the local area network, the second application performs logging in the terminal according to the account information, the logging rate of the application on the terminal is improved, and the technical problem that the logging rate of the application on the terminal is low in the related technology is solved.
Fig. 10 is a schematic diagram of a login apparatus of an application according to a second embodiment of the present invention. As shown in fig. 10, the login device of the application includes: a first acquisition unit 10, a detection unit 20 and a transmission unit 30. Wherein, the detecting unit 20 includes: a first obtaining module 21, a first judging module 22, a second judging module 23 and a first determining module 24.
The first acquiring unit 10, the detecting unit 20 and the sending unit 30 of this embodiment have the same functions as those of the login device of the application of the first embodiment of the present invention, and are not described herein again.
The first obtaining module 21 is configured to obtain first routing information of a first application and second routing information of a second application, respectively.
The first determining module 22 is configured to determine whether the first routing information and the second routing information are the same routing information.
A second determining module 23, configured to determine whether the first application and the second application are legal.
The first determining module 24 is configured to determine that the second application request logs in the terminal in the local area network through the account information when it is determined that the first routing information and the second routing information are the same routing information and the first application and the second application are legal.
Fig. 11 is a schematic diagram of a login apparatus of an application according to a third embodiment of the present invention. As shown in fig. 11, the login device of the application includes: a first acquisition unit 10, a detection unit 20 and a transmission unit 30. Wherein, the detecting unit 20 includes: a first obtaining module 21, a first judging module 22, a second judging module 23 and a first determining module 24. The second determination module 23 includes: an acquisition submodule 231 and a determination submodule 232.
The first obtaining unit 10, the detecting unit 20, the sending unit 30, the first obtaining module 21, the first judging module 22, the second judging module 23 and the first determining module 24 of this embodiment are the same as those of the login device of the application of the second embodiment of the present invention, and are not described herein again.
The obtaining sub-module 231 is configured to obtain first identification information of the first application and second identification information of the second application, respectively.
The determining sub-module 232 is configured to determine whether the first application and the second application are legal according to the first identification information and the second identification information, respectively.
Fig. 12 is a schematic diagram of a login apparatus of an application according to a fourth embodiment of the present invention. As shown in fig. 12, the login device of the application includes: a first acquisition unit 10, a detection unit 20 and a transmission unit 30. Wherein, the detecting unit 20 includes: a first obtaining module 21, a first judging module 22, a second judging module 23 and a first determining module 24. The login device of the application further comprises: a second acquiring unit 40, a first judging unit 50, a second judging unit 60 and a determining unit 70.
The first obtaining unit 10, the detecting unit 20, the sending unit 30, the first obtaining module 21, the first judging module 22, the second judging module 23 and the first determining module 24 of this embodiment are the same as those of the login device of the application of the second embodiment of the present invention, and are not described herein again.
And the second obtaining list 40 is used for obtaining second identification information of the second application before obtaining the account information of the first application logged on the terminal through the local area network.
A first judging unit 50, configured to judge whether the second application is legal according to the second identification information.
The second determining unit 60 is configured to determine whether the second application is legal according to the second identification information, and determine whether a logged application corresponding to the routing information that is the same as the second routing information exists in the local area network.
The determining unit 70 is configured to determine that the logged application is the first application when it is determined that the logged application corresponding to the routing information that is the same as the second routing information exists in the local area network.
Fig. 13 is a schematic diagram of a login apparatus of an application according to a fifth embodiment of the present invention. As shown in fig. 13, the login device of the application includes: a first acquisition unit 10, a detection unit 20 and a transmission unit 30. Wherein, the detecting unit 20 includes: a first obtaining module 21, a first judging module 22, a second judging module 23 and a first determining module 24. The login device of the application further comprises: a second acquiring unit 40, a first judging unit 50, a second judging unit 60 and a determining unit 70. The second determination unit 60 comprises a second obtaining module 61, a finding module 62 and a second determining module 63.
