CN112532628A - Cross-application login management method, device and system - Google Patents

Cross-application login management method, device and system Download PDF

Info

Publication number
CN112532628A
CN112532628A CN202011368124.7A CN202011368124A CN112532628A CN 112532628 A CN112532628 A CN 112532628A CN 202011368124 A CN202011368124 A CN 202011368124A CN 112532628 A CN112532628 A CN 112532628A
Authority
CN
China
Prior art keywords
application
login
information
user terminal
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011368124.7A
Other languages
Chinese (zh)
Inventor
刘舟
李奕臻
杨帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Sanqi Mutual Entertainment Technology Co ltd
Original Assignee
Guangzhou Sanqi Mutual Entertainment Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Sanqi Mutual Entertainment Technology Co ltd filed Critical Guangzhou Sanqi Mutual Entertainment Technology Co ltd
Priority to CN202011368124.7A priority Critical patent/CN112532628A/en
Publication of CN112532628A publication Critical patent/CN112532628A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a cross-application login management method, a device and a system, wherein the method comprises the following steps: receiving login information from a first application of a user terminal; and binding the login information with each second application of the user terminal according to identification information in the login information so that a user can login each second application on the user terminal according to the login information, wherein the identification information comprises the equipment identification of the user terminal, and the second application is an application with application information in the server.