The first obtaining unit 10, the detecting unit 20, the sending unit 30, the first obtaining module 21, the first judging module 22, the second judging module 23, the first determining module 24, the second obtaining unit 40, the first judging unit 50, the second judging unit 60, and the determining unit 70 of this embodiment are the same as those of the login device applied in the fourth embodiment of the present invention, and are not described herein again.
And a second obtaining module 61, configured to obtain the MAC address, SSID, and user exit IP in the second routing information.
And the searching module 62 is configured to search in a preset database whether there is routing information that is the same as the MAC address, the SSID, and the user exit IP.
The second determining module 63 is configured to find, in the preset database, routing information that is the same as the MAC address, the SSID, and the user exit IP, and determine that there is a logged-in application corresponding to the routing information that is the same as the second routing information.
Optionally, the sending unit 30 is configured to send the OPENID of the first application to the second application, where the second application requests to acquire the TOKEN of the first application according to the OPENID of the first application, and after the second application acquires the TOKEN of the first application, output prompt information for prompting to log in the second application.
Optionally, the first obtaining unit 10 is configured to obtain account information that the first application logs in the first terminal through the local area network, and the detecting unit 20 is configured to detect whether a second application that is not logged in the second terminal requests to log in the second terminal through the account information.
According to the embodiment of the invention, the account information which is logged in by the user is shared in the local area network, so that the technical scheme that the application rapidly logs in the terminal according to the shared account information is realized. The method comprises the steps that current account information and routing information of applications running in different terminals are reported to an account management background, the current account information and the routing information are obtained and stored through a first obtaining unit 10, whether an unregistered application requests to log in a terminal in a local area network through the account information or not is detected through a detecting unit 10, when a legal logged-in application and a legal unregistered application start to run and access the same route, an account management system returns information of the logged-in application to the unregistered application through a sending unit 30, and the unregistered application realizes automatic login according to the account information.
In the invention, the detection unit 20 is required to detect that the application used by the user is legal and accesses the same route, in order to ensure that the collected route information has uniqueness, when the unregistered application starts to run, the account management system searches whether the logged application consistent with the MAC address, the SSID and the IP exists in a preset database, and if the logged application consistent with the MAC address, the SSID and the IP is found, the unregistered application starts to rapidly log in the terminal, thereby improving the logging rate of the application on the terminal.
According to the scheme, the account information is shared for the applications accessed into the same local area network, login can be achieved without user intervention, the problem that the login rate ratio on some terminals is low at present is solved, and a foundation is laid for personalized recommendation and implementation of payment pages and background big data based on account numbers.
The embodiment of the invention also provides a storage medium. Optionally, in this embodiment, the storage medium may be configured to store program codes executed by the login method of the application of the embodiment.
Optionally, in this embodiment, the storage medium may be located in at least one network device of a plurality of network devices of a computer network.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps:
the method comprises the steps of obtaining account information of a first application logged in a terminal through a local area network, wherein the account information is an identity used for identifying a user logged in the first application.
And detecting whether the second application requests to log in the terminal in the local area network through the account information.
And when detecting that the second application requests to log in the terminal in the local area network through the account information, sending the account information to the second application through the local area network, wherein the second application executes login in the terminal according to the account information.
Optionally, the storage medium is further arranged to store program code for performing the steps of: respectively acquiring first routing information of a first application and second routing information of a second application; judging whether the first routing information and the second routing information are the same routing information or not; judging whether the first application and the second application are legal or not; and if the first routing information and the second routing information are judged to be the same routing information and the first application and the second application are legal, determining that the second application requests to log in the terminal in the local area network through the account information.
Optionally, the storage medium is further arranged to store program code for performing the steps of: respectively acquiring first identification information of a first application and second identification information of a second application; and judging whether the first application and the second application are legal or not according to the first identification information and the second identification information respectively.
Optionally, the storage medium is further arranged to store program code for performing the steps of: before acquiring account information of a first application logged in a terminal through a local area network, acquiring second identification information of a second application; judging whether the second application is legal or not according to the second identification information; if the second application is judged to be legal according to the second identification information, judging whether a logged application corresponding to the routing information which is the same as the second routing information exists in the local area network or not; and if the logged application corresponding to the routing information which is the same as the second routing information exists in the local area network, determining the logged application as the first application.
Optionally, the storage medium is further arranged to store program code for performing the steps of: acquiring the MAC address, SSID and user outlet IP in the second routing information; searching whether routing information identical to the MAC address, the SSID and the user outlet IP exists in a preset database; and if the routing information which is the same as the MAC address, the SSID and the user outlet IP is found in the preset database, determining that the logged application corresponding to the routing information which is the same as the second routing information exists.
Optionally, the storage medium is further arranged to store program code for performing the steps of: and sending the OPENID of the first application to a second application, wherein the second application requests to acquire the TOKEN of the first application according to the OPENID of the first application, and outputting prompt information for prompting to log in the second application after the second application acquires the TOKEN of the first application.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the method comprises the steps of obtaining account information of a first application which logs in a first terminal through a local area network, and detecting whether a second application which does not log in a second terminal requests to log in the second terminal in the local area network through the account information.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing program codes, such as a U disk, a read only memory ROM, a random access memory RAM, a removable hard disk, a magnetic disk, or an optical disk.
The embodiment of the invention also provides a computer terminal, which can be any computer terminal device in a computer terminal group. Optionally, in this embodiment, the computer terminal may also be replaced with a terminal device such as a mobile terminal.
Optionally, in this embodiment, the computer terminal may be located in at least one network device of a plurality of network devices of a computer network.
Alternatively, fig. 14 is a block diagram of a computer terminal according to an embodiment of the present invention. As shown in fig. 14, the computer terminal a may include: one or more processors 141 (only one shown), memory 143, and transmission device 145.
The memory 143 may be used to store software programs and modules, such as program instructions/modules corresponding to the method and apparatus for logging in an application in the embodiment of the present invention, and the processor 141 executes various functional applications and data processing by running the software programs and modules stored in the memory 143, that is, implements the above-mentioned method for logging in an application. Memory 143 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, memory 143 may further include memory located remotely from processor 141, which may be connected to computer terminal a via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 145 is used to receive or transmit data via a network. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 145 includes a network adapter NIC that is connectable to a router via a network cable to communicate with the internet or a local area network. In one example, the transmission device 145 is a radio frequency RF module for communicating with the internet by wireless means.
Specifically, the memory 143 is used to store preset action conditions, information of preset authorized users, and application programs.
Processor 141 may invoke the information and applications stored in memory 143 via transfer device 145 to perform the following steps:
optionally, the processor 141 may further execute program codes of the following steps:
acquiring account information of a first application logged in a terminal through a local area network, wherein the account information is an identity used for identifying a user logged in the first application;
detecting whether a second application requests to log in a terminal in a local area network through account information or not;
and when detecting that the second application requests to log in the terminal in the local area network through the account information, sending the account information to the second application through the local area network, wherein the second application executes login in the terminal according to the account information.
Optionally, the specific examples in this embodiment may refer to the examples described in embodiment 1 and embodiment 2, and this embodiment is not described herein again.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing one or more computer devices (which may be personal computers, servers, network devices, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (13)