Description

Cross-application login management method, device and system
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method, an apparatus, and a system for cross-application login management.
Background
When a user logs in to an application, login information, such as a login account and a login password, is generally input. With the development of the internet, more and more applications are in contact with a user, and different application accounts need to be registered in different applications.
Because a user needs to register a new application account every time the user contacts an application, such operations are complicated, the registration is time-consuming, and when the application accounts are many, the user cannot manage the application conveniently in practical application, the situation that the user cannot log in the application due to mixed account passwords is easy, a lot of inconvenience is brought to the user, and the user experience is poor.
Disclosure of Invention
The application aims to at least solve one of technical problems in the prior art, and the cross-application login management method, the cross-application login management device and the electronic equipment are provided, so that complicated operations required when different applications are logged in are simplified, a user can conveniently manage application accounts, and user experience is improved.
The embodiment of the application provides a cross-application login management method, which is applied to a server and comprises the following steps:
receiving login information from a first application of a user terminal;
and binding the login information with each second application of the user terminal according to identification information in the login information so that a user can login each second application on the user terminal according to the login information, wherein the identification information comprises the equipment identification of the user terminal, and the second application is an application with application information in the server.
Further, after the binding of the login information and each second application in the user terminal, the method further includes:
and sending the login information to a local cache of each second application in the user terminal for storage.
Further, in the embodiment of the present application, the method further includes:
and when the user terminal is detected to log in the second application according to the login information, pushing authority information to the second application of the user terminal, wherein the authority information is authority setting operation of a response user, and authority information distributed to the second applications according to the authority setting operation.
Further, in the embodiment of the present application, the method further includes:
and controlling the login information to prohibit login on at least one second application of the user terminal in response to login prohibition operation triggered by a user.
Further, before receiving the login information from the first application of the user terminal, the method further includes:
and responding to the application management operation of the user, and determining the first application and each second application of the user terminal.
Further, in the embodiment of the present application, the method further includes:
and receiving and storing the login state of the login information in each second application.
Further, the login state comprises login times;
the method further comprises the following steps:
and deleting the application information of the second application with the login times lower than the preset login times according to the login times.
Further, an embodiment of the present application further provides a cross-application login management method, which is applied to a user terminal, and includes:
sending login information of a first application to a server so that the server binds the login information with each second application of the user terminal according to identification information in the login information, wherein the identification information comprises equipment identification of the user terminal, and the second application is an application with application information in the server;
and responding to the login operation of the user for the second application, and logging in each second application on the user terminal according to the login information.
Further, after logging in each second application on the user terminal according to the login information, the method further includes:
and receiving the login information sent by the server, and storing the login information in a local cache of each second application.
Further, an embodiment of the present application further provides a cross-application login management device, which is applied to a server, and includes:
the information receiving module is used for receiving login information from a first application of the user terminal;
and the information binding module is used for binding the login information with each second application of the user terminal according to identification information in the login information so that a user can log in each second application on the user terminal according to the login information, wherein the identification information comprises the equipment identification of the user terminal, and the second application is an application with application information in the server.
Further, an embodiment of the present application further provides a cross-application login management device, which is applied to a user terminal, and includes:
an information sending module, configured to send login information of a first application to a server, so that the server binds the login information with each second application of the user terminal according to identification information in the login information, where the identification information includes a device identifier of the user terminal, and the second application is an application in which application information exists in the server;
and the application login module is used for responding to the login operation of the user aiming at the second application and logging in each second application on the user terminal according to the login information. Further, an embodiment of the present application provides an electronic device, including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the cross-application login management method according to the embodiment.
Further, in an embodiment of the present application, a server is further provided, including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the cross-application login management method according to the embodiment.
Further, in an embodiment of the present application, a user terminal is further provided, including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the cross-application login management method according to the embodiment.
Further, in an embodiment of the present application, a cross-application login management system is further provided, including the server according to the above embodiment, and the user terminal according to the above embodiment.
Further, an embodiment of the present application provides a computer-readable storage medium, where computer-executable instructions are stored, and the computer-executable instructions are configured to enable a computer to execute the cross-application login management method according to the embodiment.
Compared with the prior art, the server binds the login information with the second application through the identification information in the login information of the first application and logs in the second application according to the login information, so that a user can log in a plurality of applications by adopting one login information, application accounts can be managed conveniently, and user experience is effectively improved.
According to the embodiment, after the login information is bound with the second application, the login information is sent to the second application for caching, so that the authentication operation can be completed locally when the second application logs in, the real-time performance is guaranteed, and the login efficiency is effectively improved.
According to the embodiment, the authority information set by the user is pushed to the second application when the second application is logged in, so that the authority range can be obtained according to the will of the user after the second application is logged in, and information leakage or abnormal use of the second application caused by too much authority or too little authority is avoided.
According to the embodiment, the number and the objects of the second applications which are logged in by adopting the login information are controlled by responding to the login prohibition operation triggered by the user, so that the information leakage can be avoided, and the user experience can be better improved.
According to the embodiment, the first application and the second application are determined by responding to the management operation of the user, the applications logged in by adopting the same login information can be selected and adjusted, and the user experience is improved.
The embodiment receives and stores the login state of the login information in each second application, so that the situation that the second application successfully logs in according to the login information can be known, and the user can conveniently adjust the login state.
In the embodiment, the login times of the second applications are received and stored, and the application information of the second applications with the successful login times smaller than the preset times is deleted in the server, so that the user can adjust the login mode of the second applications with low success rate.
According to the embodiment, the login information of the first application is sent to the server, the server binds the login information with the second application through the identification information in the login information, and the user terminal responds to the login operation and logs in the second application through the login information, so that the user can log in a plurality of applications through one login information, the application account is convenient to manage, and the user experience is effectively improved.
Drawings
The present application is further described with reference to the following figures and examples;
FIG. 1 is a diagram of an application environment for a cross-application login management method in one embodiment;