1. A login method of an application is characterized by comprising the following steps:
acquiring account information of a first application logged in a terminal through a local area network, wherein the account information is an identity used for identifying a user logged in the first application;
detecting whether a second application requests to log in the terminal in the local area network through the account information or not; and
when detecting that the second application requests to log in the terminal in the local area network through the account information, sending the account information to the second application through the local area network, wherein the second application executes logging in the terminal according to the account information;
the obtaining of the account information that the first application logs in the terminal through the local area network includes: acquiring account information logged in by the first application on a first terminal through the local area network;
detecting whether the second application requests to log in the terminal in the local area network through the account information comprises: and detecting whether a second application which is not logged on a second terminal requests to log on the second terminal in the local area network through the account information.
2. The method of claim 1, wherein detecting whether a second application that is not logged on to a second terminal requests to log on to the second terminal within the local area network through the account information comprises:
respectively acquiring first routing information of the first application and second routing information of the second application;
judging whether the first routing information and the second routing information are the same routing information or not;
judging whether the first application and the second application are legal or not; and
and if the first routing information and the second routing information are judged to be the same routing information and the first application and the second application are legal, determining that the second application requests to log in the second terminal in the local area network through the account information.
3. The method of claim 2, wherein determining whether the first application and the second application are legitimate comprises:
respectively acquiring first identification information of the first application and second identification information of the second application; and
and judging whether the first application and the second application are legal or not according to the first identification information and the second identification information respectively.
4. The method according to claim 2, wherein before obtaining the account information that the first application logs in on the terminal through the local area network, the method further comprises:
acquiring second identification information of the second application;
judging whether the second application is legal or not according to the second identification information;
if the second application is judged to be legal according to the second identification information, judging whether a logged application corresponding to the routing information which is the same as the second routing information exists in the local area network or not; and
and if the logged application corresponding to the routing information which is the same as the second routing information exists in the local area network, determining that the logged application is the first application.
5. The method of claim 4, wherein determining whether a logged-on application corresponding to the same routing information as the second routing information exists within the local area network comprises:
acquiring the MAC address, SSID and user outlet IP in the second routing information;
searching whether routing information which is the same as the MAC address, the SSID and the user outlet IP exists in a preset database; and
and if the routing information which is the same as the MAC address, the SSID and the user outlet IP is found in the preset database, determining that the logged-in application corresponding to the routing information which is the same as the second routing information exists.
6. The method of claim 1, wherein sending the account information to the second application over the local area network comprises: and sending the OPENID of the first application to the second application, wherein the second application requests to acquire the TOKEN of the first application according to the OPENID of the first application, and after acquiring the TOKEN of the first application, outputting prompt information for prompting to log in the second application.
7. An apparatus for logging in an application, comprising:
the terminal comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring account information of a first application which logs in a terminal through a local area network, and the account information is an identity used for identifying a user who logs in the first application;
the detection unit is used for detecting whether a second application requests to log in the terminal in the local area network through the account information or not; and
a sending unit, configured to send the account information to the second application through the local area network when it is detected that the second application requests to log in the terminal through the account information in the local area network, where the second application performs login in the terminal according to the account information;
the first obtaining unit is used for obtaining account information of the first application logged in the first terminal through the local area network;
the detection unit is used for detecting whether a second application which is not logged in the second terminal requests to log in the second terminal in the local area network through the account information.
8. The apparatus of claim 7, wherein the detection unit comprises:
a first obtaining module, configured to obtain first routing information of the first application and second routing information of the second application respectively;
the first judging module is used for judging whether the first routing information and the second routing information are the same routing information or not;
the second judging module is used for judging whether the first application and the second application are legal or not; and
and the first determining module is used for determining that the second application requests to log in the second terminal in the local area network through the account information when the first routing information and the second routing information are judged to be the same routing information and the first application and the second application are legal.
9. The apparatus of claim 8, wherein the second determining module comprises:
the obtaining submodule is used for respectively obtaining first identification information of the first application and second identification information of the second application; and
and the judging submodule is used for judging whether the first application and the second application are legal or not according to the first identification information and the second identification information respectively.
10. The apparatus of claim 8, further comprising:
a second obtaining unit, configured to obtain second identification information of the second application before obtaining account information that the first application logs in the terminal through the local area network;
a first judging unit, configured to judge whether the second application is legal according to the second identification information;
a second judging unit, configured to judge, when the second application is judged to be legitimate according to the second identification information, whether a logged application corresponding to routing information that is the same as the second routing information exists in the local area network; and
and the determining unit is used for determining that the logged application is the first application when judging that the logged application corresponding to the routing information which is the same as the second routing information exists in the local area network.
11. The apparatus according to claim 10, wherein the second determining unit comprises:
the second obtaining module is used for obtaining the MAC address, the SSID and the user outlet IP in the second routing information;
the searching module is used for searching whether routing information which is the same as the MAC address, the SSID and the user outlet IP exists in a preset database; and
and the second determining module is used for searching the preset database for the routing information which is the same as the MAC address, the SSID and the user outlet IP, and determining that the logged application corresponding to the routing information which is the same as the second routing information exists.
12. The apparatus according to claim 7, wherein the sending unit is configured to send an OPENID of the first application to the second application, where the second application requests to obtain a TOKEN of the first application according to the OPENID of the first application, and after obtaining the TOKEN of the first application, the second application outputs prompt information for prompting to log in the second application.
13. A storage medium, in which a computer program is stored, wherein the computer program is arranged to perform the method of any of claims 1 to 6 when executed.
CN201610375655.6A 2016-05-30 2016-05-30 Application login method and device Active CN107454040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610375655.6A CN107454040B (en) 2016-05-30 2016-05-30 Application login method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610375655.6A CN107454040B (en) 2016-05-30 2016-05-30 Application login method and device