FIG. 2 is a flowchart illustrating a cross-application login management method according to an embodiment;
FIG. 3 is a flowchart illustrating a cross-application login management method according to another embodiment;
FIG. 4 is a flowchart illustrating a cross-application login management method in accordance with yet another embodiment;
FIG. 5 is a flowchart illustrating a cross-application login management method according to yet another embodiment;
FIG. 6 is a flowchart illustrating a cross-application login management method in accordance with yet another embodiment;
FIG. 7 is a block diagram of the cross application login management device in one embodiment;
FIG. 8 is a block diagram showing the construction of a cross-application login management apparatus according to another embodiment;
FIG. 9 is a block diagram showing the structure of a cross-application login management apparatus in still another embodiment;
FIG. 10 is a block diagram of a server in one embodiment;
FIG. 11 is a block diagram showing the structure of a computer device in one embodiment;
FIG. 12 is a block diagram that illustrates the cross-application login relationship system, in one embodiment.
Detailed Description
Reference will now be made in detail to the present embodiments of the present application, preferred embodiments of which are illustrated in the accompanying drawings, which are for the purpose of visually supplementing the description with figures and detailed description, so as to enable a person skilled in the art to visually and visually understand each and every feature and technical solution of the present application, but not to limit the scope of the present application.
FIG. 1 is a diagram illustrating an application environment for a cross-application login management method in one embodiment. Referring to fig. 1, the cross-application login management system includes a user terminal 110 and a server 120. The user terminal 110 and the server 120 are connected through a network. The user terminal 110 may be implemented as a stand-alone user terminal or as a user terminal cluster consisting of a plurality of user terminals. The user terminal 110 may be a desktop user terminal or a mobile user terminal, and the mobile user terminal may be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The server 120 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers.
Hereinafter, the cross-application login management method provided by the embodiment of the present application will be described and explained in detail through several specific embodiments.
As shown in FIG. 2, in one embodiment, a cross-application login management method is provided. The embodiment is mainly illustrated by applying the method to computer equipment. The computer device may specifically be the server 120 in fig. 1 described above.
Referring to fig. 2, the cross-application login management method specifically includes the following steps:
and S11, receiving login information from the first application of the user terminal.
In this embodiment, the server receives the login information from the user terminal, where the login information is sent to the server by the user terminal when the user terminal logs in the first application; the server may also obtain the login information of the first application from a database of the user terminal. In this embodiment, the manner in which the server receives the login information from the user terminal is not particularly limited.
In this implementation, the login information may be a user-defined account number during user registration, or may be a related account number of other external application programs, such as a microblog account number or a mobile phone number.
And S12, binding the login information with each second application of the user terminal according to the identification information in the login information, so that the user can login each second application on the user terminal according to the login information, wherein the identification information comprises the equipment identification of the user terminal, and the second application is the application with the application information in the server.
The first application and the second application are installed on the user terminal, the first application refers to an application program which is logged in by adopting current login information, the second application refers to other application programs which can be logged in by adopting the login information of the first application, the second application has corresponding application information in the server, the application information refers to information which can be matched with the corresponding application program by the server according to the application information, and the application information can be address information of the application program in the user terminal, number of the application program in the server and the like. The identification information refers to that the server can be matched with the user terminal where the first application is located according to the identification information, and the identification information can be the number of the user terminal in the server, the address information of the user terminal and the like. In this embodiment, the types of the application information and the identification information are not particularly limited. For example, the first application is an application song on city on the cloud, the login information of the first application is sanqi123, the user terminal is a terminal cluster and includes the user terminal 1, the user terminal 2 and the user terminal 3, the device identifiers of the three user terminals are A, B, C respectively, the first application song on city on the cloud is installed in the user terminal 1, therefore, the login information sanqi123 includes the identifier information a, so the login information can be represented as sanqi123-a, the application information corresponding to the application sword on the day and the continental on the fighting are stored in the server, the application information can adopt the number of the application in the server, such as the initials dtszj and dldl of the application, and the initials swords and continental on the fighting are installed in the user terminal cluster formed by the user terminals 123. At this time, the application programs "sword of Angel" and "continental fighting" may be the second application capable of logging in using the login information of the first application "song of city on cloud".
In this embodiment, the server matches the user terminal where the first application is located according to the identification information in the login information, acquires all corresponding application programs according to the application information stored in the server, and uses the application program which is installed at the user terminal where the first application is located and has the corresponding application information in the server as the second application. At this time, the login information is bound with each second application of the user terminal, so that the user can log in each second application on the user terminal according to the login information. For example, the server identifies the user terminal 1 and the user terminal cluster where the user terminal 1 is located according to the presentation information a based on the login information sanqi123-a of the first application song on the city on the cloud, at this time, the server matches the application programs sword on the user terminal cluster and the continental fighter based on the application information dtszj and dldl, binds the login information sanqi123 with the sword on the continental and the continental of the fighter of the second application, and performs login of the second application based on the login information.
In this embodiment, as for the binding manner between the login information and each second application, the login information and the application information of the second application may be spliced, for example, the application information dtszj of the "sword for majesty" of the second application and the login information are spliced into dtszj-sanqi123, and the application information of the "sword for majesty" of the second application is replaced after splicing.
In this embodiment, the server binds the login information with the second application through the identification information in the login information of the first application, and logs in the second application according to the login information, so that the user can log in a plurality of applications by using one login information, the application account is convenient to manage, and the user experience is effectively improved.
In another embodiment, as shown in FIG. 3, a cross-application login management method is provided. The embodiment is mainly illustrated by applying the method to computer equipment. The computer device may specifically be the server 120 in fig. 1 described above.
Referring to fig. 3, the cross-application login management method specifically includes the following steps:
and S21, receiving login information from the first application of the user terminal.
This step is the same as the above embodiment, and the detailed analysis may refer to the above embodiment, and is not repeated herein to avoid repetition.
And S22, binding the login information with each second application of the user terminal according to the identification information in the login information, and sending the login information to a local cache of each second application in the user terminal for storage so that the user can log in each second application on the user terminal according to the login information, wherein the identification information comprises the equipment identification of the user terminal, and the second application is the application with the application information in the server.
In this embodiment, the server binds the login information of a first application installed in the user terminal with a second application installed in the same user terminal, and the user center of the server after binding sends the login information to a folder in which the second application is recorded and stored in the user terminal. After the storage, when the second application needs to log in by adopting the login information, the login information is acquired from the folder for storing the login information, so that the user authentication can be completed locally. For example, login information sanqi123 of a first application "song on city on cloud" and a second application "sword of mazechu" are bound, wherein the login information and the application information can be bound in a splicing manner, the spliced information replaces application information of the "sword of mazechu" in the server after the binding, the login information is stored in a folder in which the second application "sword of mazechu" is recorded and stored in the user terminal 1, for example, the user terminal is a desktop computer, the second application "sword of mazechu" stores game records in a save folder of a D disk of the desktop computer, and at this time, the login information sanqi123 can be stored in the folder.
In addition, generally, a sub-folder for storing login information, such as a folder Log, exists in a folder for storing records of an application program, so that the user center of the server can send the login information sanqi123 to the sub-folder for storing the login information, which facilitates reducing the time for obtaining the login information when a second application logs in with the login information. When the user terminal does not have a subfolder specially used for storing the login information, the user center of the server can create a subfolder used for storing the login information when sending the login information to the user terminal. When the user terminal is a mobile phone terminal or other terminal, the user center of the server may send the login information to a path for storing the login information of the user terminal. In this embodiment, the user center of the server distributes the user login data and compresses the user login data by using cbor codec, thereby ensuring that the cluster flow is small. After the login information is stored, when the user needs to login in the second application of the user terminal, the login can be completed only by extracting the login information from the local cache and performing user authentication operation.
In the embodiment, after the login information is bound with the second application, the login information is sent to the second application for caching, so that the second application does not need to perform authentication operation through the internet during login, the user authentication is only completed locally, the application login real-time performance can be ensured even when the network fluctuates, and the login efficiency is effectively improved.
In one embodiment, the cross-application login management method further includes:
and when the user terminal is detected to log in the second application according to the login information, pushing the authority information to the second application of the user terminal, wherein the authority information is the authority setting operation of the response user, and the authority information distributed to each second application is set according to the authority setting operation.
In this embodiment, when the server detects that the second application of the user terminal is logged in using the login information, the user center in the server may push the authority information to the second application of the user terminal. The authority information is control information which is generated in response to the authority setting operation of the user on the second application and adjusts the authority of the second application. For example, for the second application "sword of Angel" and "continental fighting", the user center in the server pushes to the user application permissions of interest to the user that can be subscribed to, including accessing address book and accessing current location information. Wherein, the authority of the user to the Angel sword is set as allowing to access the address book and forbidding to access the current position information; and the user's authority to ' Dooluo mainland ' is set to forbid accessing the address book and allow accessing the current position information. At this time, the user center of the server responds to the permission setting operation set by the user on the "sword of Angel" and the "continental fighting" to respectively generate corresponding permission information 1 and permission information 2, the permission information 1 controls the second application "sword of Angel" not to access the current position information when the application runs, but can access the information of the associated person in the address book to know whether an account number and the like exist in the sword of Angel "application. The authority information 2 controls that the second application "douluo mainland" cannot access the address book when the application runs, but can access the current position information for positioning so as to acquire the peripheral player information and the like.
In this embodiment, the user center in the server may further record operation behaviors of the user in each application, such as login operation, logoff operation, recharge operation, and the like, and may open and close the authority of each application actively according to the operation behaviors of the user. When the user center pushes the authority, cbor coding and decoding are used for compression, so that the cluster flow can be ensured to be small.
In this embodiment, the authority information set by the user is pushed to the second application when the second application is logged in, so that the authority range can be obtained according to the will of the user after the second application is logged in, and information leakage or abnormal use of the second application due to too much authority or too little authority is avoided.
In one embodiment, the cross-application login management method further includes:
and controlling login information to prohibit login on at least one second application of the user terminal in response to login prohibition operation triggered by the user.
In this embodiment, the user center of the server further prohibits a part of the second application installed in the user terminal from logging in using the login information by responding to the login prohibition operation. The login prohibition operation refers to control information that a user can prohibit a specific second application from logging in by adopting login information through input triggering. The method that the user center of the server forbids the second application to log in response to the operation of forbidding the login is characterized in that the login is forbidden by releasing the binding between the login information and the forbidden second application and deleting the login information; and the logged second application can be controlled to be offline in real time by modifying the login state of the application. For example, the user inputs a login prohibition operation through the terminal, the login of the second application "sword of marchance" using the login information sanqi123 is prohibited in the login prohibition operation, and the user center of the server responds to the login operation. At this time, if the second application "sword of majesty" is in a non-login state, the login information and the application information which are bound are unbound, namely dtszj-sanqi123 is changed into dtszj, and the record or cache of the login information sanqi123 is deleted; if the second application Datianshijian is in a login state, the server can kick off the line of the Datianshijian sword in a mode of disconnecting the second application from the game server, and can perform login prohibition operation on the second application Datianshijian sword in a mode of deleting records or caches related to login information after unbinding.
In this embodiment, the user center in the server may further record operation behaviors of the user in each application, such as login operation, logoff operation, recharge operation, and the like, and may actively log off the user or block the user account of the application program according to the operation behaviors of the user.
In the embodiment, the number and the objects of the second applications which are logged in by adopting the login information are controlled by responding to the login prohibition operation triggered by the user, so that the information leakage can be avoided, and the user experience can be better improved.
In yet another embodiment, as shown in FIG. 4, a cross-application login management method is provided. The embodiment is mainly illustrated by applying the method to computer equipment. The computer device may specifically be the server 120 in fig. 1 described above.
Referring to fig. 4, the cross-application login management method specifically includes the following steps:
and S31, responding to the application management operation of the user, and determining the first application and each second application of the user terminal.
In this embodiment, the user center of the server adjusts and determines the first application and the second application installed in the user terminal by responding to the application management operation. The application management operation refers to control information input by a user through the user terminal for adjusting the application program installed in the user terminal. The application management operation can adjust a second application program capable of logging in by adopting the login information in a mode of deleting the application program; the second application capable of logging in with the login information may be adjusted by employing application information of the delete application in the server. The application management operation may adjust the first application by deleting the application; the first application program may be adjusted by logging off a login account of the first application. For example, the application information dtszj of the second application "majorang sword" in the server is deleted, and since the application program needs to be installed in the user terminal where the first application is located and is determined as the second application when the application information is stored in the server, the application program "majorang sword" after deletion is no longer the second application. Logging-in information sanqi123 of the first application, namely song on city on cloud, is logged out, namely logging-in cannot be performed by adopting the logging-in information, at the moment, account number sanqi234 can be registered and logged in other application programs, such as the douluo mainland, so that the douluo mainland becomes a new first application, and a second application program logs in by adopting new logging-in information sanqi 234. In this embodiment, a manner in which the user center of the server determines the first application and each of the second applications of the user terminal in response to the application management operation of the user is not particularly limited.
In this embodiment, the user center in the server may further record operation behaviors of the user in each application, such as login operation, logoff operation, recharge operation, and the like, and may actively adjust and determine the first application and the second application according to the operation behaviors of the user.
In this embodiment, the first application and the second application are determined by responding to the management operation of the user, so that the applications logged in by using the same login information can be selected and adjusted, and the user experience is improved.
And S32, receiving login information from the first application of the user terminal.
This step is the same as the above embodiment, and the detailed analysis may refer to the above embodiment, and is not repeated herein to avoid repetition.
And S33, binding the login information with each second application of the user terminal according to the identification information in the login information, so that the user can login each second application on the user terminal according to the login information, wherein the identification information comprises the equipment identification of the user terminal, and the second application is the application with the application information in the server.
This step is the same as the above embodiment, and the detailed analysis may refer to the above embodiment, and is not repeated herein to avoid repetition.
In one embodiment, the cross-application login management method further includes:
and receiving and storing the login state of the login information in each second application.
In this embodiment, the server receives and stores the login state of the login information in each second application to know whether the login information can be successfully logged in each second application, so that the second application which cannot be successfully logged in can be logged in by another registered account.
In this embodiment, the login state of the login information in each second application is received and stored, so that the situation that the second application successfully logs in according to the login information can be known, and the user can conveniently adjust the login state.
In one embodiment, the login status includes a number of logins;
the cross-application login management method further comprises the following steps:
and deleting the application information of the second application with the login times lower than the preset login times according to the login times.
In this embodiment, the server sets a preset number of times by receiving and storing the login number of times of each second application, where the preset number of times refers to the lowest login success number that needs to be reached by each second application, and if the login number of a certain second application is lower than the preset number of times, it may be considered that the login information cannot be successfully logged in the second application, and at this time, the login manner of the second application may be modified by re-registering the account. For example, the second application "sword of continental university" and "continental dou" may attempt to register 100 times, 99 times, 30 times, and 60 times, and it may be considered that "continental dou" cannot be successfully registered using the registration information, and at this time, the registration may be performed by registering the account sanqi345 in "continental dou".
In this embodiment, the login times of each second application are received and stored, and the application information of the second application with the successful login times smaller than the preset times is deleted in the server, so that the user can adjust the login mode of the second application with the low success rate, and the use of the second application is avoided.
In yet another embodiment, as shown in FIG. 5, a cross-application login management method is provided. The embodiment is mainly illustrated by applying the method to computer equipment. The computer device may specifically be the user terminal 110 in fig. 1 described above.
Referring to fig. 5, the cross-application login management method specifically includes the following steps:
and S41, sending login information of the first application to the server, so that the server binds the login information with each second application of the user terminal according to identification information in the login information, wherein the identification information comprises a device identification of the user terminal, and the second application is an application with application information in the server.
In this embodiment, the user terminal sends login information of the first application to the server, where the login information is sent to the server by the user terminal when the user terminal logs in the first application; the user terminal extracts the login information of the first application from the database and sends the login information to the server. In this embodiment, the manner in which the user terminal sends the login information to the server is not particularly limited.
In this implementation, the login information may be a user-defined account number during user registration, or may be a related account number of other external application programs, such as a microblog account number or a mobile phone number.
In this embodiment, a first application and a second application are both installed on a user terminal, the first application refers to an application program that is logged in by using current login information, the second application refers to another application program that can be logged in by using the login information of the first application, and the second application has corresponding application information in a server, the application information refers to information that the server can be matched with the corresponding application program according to the application information, and the application information may be address information of the application program in the user terminal, or a number of the application program in the server, and the like. The identification information refers to that the server can be matched with the user terminal where the first application is located according to the identification information, and the identification information can be the number of the user terminal in the server, the address information of the user terminal and the like. In this embodiment, the types of the application information and the identification information are not particularly limited. For example, the first application is an application song on city on the cloud, the login information of the first application is sanqi123, the user terminal is a terminal cluster and includes the user terminal 1, the user terminal 2 and the user terminal 3, the device identifiers of the three user terminals are A, B, C respectively, the first application song on city on the cloud is installed in the user terminal 1, therefore, the login information sanqi123 includes the identifier information a, so the login information can be represented as sanqi123-a, the application information corresponding to the application sword on the day and the continental on the fighting are stored in the server, the application information can adopt the number of the application in the server, such as the initials dtszj and dldl of the application, and the initials swords and continental on the fighting are installed in the user terminal cluster formed by the user terminals 123. At this time, the application programs "sword of Angel" and "continental fighting" may be the second application capable of logging in using the login information of the first application "song of city on cloud".
In this embodiment, the server matches the user terminal where the first application is located according to the identification information in the login information, acquires all corresponding application programs according to the application information stored in the server, and uses the application program which is installed at the user terminal where the first application is located and has the corresponding application information in the server as the second application. At this time, the login information is bound with each second application of the user terminal, so that the user can log in each second application on the user terminal according to the login information. For example, the server identifies the user terminal 1 and the user terminal cluster where the user terminal 1 is located according to the presentation information a based on the login information sanqi123-a of the first application song on the city on the cloud, at this time, the server matches the application programs sword on the user terminal cluster and the continental fighter based on the application information dtszj and dldl, binds the login information sanqi123 with the sword on the continental and the continental of the fighter of the second application, and performs login of the second application based on the login information.
In this embodiment, as for the binding manner between the login information and each second application, the login information and the application information of the second application may be spliced, for example, the application information dtszj of the "sword for majesty" of the second application and the login information are spliced into dtszj-sanqi123, and the application information of the "sword for majesty" of the second application is replaced after splicing.
And S42, responding to the login operation of the user for the second application, and logging in each second application on the user terminal according to the login information.
In this embodiment, the user terminal logs in each second application according to the login information in response to the login operation of the second application. The login operation may be a login request initiated by the second application needing to login to the user terminal.
In yet another embodiment, as shown in FIG. 6, a cross-application login management method is provided. The embodiment is mainly illustrated by applying the method to computer equipment. The computer device may specifically be the user terminal 110 in fig. 1 described above.
Referring to fig. 6, the cross-application login management method specifically includes the following steps:
and S51, sending login information of the first application to the server, so that the server binds the login information with each second application of the user terminal according to identification information in the login information, wherein the identification information comprises a device identification of the user terminal, and the second application is an application with application information in the server.
This step is the same as the above embodiment, and the detailed analysis may refer to the above embodiment, and is not repeated herein to avoid repetition.
And S52, responding to the login operation of the user for the second application, and logging in each second application on the user terminal according to the login information.
This step is the same as the above embodiment, and the detailed analysis may refer to the above embodiment, and is not repeated herein to avoid repetition.
And S53, receiving the login information sent by the server, and storing the login information in the local cache of each second application.
In this embodiment, the server binds the login information of the first application installed in the user terminal with the second application installed in the same user terminal, and the user terminal receives the login information sent by the user center of the server after binding, and stores the login information in a folder recorded and stored in each second application in the user terminal. And after the storage, when the second application needs to log in by adopting the login information, obtaining the login information from the folder for storing the login information. For example, login information sanqi123 of a first application "song on city on cloud" and a second application "sword of mazechu" are bound, wherein the login information and the application information can be bound in a splicing manner, the spliced information replaces application information of the "sword of mazechu" in the server after the binding, the login information is stored in a folder in which the second application "sword of mazechu" is recorded and stored in the user terminal 1, for example, the user terminal is a desktop computer, the second application "sword of mazechu" stores game records in a save folder of a D disk of the desktop computer, and at this time, the login information sanqi123 can be stored in the folder.
In addition, generally, a sub-folder for storing login information, such as a folder Log, exists in a folder for storing records of an application program, so that the user center of the server can send the login information sanqi123 to the sub-folder for storing the login information, which facilitates reducing the time for obtaining the login information when a second application logs in with the login information. When the user terminal does not have a subfolder specially used for storing the login information, the user center of the server can create a subfolder used for storing the login information when sending the login information to the user terminal. When the user terminal is a mobile phone terminal or other terminal, the user center of the server may send the login information to a path for storing the login information of the user terminal. In this embodiment, the user center of the server distributes the user login data and compresses the user login data by using cbor codec, thereby ensuring that the cluster flow is small.
After the login information is stored, the user terminal extracts the login information from the local cache to log in the second application.
In one embodiment, as shown in fig. 7, there is provided a cross-application login management apparatus, applied to a server, including:
the information receiving module 101 is configured to receive login information from a first application of a user terminal.
And the information binding module 102 is configured to bind the login information with each second application of the user terminal according to identification information in the login information, so that the user logs in each second application on the user terminal according to the login information, where the identification information includes a device identifier of the user terminal, and the second application is an application having application information in the server.
In one embodiment, the information binding module 102 is further configured to:
and sending the login information to a local cache of each second application in the user terminal for storage.
In one embodiment, the information binding module 102 is further configured to:
and receiving and storing the login state of the login information in each second application.
In one embodiment, the information binding module 102 is further configured to:
and receiving and storing the login times of the login information in each second application. And deleting the application information of the second application with the login times lower than the preset login times according to the login times.
In another embodiment, as shown in fig. 8, there is provided a cross-application login management apparatus, applied to a server, including:
the information receiving module 101 is configured to receive login information from a first application of a user terminal.
And the information binding module 102 is configured to bind the login information with each second application of the user terminal according to identification information in the login information, so that the user logs in each second application on the user terminal according to the login information, where the identification information includes a device identifier of the user terminal, and the second application is an application having application information in the server.
And the operation response module 103 is configured to, when it is detected that the user terminal logs in the second application according to the login information, push permission information to the second application of the user terminal, where the permission information is a permission setting operation for responding to the user, and set permission information allocated to each second application according to the permission setting operation.
In one embodiment, the operation response module 103 is further configured to:
and controlling login information to prohibit login on at least one second application of the user terminal in response to the login prohibition operation triggered by the user.
In one embodiment, the operation response module 103 is further configured to:
before receiving login information from a first application of a user terminal, determining the first application and each second application of the user terminal in response to application management operation of a user.
In another embodiment, as shown in fig. 9, there is provided a cross-application login management apparatus applied to a user terminal, including:
the information sending module 201 is configured to send login information of a first application to a server, so that the server binds the login information with each second application of the user terminal according to identification information in the login information, where the identification information includes a device identifier of the user terminal, and the second application is an application in which application information exists in the server.
And the application login module 202 is configured to respond to a login operation of the user for the second applications, and login the second applications on the user terminal according to the login information.
In one embodiment, the application login module 202 is further configured to:
and after logging in each second application on the user terminal according to the login information, receiving the login information sent by the server, and storing the login information in a local cache of each second application.
In one embodiment, there is provided a server, as shown in fig. 10, including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the cross-application login management method according to the embodiment.
In one embodiment, there is provided a user terminal comprising: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the cross-application login management method according to the embodiment.
In one embodiment, a computer apparatus is provided, as shown in fig. 11, which includes a processor, a memory, a network interface, an input device, and a display screen connected by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a cross-application login management method. The internal memory may also have a computer program stored therein, which when executed by the processor, causes the processor to perform a cross-application login management method. Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the cross-application login management apparatus provided in the present application may be implemented in the form of a computer program that is executable on a computer device as shown in fig. 11. The memory of the computer device may store various program modules constituting the cross application login management apparatus. The computer program constituted by the respective program modules causes the processor to execute the steps in the cross-application login management method of the embodiments of the present application described in the present specification.
In one embodiment, a cross-application login management system is provided, as shown in fig. 12, the management system includes a server as described in the above embodiments, and a user terminal as described in the above embodiments.
In one embodiment, there is provided an electronic device including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to execute the steps of the cross-application login management method. The steps of the cross-application login management method herein may be steps in the cross-application login management methods of the various embodiments described above.
In one embodiment, a computer-readable storage medium is provided that stores computer-executable instructions for causing a computer to perform the steps of the cross-application login management method described above. The steps of the cross-application login management method herein may be steps in the cross-application login management methods of the various embodiments described above.
The foregoing is a preferred embodiment of the present application, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations are also regarded as the protection scope of the present application.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.

Claims (14)

1. A cross-application login management method is applied to a server and is characterized by comprising the following steps:
receiving login information from a first application of a user terminal;
and binding the login information with each second application of the user terminal according to identification information in the login information so that a user can login each second application on the user terminal according to the login information, wherein the identification information comprises the equipment identification of the user terminal, and the second application is an application with application information in the server.
2. The cross-application login management method according to claim 1, after binding the login information with each second application in the user terminal, further comprising:
and sending the login information to a local cache of each second application in the user terminal for storage.
3. The cross-application login management method according to claim 1 or 2, further comprising:
and when the user terminal is detected to log in the second application according to the login information, pushing authority information to the second application of the user terminal, wherein the authority information is authority setting operation of a response user, and authority information distributed to the second applications according to the authority setting operation.
4. The cross-application login management method according to claim 1 or 2, further comprising:
and controlling the login information to prohibit login on at least one second application of the user terminal in response to login prohibition operation triggered by a user.
5. The cross-application login management method according to claim 1, further comprising, before receiving login information from the first application of the user terminal:
and responding to the application management operation of the user, and determining the first application and each second application of the user terminal.
6. The cross-application login management method according to claim 1, further comprising:
and receiving and storing the login state of the login information in each second application.
7. The cross-application login management method of claim 6, wherein the login status comprises a number of logins;
the method further comprises the following steps:
and deleting the application information of the second application with the login times lower than the preset login times according to the login times.
8. A cross-application login management method is applied to a user terminal and is characterized by comprising the following steps:
sending login information of a first application to a server so that the server binds the login information with each second application of the user terminal according to identification information in the login information, wherein the identification information comprises equipment identification of the user terminal, and the second application is an application with application information in the server;
and responding to the login operation of the user for the second application, and logging in each second application on the user terminal according to the login information.
9. The cross-application login management method according to claim 8, further comprising, after logging in each of the second applications on the user terminal according to the login information:
and receiving the login information sent by the server, and storing the login information in a local cache of each second application.
10. A cross-application login management device applied to a server is characterized by comprising:
the information receiving module is used for receiving login information from a first application of the user terminal;
and the information binding module is used for binding the login information with each second application of the user terminal according to identification information in the login information so that a user can log in each second application on the user terminal according to the login information, wherein the identification information comprises the equipment identification of the user terminal, and the second application is an application with application information in the server.
11. A cross-application login management device applied to a user terminal is characterized by comprising:
an information sending module, configured to send login information of a first application to a server, so that the server binds the login information with each second application of the user terminal according to identification information in the login information, where the identification information includes a device identifier of the user terminal, and the second application is an application in which application information exists in the server;
and the application login module is used for responding to the login operation of the user aiming at the second application and logging in each second application on the user terminal according to the login information.
12. A server, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the cross application login management method according to any of claims 1 to 7 when executing the program.
13. A user terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the cross application login management method according to any of claims 8 to 9 when executing the program.
14. A cross-application login management system comprising a server as claimed in claim 12, and a user terminal as claimed in claim 13.
CN202011368124.7A 2020-11-27 2020-11-27 Cross-application login management method, device and system Pending CN112532628A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011368124.7A CN112532628A (en) 2020-11-27 2020-11-27 Cross-application login management method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011368124.7A CN112532628A (en) 2020-11-27 2020-11-27 Cross-application login management method, device and system

Publications (1)

Publication Number Publication Date
CN112532628A true CN112532628A (en) 2021-03-19

Family

ID=74994902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011368124.7A Pending CN112532628A (en) 2020-11-27 2020-11-27 Cross-application login management method, device and system

Country Status (1)

Country Link
CN (1) CN112532628A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114257431A (en) * 2021-12-13 2022-03-29 以萨技术股份有限公司 Login session management method, system and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282126A (en) * 2014-07-24 2016-01-27 腾讯科技(北京)有限公司 Login authentication method, terminal and server
CN105843367A (en) * 2016-03-24 2016-08-10 维沃移动通信有限公司 Application processing method and electronic device
CN106209726A (en) * 2015-04-30 2016-12-07 中兴通讯股份有限公司 A kind of Mobile solution single-point logging method and device
CN106406965A (en) * 2016-10-19 2017-02-15 北京奇虎科技有限公司 Method and device for processing application deletion operation on intelligent terminal
CN106445670A (en) * 2016-10-10 2017-02-22 广东欧珀移动通信有限公司 Data management method and device and mobile terminal for multiple applications
CN107645486A (en) * 2016-12-28 2018-01-30 平安科技(深圳)有限公司 Login authentication method and device
CN108259458A (en) * 2017-09-30 2018-07-06 中国平安人寿保险股份有限公司 Application software account relating method, apparatus and storage medium
CN110032855A (en) * 2019-02-28 2019-07-19 招银云创(深圳)信息技术有限公司 Login method, device, computer equipment and the storage medium of application
CN111200593A (en) * 2019-12-20 2020-05-26 北京你财富计算机科技有限公司 Application login method and device and electronic equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282126A (en) * 2014-07-24 2016-01-27 腾讯科技(北京)有限公司 Login authentication method, terminal and server
CN106209726A (en) * 2015-04-30 2016-12-07 中兴通讯股份有限公司 A kind of Mobile solution single-point logging method and device
CN105843367A (en) * 2016-03-24 2016-08-10 维沃移动通信有限公司 Application processing method and electronic device
CN106445670A (en) * 2016-10-10 2017-02-22 广东欧珀移动通信有限公司 Data management method and device and mobile terminal for multiple applications
CN106406965A (en) * 2016-10-19 2017-02-15 北京奇虎科技有限公司 Method and device for processing application deletion operation on intelligent terminal
CN107645486A (en) * 2016-12-28 2018-01-30 平安科技(深圳)有限公司 Login authentication method and device
CN108259458A (en) * 2017-09-30 2018-07-06 中国平安人寿保险股份有限公司 Application software account relating method, apparatus and storage medium
CN110032855A (en) * 2019-02-28 2019-07-19 招银云创(深圳)信息技术有限公司 Login method, device, computer equipment and the storage medium of application
CN111200593A (en) * 2019-12-20 2020-05-26 北京你财富计算机科技有限公司 Application login method and device and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114257431A (en) * 2021-12-13 2022-03-29 以萨技术股份有限公司 Login session management method, system and storage medium
CN114257431B (en) * 2021-12-13 2024-04-30 以萨技术股份有限公司 Login session management method, system and storage medium

Similar Documents

Publication Publication Date Title
EP2962244B1 (en) Discretionary policy management in cloud-based environment
US10002174B2 (en) System and method for maintaining device state coherency
US11425571B2 (en) Device configuration method, apparatus and system
US20130347121A1 (en) System and Method For Providing Conditional access to Server-based Applications From Remote Access Devices
US20130347130A1 (en) Methods and apparatus for dynamically providing modified versions of electronic device applications
US9928373B2 (en) Technique for data loss prevention for a cloud sync application
US10346320B2 (en) Restricting applications and users that can make persistent changes to artifacts
US20150046141A1 (en) Methods, systems, and computer readable media for modeling a workload
CN110267060B (en) Video file storage injection method and device, computer equipment and storage medium
CN112714139A (en) File sharing system, method, electronic device and storage medium
CN109391600B (en) Distributed denial of service attack protection method, device, system, medium and equipment
US10318272B1 (en) Systems and methods for managing application updates
CN112653681A (en) Multi-feature fusion user login access method, device and system
US20140041053A1 (en) Data block access control
CN112532628A (en) Cross-application login management method, device and system
KR20160038496A (en) Storage integrating method and system using file system
CN112699034A (en) Virtual login user construction method, device, equipment and storage medium
US20230353572A1 (en) Managing access requests for policy-based access control systems in computer networks
CN114499905B (en) Method, device, computer equipment and storage medium for binding application account replacement
CN114647483A (en) Virtual machine control method, cloud management device and storage medium
CN113168440A (en) Modifying device behavior with limited purpose accounts
KR102269885B1 (en) An access control system of making up customized server work environment for each user
US20240098079A1 (en) Token verification method and service server using the same
CN113489726B (en) Flow limiting method and device
US20220385677A1 (en) Cloud-based security for identity imposter

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210319

RJ01 Rejection of invention patent application after publication