Publications (2)

Publication Number Publication Date
CN107454040A CN107454040A (en) 2017-12-08
CN107454040B true CN107454040B (en) 2020-02-28

Family

ID=60485085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610375655.6A Active CN107454040B (en) 2016-05-30 2016-05-30 Application login method and device

Country Status (1)

Country Link
CN (1) CN107454040B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282485B (en) * 2018-01-31 2020-09-08 深圳创维-Rgb电子有限公司 Method for controlling user login, smart television and storage device
CN108881190B (en) * 2018-05-31 2020-12-18 联想(北京)有限公司 Information processing method and device
CN109583181B (en) * 2018-11-29 2020-07-03 新华三技术有限公司 Authentication method, authentication device and machine-readable storage medium
CN112073359B (en) * 2019-06-11 2023-01-24 腾讯科技(深圳)有限公司 Information interaction method, device, equipment and system
CN111447208A (en) * 2020-03-24 2020-07-24 维沃移动通信有限公司 Information sharing method and electronic equipment
CN115001887B (en) * 2022-04-29 2024-03-22 青岛海尔科技有限公司 Login identification sending method and device, storage medium and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877637A (en) * 2009-04-30 2010-11-03 ***通信集团江西有限公司 Single sign-on method and single sign-on system
CN103188237A (en) * 2011-12-30 2013-07-03 盛大计算机(上海)有限公司 Single sign-on system and single sign-on method
CN103457951A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Method and device for allowing multiple terminals to login to server
CN103763180A (en) * 2014-01-15 2014-04-30 南京物联传感技术有限公司 Real-time network communication system and method
CN104486747A (en) * 2014-12-19 2015-04-01 北京奇艺世纪科技有限公司 Method and device for cross-terminal account login

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9137245B2 (en) * 2013-04-26 2015-09-15 Tencent Technology (Shenzhen) Company Limited Login method, apparatus, and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877637A (en) * 2009-04-30 2010-11-03 ***通信集团江西有限公司 Single sign-on method and single sign-on system
CN103188237A (en) * 2011-12-30 2013-07-03 盛大计算机(上海)有限公司 Single sign-on system and single sign-on method
CN103457951A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Method and device for allowing multiple terminals to login to server
CN103763180A (en) * 2014-01-15 2014-04-30 南京物联传感技术有限公司 Real-time network communication system and method
CN104486747A (en) * 2014-12-19 2015-04-01 北京奇艺世纪科技有限公司 Method and device for cross-terminal account login

Also Published As

Publication number Publication date
CN107454040A (en) 2017-12-08

Similar Documents

Publication Publication Date Title
CN107454040B (en) Application login method and device
CN105282126B (en) Login authentication method, terminal and server
CN106714075B (en) Method and device for processing authorization
US9325560B2 (en) Method, device and system for providing web page content according to user ranking
US20130318581A1 (en) Multi-factor authentication using a unique identification header (uidh)
US20230032802A1 (en) Methods and systems for connecting to a wireless network
CN103491056A (en) Control method and device for permission of application
CN107347049B (en) Account authentication method and server
US20150106517A1 (en) System and method for delayed device registration on a network
CN111898124B (en) Process access control method and device, storage medium and electronic equipment
US20130340046A1 (en) Wireless network client-authentication system and wireless network connection method thereof
CN106559785B (en) Authentication method, device and system, access device and terminal
CN111194035B (en) Network connection method, device and storage medium
WO2022227311A1 (en) Access processing method for performing remote control on terminal, and device and storage medium
CN106713315B (en) Login method and device of plug-in application program
US9742769B2 (en) Method and system for determining trusted wireless access points
CN105516395A (en) Network address assignment method and device
US20160021098A1 (en) Secure communication during provisioning of a mobile device to stream media content from a media client
CN107396363B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN111866993B (en) Wireless local area network connection management method, device, software program and storage medium
EP3382981B1 (en) A user equipment and method for protection of user privacy in communication networks
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
CN110198540B (en) Portal authentication method and device
CN113645054B (en) Wireless network equipment configuration method and system
CN104639321B (en) A kind of identity identifying method, equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant