WO2021159765A1 - 一种账号数据共享方法及电子设备 - Google Patents
一种账号数据共享方法及电子设备 Download PDFInfo
- Publication number
- WO2021159765A1 WO2021159765A1 PCT/CN2020/125973 CN2020125973W WO2021159765A1 WO 2021159765 A1 WO2021159765 A1 WO 2021159765A1 CN 2020125973 W CN2020125973 W CN 2020125973W WO 2021159765 A1 WO2021159765 A1 WO 2021159765A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- account
- application
- login
- interface
- user
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/61—Time-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- the embodiments of the present application relate to the communication technology field and the artificial intelligence (AI) technology field, and in particular to an account data sharing method and electronic equipment.
- AI artificial intelligence
- the electronic device After the electronic device starts an application and displays the login interface of the application (for example, application a), it can receive the account entered by the user on the login interface and the login password of the account. Then, the electronic device can initiate a login request to the server according to the account and login password to log in to the account.
- the aforementioned application a may be a shopping application, an instant messaging application, or a video application.
- the user may want to log in to the account in application a of electronic device 1 (such as mobile phone A).
- the user may want to log in to the account in application a of electronic device 2 (such as mobile phone B or TV).
- the electronic device 2 displays the login interface of the application a, the user is required to enter the correct account and login password again before the account can be logged in to the electronic device 2.
- the embodiments of the present application provide an account data sharing method and electronic device, which can intelligently realize automatic sharing of account data on the premise of protecting the user's information security.
- the present application provides an account data sharing method, which can be applied to a first device in which a first application is installed.
- the first device may receive the first operation of the user on the first application after the first application logs in to the first account.
- the first operation is used to trigger the first device to share the login information of the first account with other devices.
- the first device may display a first interface including one or more device options. Each device option in the first interface corresponds to a wireless device searched by the first device.
- the first device may send the identity information of the first application and the login information of the first account to the second device corresponding to the first device option.
- the identity information of the first application includes the package name of the first application, and the package name of the first application is used to identify the first application.
- the second device may determine, according to the package name of the first application, that the login information of the first account is the login information of an account of the first application.
- the login information of the first account includes the first account and the login password of the first account.
- the first device uses the first account and the login password of the first account to log in to the first account in the first application.
- the login information of the aforementioned first account includes the first account.
- the login information of the first account does not include the login password of the first account.
- the first device uses the first account and verification code to log in to the first account in the first application.
- the first account number can be a mobile phone number or an email address.
- the first device can send to other applications (such as the first application) in response to the user's first operation on any application (such as the first application).
- the device (such as the second device) shares the login information of the first application. That is to say, through this method, the electronic device can share the login information of the application selected by the user with other devices in a targeted manner, and the information security in the electronic device can be improved.
- the first device may directly share the login information of the first account with the second device, and the login information of the first account does not need to be transmitted by the server. Therefore, the login information of the first account can be prevented from being stolen on the server side, and the user's information security can be protected.
- the electronic device can share the account and login password of any application in the electronic device with other devices, and can protect the user's information security. That is to say, with the method of this application, the automatic sharing of account data can be intelligently realized on the premise of protecting the user's information security.
- the above-mentioned first operation may be a preset operation on the icon of the first application.
- the first device Before the first device receives the user's first operation on the first application, the first device may display the main interface of the first device.
- the main interface includes the icon of the first application.
- the first device may receive a preset operation (ie, the first operation) for the icon of the first application in the main interface.
- the first operation may be any operation such as a double-click operation or a long-press operation on the icon of the first application by the user.
- the first operation is a click operation on a preset control in the first application.
- the first device Before the first device receives the user's first operation on the first application, the first device may display a preset page of the first application, and the preset page includes preset controls.
- the preset control is used to trigger the first device to share the login information with other devices.
- the above-mentioned first operation may be a user's click operation on a preset control in a preset page of the first application.
- the user can selectively input a first operation on any application in the first device to trigger the first device to share the login information of the application selected by the user with other devices in a targeted manner.
- the login information of the first account includes the first account and the login password of the first account.
- the first device may receive the account data (including the first account and the first account) input by the user on the account login interface of the first application.
- the login password of the account in response to the user's login operation on the account login interface, the first device can use the first account and the login password of the first account to log in to the first account in the first application.
- the login information of the first account includes the first account, but does not include the login password of the first account.
- the first account includes at least the mobile phone number or email address of the first device.
- the first device may receive the first account and the first verification code entered by the user on the account login interface of the first application; For the user's login operation on the account login interface, the first device can use the first account and the first verification code to log in to the first account in the first application.
- the second device may request the server of the first application to send a verification code (such as a second verification code) to the first account.
- a verification code such as a second verification code
- the first device can receive the second verification code from the server.
- the second verification code may be different from the above-mentioned first verification code.
- the first device can send the second verification code to the second device.
- the second device can use the first account and the second verification code to log in to the first account in the first application.
- the user may decide whether to save the login information of the first account. That is, the user may decide whether to save the login information of the first account, so that the first device can share with other devices in response to the first operation.
- the first device may also display the second interface.
- the second interface is used to request the user to confirm whether to save the login information of the first account.
- the first device may save the identity information of the first application and the login information of the first account.
- the first device can save the login information of the first account according to the user's choice and according to the user's wishes. In this way, the interaction performance between the first device and the user can be improved, which is conducive to improving the user experience.
- the first device in response to the user's sixth operation on the second interface, may not save the identity information of the first application and the login information of the first account, and the first device The first interface, the above-mentioned main interface, or the preset page of the first application can be displayed.
- the first device can save the login information of the first account according to the user's choice and according to the user's wishes. In this way, the interaction performance between the first device and the user can be improved, which is conducive to improving the user experience.
- the first device may request the user to confirm whether to share the login information of the first account with the second device before sending the login information of the first account to the second device.
- the login information of the first account is shared with other devices due to the user's misoperation, so that it can be avoided that other devices obtain the login information of the first account due to the misoperation of the user.
- the user's information security can be protected.
- the first device in response to the user's selection operation of the first device option in the first interface, sends the identity information of the first application and the login information of the first account to the second device corresponding to the first device option, which may include : In response to the user's selection operation of the first device option, the first device sends out first prompt information; the first prompt information is used to request the user to confirm whether to share the login information of the first account with the second device; in response to the user In the third operation of the first prompt information, the first device sends the identity information of the first application and the login information of the first account to the second device.
- the first device and the second device in order to improve the security of the login information of the first account and prevent the login information of the first account from being stolen during the sharing process, can The session key is negotiated.
- the first device can use the session key to add data shared with the second device.
- the first device sending the identity information of the first application and the login information of the first account to the second device corresponding to the first device option may include: In response to the user's selection operation of the first device option, the first device negotiates the session key with the second device; the first device uses the session key to encrypt the identity information of the first application and the login information of the first account to obtain encrypted data, And send encrypted data to the second device.
- the above-mentioned identity information of the first application may further include the signature public key of the first application.
- the package name of the first application is used to indicate the first application.
- the signature public key of the first application is used to verify whether the package name of the first application has been tampered with. It can be understood that if the package name of the first application is tampered with, the second device will not use the login information of the first account to log in to the first account in the first application.
- the first device and the second device may have established a wireless connection. Connected, or wireless connection may not have been established yet.
- the first device sending the identity information of the first application and the login information of the first account to the second device may include: responding to The user selects the option of the first device. If the first device and the second device have established a wireless connection, the first device sends the identity information of the first application and the login information of the first account to the second device through the wireless connection; The user selects the option of the first device. If the first device does not establish a wireless connection with the second device, the first device can request the establishment of a wireless connection with the second device, and after the wireless connection is established, the second device can be sent to the second device through the wireless connection. Send the identity information of the first application and the login information of the first account.
- the first device in response to the user's selection operation of the first device option, may perform user identity authentication. If the user's identity is authenticated, the first device can send the identity information of the first application and the login information of the first account to the second device.
- this application provides an account data sharing method, which is applied to a second device.
- the second device can receive the identity information of the first application from the first device and the login information of the first account of the first application; the second device displays the account login interface of the first application, and fills the first account in the account login interface
- the second device can use the login information of the first account to log in to the first account in the first application.
- the login information of the first account includes the first account and the login password of the first account.
- the login information of the aforementioned first account includes the first account.
- the login information of the first account does not include the login password of the first account.
- the aforementioned identity information of the first application may include a package name of the first application, and the package name of the first application is used to identify the first application.
- the second device can receive the login information of the first account shared by the first device and use the login information of the first account.
- the login information logs in the first account in the first application.
- the electronic device can share the login information of the application selected by the user with other devices in a targeted manner, and the information security in the electronic device can be improved.
- the second device may receive the login information of the first account from the first device, and the login information of the first account does not need to be transmitted by the server. Therefore, the login information of the first account can be prevented from being stolen on the server side, and the user's information security can be protected.
- the electronic device can share the account and login password of any application in the electronic device with other devices, and can protect the user's information security. That is to say, with the method of this application, the automatic sharing of account data can be intelligently realized on the premise of protecting the user's information security.
- the user may decide whether to use the login information to log in to the first account. Specifically, after the second device receives the identity information of the first application from the first device and the login information of the first account, before the second device displays the account login interface of the first application, the second device may display the third interface; The third interface is used to request the user to confirm whether to use the login information to log in to the first account. In response to the user's fifth operation on the third interface, the second device may display the account login interface.
- the second device can log in to the first account with the login information according to the user's choice according to the user's wishes. In this way, the interaction performance between the second device and the user can be improved, which is conducive to improving the user experience.
- the login information of the first account includes the first account, but does not include the login password of the first account.
- the second device may request the server of the first application to send a verification code (such as a second verification code) to the first account.
- the second device can use the first account and the second verification code to log in to the first account in the first application.
- the second device uses the login information of the first account to log in to the first account in the first application, which may include: responding to the obtaining of the verification code entered by the user on the account login interface
- the second device can send a verification code acquisition request to the server of the first application; the verification code acquisition request includes the first account, which is used to request the server to send the verification code to the first account; then, the second device can receive the verification code from The second verification code of the first device; the second verification code is sent to the first account by the second device requesting the server; finally, the second device can fill in the second verification code on the account login interface, using the first account and the second
- the verification code is used to log in to the first account in the first application.
- the foregoing fourth operation includes an operation of obtaining a verification code.
- the second device before the second device displays the account login interface of the first application, the second device can determine whether the second device is running the first application according to the identity information of the first application . If the second device is running the first application, the second device can display the account login interface. If the second device is not running the first application, the second device may discard the identity information of the first application and the login information of the first account.
- the second device is running the first application includes any of the following situations: the second device is running the first application in the foreground; the second device is running the first application in the background; the second device is running a browser in the foreground and browsing The browser displays the webpage of the first application; the second device is running a browser in the background, and the browser displays the webpage of the first application.
- the second device receives the first application from the first device After the identity information and the login information of the first account, the second device can automatically start the first application and display the account login interface of the first application.
- the second device in order to protect the user's information security, can negotiate a session key with the first device; the second device can receive encrypted data from the first device; this The encrypted data is obtained by using the session key to encrypt the identity information of the first application and the login information of the first account; the second device can use the session key to decrypt the encrypted data to obtain the identity information of the first application and the login information of the first account .
- the above-mentioned identity information of the first application further includes the signature public key of the first application.
- the signature public key of the first application is used to determine whether the package name of the first application has been tampered with.
- the second device displaying the account login interface of the first application includes: the second device determines that the package name of the first application in the identity information of the first application has not been tampered with according to the signature public key of the first application, and the second device The account login interface is displayed.
- the second device cannot log in to the first application. Or the application corresponding to the tampered package name. That is to say, after the second device receives the identity information of the first application and the login information of the first account, it executes "display the account login interface", "fill the login information into the account login interface” and "log in with the login information. "An account” is an invalid operation. Therefore, before the second device displays the account login interface of the first application, it is determined whether the package name of the first application has been tampered with, which can prevent the second device from performing the above invalid operation.
- this application provides a method for sharing account data.
- a first device uses a first verification code to log in to a first account in a first application, and the first device can receive The first operation is used to trigger the first device to share the first account with other devices.
- the first device may display the first interface.
- the first interface includes one or more device options, and each device option corresponds to a wireless device searched by the first device.
- the first device may send the identity information of the first application and the aforementioned first account to the second device corresponding to the first device option.
- the identity information of the first application is used to identify the first application.
- the second device may receive the identity information of the first application and the first account from the first device; then, display the account login interface of the first application, and fill in the account login interface with the first account.
- the second device may send a verification code obtaining request to the server of the first application.
- the verification code acquisition request includes the first account, which is used to request the server to send the verification code to the first account.
- the server may receive the verification code acquisition request from the second device, and send the second verification code of the first account to the first device.
- the first device may receive the second verification code from the server, and send the second verification code to the second device.
- the second device may receive the second verification code from the first device, fill in the second verification code in the account login interface, and use the first account and the second verification code to log in to the first account in the first application.
- the first user and the second user may be the same or different.
- the first device uses the first account and verification code. After the first application logs in to the first account, in response to the user's first operation on the first application, the first device can share the identity information of the first application and the second device. An account number.
- the second device can automatically request the server to issue a verification code according to the first account.
- the server may send a second verification code to the first device, and the first device may forward the second verification code to the second device, so that the first device can log in to the first account in the first application according to the first account and the second verification code .
- the first device can send to other applications (such as the first application) in response to the user's first operation on any application (such as the first application).
- the device (such as the second device) shares the login information of the first application. That is to say, through this method, the electronic device can share the login information of the application selected by the user with other devices in a targeted manner, and the information security in the electronic device can be improved.
- the first device can directly share the first account and the second verification code with the second device, and the first account and the second verification code do not need to be transmitted by the server. Therefore, the first account and the second verification code can be prevented from being stolen on the server side, and the user's information security can be protected.
- the electronic device can share the account and login password of any application in the electronic device with other devices, and can protect the user's information security.
- the above-mentioned identity information of the first application includes the package name of the first application.
- the identity information of the first application includes the package name of the first application and the signature public key of the first application.
- the signature public key is used to verify whether the package name of the first application has been tampered with.
- the package name of the first application is used to identify the first application.
- the above method further includes: the second device determines that the package name of the first application has not been tampered with according to the signature public key. That is, only when the package name of the first application has not been tampered with, the second device will display the account login interface of the first application.
- the present application provides an electronic device, which is a first device, and the first device includes: a wireless communication module, a memory, a display screen, and one or more processors.
- the wireless communication module, memory, display screen are coupled with the processor.
- the above-mentioned memory is used to store computer program code, and the computer program code includes computer instructions; when the computer instructions are executed by the processor, the first device causes the first device to perform the following operations: receiving a user's first operation on the first application; The device logs in to the first account in the first application; the first operation is used to trigger the first device to share the login information of the first account with other devices; in response to the first operation, a first interface including one or more device options is displayed , Each device option corresponds to a wireless device searched by the first device; in response to the user's selection operation of the first device option in the first interface, the identity information and identity information of the first application are sent to the second device corresponding to the first device option Login information of the first account.
- the login information of the first account includes the first account; or, the login information of the first account includes the first account and the login password of the first account.
- the above-mentioned identity information of the first application includes the package name of the first application, and the package name of the first application is used to identify the first application.
- the first device when the computer instruction is executed by the processor, the first device is caused to perform the following steps: before receiving the user's first operation on the first application, display the first device's The main interface, the main interface includes the icon of the first application.
- the first operation is a preset operation of the user on the icon of the first application displayed on the main interface.
- the first device when the computer instruction is executed by the processor, the first device is caused to further execute the following step: before receiving the first operation of the first application by the user, display the preset page of the first application.
- the preset page includes a preset control, and the preset control is used to trigger the first device to share login information with other devices.
- the login information of the first account includes the first account and the login password of the first account.
- the first device is caused to perform the following steps: before receiving the user's first operation on the first application, receiving the first account and the first account entered by the user on the account login interface of the first application In response to the user's login operation on the account login interface, use the first account and the login password of the first account to log in to the first account in the first application.
- the login information of the first account includes the first account, but does not include the login password of the first account; wherein, the first account includes at least the mobile phone number of the first device or email address.
- the first device When the computer instruction is executed by the processor, the first device is caused to further perform the following steps: before receiving the user's first operation on the first application, receiving the first account and first verification input by the user on the account login interface of the first application Code; in response to the user's login operation in the account login interface, use the first account and the first verification code to log in to the first account in the first application.
- the first device when the computer instruction is executed by the processor, the first device further executes the following steps: before sending the identity information of the first application and the first account to the second device After the login information, receive the second verification code from the server of the first application; where the second verification code is sent by the second device to the server requesting the first account; send the second verification code to the second device; where the second verification code is sent to the second device; The verification code is used for the second device to log in to the first account in the first application.
- the first device when the computer instruction is executed by the processor, the first device is caused to perform the following steps: after the first application logs in to the first account, the second interface is displayed; wherein, The second interface is used to request the user to confirm whether to save the login information of the first account; in response to the user's second operation on the second interface, save the identity information of the first application and the login information of the first account.
- the first device when the computer instruction is executed by the processor, the first device is caused to perform the following steps: in response to the user's sixth operation on the second interface, the first application is not saved And the login information of the first account, the first interface is displayed.
- the first device when the computer instruction is executed by the processor, the first device is caused to perform the following steps: in response to the user's selection operation of the first device option, the first prompt message is issued ; Wherein, the first prompt information is used to request the user to confirm whether to share the login information of the first account with the second device; in response to the user's third operation on the first prompt information, send the identity information of the first application to the second device and Login information of the first account.
- the first device when the computer instruction is executed by the processor, the first device is caused to perform the following steps: in response to the user's selection operation of the first device option, negotiate with the second device Out the session key; use the session key to encrypt the identity information of the first application and the login information of the first account to obtain encrypted data, and send the encrypted data to the second device.
- the identity information of the first application further includes the signature public key of the first application; wherein, the signature public key of the first application is used to verify whether the package name of the first application is Has been tampered with.
- the first device when the computer instruction is executed by the processor, the first device is caused to perform the following steps: in response to the user's selection operation of the first device option, negotiate with the second device Out the session key; use the session key to encrypt the identity information of the first application and the login information of the first account to obtain encrypted data, and send the encrypted data to the second device.
- the present application provides an electronic device, which is a second device, and the second device includes: a wireless communication module, a memory, a display screen, and one or more processors; a wireless communication module, a memory, a display screen, and Processor coupling.
- the memory is used to store computer program code, and the computer program code includes computer instructions; when the computer instructions are executed by the processor, the second device is caused to perform the following operations: receiving the identity information of the first application from the first device and the first application
- the login information of the first account ; the account login interface of the first application is displayed, and the login information of the first account is filled in the account login interface; in response to the user's fourth operation on the account login interface, the login information of the first account is used, Log in to the first account in the first application.
- the login information of the aforementioned first account includes the first account.
- the login information of the first account includes the first account and the login password of the first account.
- the above-mentioned identity information of the first application includes the package name of the first application, and the package name of the first application is used to identify the first application.
- the second device when the computer instruction is executed by the processor, the second device further executes the following steps: after receiving the identity information of the first application and the login information of the first account, display Before the account login interface of the first application, a third interface is displayed, and the third interface is used to request the user to confirm whether to log in to the first account with the login information; in response to the user's fifth operation on the third interface, the account login interface is displayed.
- the login information of the first account includes the first account, but does not include the login password of the first account.
- the second device When the computer instruction is executed by the processor, the second device is caused to further perform the following steps: in response to the operation of obtaining the verification code entered by the user on the account login interface, send a verification code acquisition request to the server of the first application, the verification code acquisition request Includes a first account, which is used to request the server to send a verification code to the first account; receives a second verification code from the first device, the second verification code is sent by the second device to request the server to the first account; log in with the account The interface fills in the second verification code, and uses the first account and the second verification code to log in to the first account in the first application.
- the foregoing fourth operation includes the foregoing operation of obtaining a verification code.
- the second device when the computer instructions are executed by the processor, the second device is caused to perform the following steps: if the second device is determined to be running the first application according to the identity information of the first application Application, the account login interface is displayed.
- the second device is running the first application includes any of the following situations: the second device is running the first application in the foreground; the second device is running the first application in the background; the second device is running a browser in the foreground, and the browser displays The webpage of the first application; the second device is running a browser in the background, and the browser displays the webpage of the first application.
- the second device when the computer instruction is executed by the processor, the second device is caused to perform the following steps: negotiate the session key with the first device; receive the encryption from the first device Data; where the encrypted data is obtained by using the session key to encrypt the identity information of the first application and the login information of the first account; using the session key to decrypt the encrypted data, the identity information of the first application and the login information of the first account are obtained .
- the above-mentioned identity information of the first application further includes the signature public key of the first application.
- the signature public key of the first application is used to verify whether the package name of the first application has been tampered with.
- the second device is caused to perform the following steps: according to the signature public key of the first application, determine whether the package name of the first application in the identity information of the first application has been tampered with; The package name has not been tampered with, and the account login interface is displayed.
- the second device when the above-mentioned computer instructions are executed by the processor, the second device is caused to further perform the following steps: negotiate a session key with the first device; Encrypted data, the encrypted data is obtained by using the session key to encrypt the identity information of the first application and the login information of the first account; using the session key to decrypt the encrypted data, the identity information of the first application and the login information of the first account are obtained .
- the present application provides a chip system, which can be applied to an electronic device including a wireless communication module, a memory, and a display screen.
- the chip system includes one or more interface circuits and one or more processors.
- the interface circuit and the processor are interconnected by wires.
- the interface circuit is used to receive a signal from the memory and send the signal to the processor, and the signal includes a computer instruction stored in the memory.
- the processor executes the computer instruction
- the electronic device executes the method described in the first aspect, the second aspect, the third aspect, and any one of the possible design manners thereof.
- the present application provides a computer-readable storage medium, which includes computer instructions.
- the computer instructions When the computer instructions are executed on the electronic device, the electronic device is caused to execute the method described in the first aspect, the second aspect, the third aspect, and any one of the possible design manners thereof.
- this application provides a computer program product, which when the computer program product runs on a computer, causes the computer to execute the first aspect, the second aspect, the third aspect, and any possible design thereof The method described in the way.
- FIG. 1 is a schematic diagram of a system architecture applied by an account data sharing method provided by an embodiment of the application
- FIG. 2 is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the application.
- FIG. 3 is a flowchart of an account data sharing method provided by an embodiment of the application.
- FIG. 4 is a schematic diagram of an example of a display interface of a mobile phone provided by an embodiment of the application.
- FIG. 5 is a schematic diagram of an example of a display interface of another mobile phone provided by an embodiment of the application.
- 6A is a schematic diagram of an example of a second interface provided by an embodiment of this application.
- FIG. 6B is a flowchart of another method for sharing account data according to an embodiment of the application.
- FIG. 7A is a flowchart of another account data sharing method provided by an embodiment of the application.
- FIG. 7B is a schematic diagram of an example of a display interface of another mobile phone provided by an embodiment of the application.
- FIG. 7C is a schematic diagram of an example of a display interface of another mobile phone provided by an embodiment of the application.
- FIG. 7D is a schematic diagram of an example of a display interface of another mobile phone provided by an embodiment of the application.
- FIG. 7E is a schematic diagram of an example of a display interface of another mobile phone provided by an embodiment of the application.
- FIG. 8 is a schematic diagram of an example of a display interface of another mobile phone provided by an embodiment of the application.
- FIG. 9 is a schematic diagram of an example of a display interface of another mobile phone provided by an embodiment of the application.
- FIG. 10 is a schematic diagram of an example of a display interface of another mobile phone provided by an embodiment of the application.
- FIG. 11 is a flowchart of another method for sharing account data according to an embodiment of the application.
- FIG. 12 is a flowchart of another account data sharing method provided by an embodiment of the application.
- FIG. 13 is a schematic structural diagram of an electronic device provided by an embodiment of the application.
- FIG. 14 is a schematic structural diagram of a chip system provided by an embodiment of the application.
- first and second are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance or implicitly indicating the number of indicated technical features. Thus, the features defined with “first” and “second” may explicitly or implicitly include one or more of these features. In the description of the present embodiment, unless otherwise specified, “plurality” means two or more.
- a scheme for automatically sharing account numbers and login passwords can realize automatic sharing of account data of applications (such as application a) between two electronic devices (such as electronic device 1 and electronic device 2).
- the login password storage module of the electronic device 1 (such as a mobile phone) can save the account numbers and login passwords of each application (including application a) in the electronic device 1; the data cloning module can clone all the login password storage modules at once.
- the account and login password of the application; the device connection module can transmit the account and login password of all the cloned applications to the electronic device 2 (such as a TV).
- the electronic device 2 can automatically log in to the account of the application a using the account and the login password of the application a.
- the electronic device 1 cannot selectively share the account and login password of the application a with the electronic device 2.
- the electronic device 2 may be a public device within a certain range, and cloning the account numbers and login passwords of all applications in the electronic device 1 into the electronic device 2 may result in the disclosure of multiple user accounts and login passwords.
- another solution can realize the sharing of account numbers and login passwords between devices by scanning codes in the application.
- the electronic device 2 that has not logged in to the account can display the scan interface of application a, and the scan interface includes the QR code of application a; the electronic device 1 that has logged in the account can scan the QR code to send the login to the electronic device 2. Credentials; the electronic device 2 can use the login credentials to log in to the account.
- the embodiment of the present application provides a method for sharing account data.
- the electronic device can share the account and login password of any application in the electronic device with other devices without further development of the client and server of the application. And can protect the user's information security.
- FIG. 1 shows a schematic diagram of a system architecture applied by an account data sharing method provided by an embodiment of the present application.
- the system may include: a first device 110 and a second device 120.
- the first device 110 and the second device 120 can establish a wireless connection.
- the wireless connection may be any of (wireless fidelity, Wi-Fi) connection, Bluetooth connection, or near field communication (NFC) technology.
- Wi-Fi connection may include Wi-Fi direct connection, that is, Wi-Fi peer-to-peer (P2P) connection.
- P2P Wi-Fi peer-to-peer
- the first application is installed in the first device 110.
- the first device 110 has logged in the first account in the first application. It is understandable that the first device 110 can use the first account and login password to log in to the first account in the first application.
- the first application may also be installed in the second device 120.
- the second device 120 may open the webpage of the first application in the browser of the second device 120.
- the first device 110 may share the first account and login password of the first application with the second device 120 through the above-mentioned wireless connection.
- the second device 120 can use the first account and login password to log in to the first account in the first application or the webpage of the first application.
- the aforementioned first application may be any application that has the function of registering and logging in an account, such as a shopping application, an instant messaging application, or a video application.
- the electronic device (such as the first device or the second device) in the embodiment of the present application may be a mobile phone, a tablet computer, a smart TV, a personal computer (PC), a desktop, a laptop, a handheld Computers, laptops, ultra-mobile personal computers (UMPC), netbooks, as well as cellular phones, personal digital assistants (PDA), augmented reality (AR) ⁇ virtual reality (virtual reality) , VR) devices and other devices, the embodiment of the application does not impose special restrictions on the specific form of the electronic device.
- PDA personal digital assistants
- AR augmented reality
- VR virtual reality
- first device 110 and the second device 120 may be different types of devices.
- the first device 110 is a mobile phone
- the second device 120 is a tablet computer.
- the first device 110 and the second device 120 may also be the same type of device.
- both the first device 110 and the second device 120 are mobile phones. The embodiment of the application does not limit this.
- an electronic device 200 (such as a mobile phone) may include: a processor 210, an external memory interface 220, an internal memory 221, a universal serial bus (USB) interface 230, a charging management module 240, and power management Module 241, battery 242, antenna 1, antenna 2, mobile communication module 250, wireless communication module 260, audio module 270, speaker 270A, receiver 270B, microphone 270C, earphone jack 270D, sensor module 280, button 290, motor 291, indicator 292, camera 293, display 294, subscriber identification module (SIM) card interface 295, etc.
- SIM subscriber identification module
- the sensor module 280 may include pressure sensors, gyroscope sensors, air pressure sensors, magnetic sensors, acceleration sensors, distance sensors, proximity light sensors, fingerprint sensors, temperature sensors, touch sensors, ambient light sensors, and bone conduction sensors.
- the structure illustrated in this embodiment does not constitute a specific limitation on the electronic device 200.
- the electronic device 200 may include more or fewer components than shown, or combine certain components, or split certain components, or arrange different components.
- the illustrated components can be implemented in hardware, software, or a combination of software and hardware.
- the processor 210 may include one or more processing units.
- the processor 210 may include an application processor (AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) Wait.
- AP application processor
- modem processor modem processor
- GPU graphics processing unit
- image signal processor image signal processor
- ISP image signal processor
- controller memory
- video codec digital signal processor
- DSP digital signal processor
- NPU neural-network processing unit
- the different processing units may be independent devices or integrated in one or more processors.
- the controller may be the nerve center and command center of the electronic device 200.
- the controller can generate operation control signals according to the instruction operation code and timing signals to complete the control of fetching instructions and executing instructions.
- a memory may also be provided in the processor 210 for storing instructions and data.
- the memory in the processor 210 is a cache memory.
- the memory can store instructions or data that have just been used or recycled by the processor 210. If the processor 210 needs to use the instruction or data again, it can be directly called from the memory. Repeated accesses are avoided, the waiting time of the processor 210 is reduced, and the efficiency of the system is improved.
- the processor 210 may include one or more interfaces.
- the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, and a universal asynchronous transmitter/receiver (universal asynchronous) interface.
- I2C integrated circuit
- I2S integrated circuit built-in audio
- PCM pulse code modulation
- PCM pulse code modulation
- UART universal asynchronous transmitter/receiver
- MIPI mobile industry processor interface
- GPIO general-purpose input/output
- SIM subscriber identity module
- USB Universal Serial Bus
- the interface connection relationship between the modules illustrated in this embodiment is merely a schematic description, and does not constitute a structural limitation of the electronic device 200.
- the electronic device 200 may also adopt different interface connection modes in the foregoing embodiments, or a combination of multiple interface connection modes.
- the charging management module 240 is used to receive charging input from the charger.
- the charger can be a wireless charger or a wired charger. While the charging management module 240 charges the battery 242, the power management module 241 can also supply power to the electronic device.
- the power management module 241 is used to connect the battery 242, the charging management module 240 and the processor 210.
- the power management module 241 receives input from the battery 242 and/or the charging management module 240, and supplies power to the processor 210, the internal memory 221, the external memory, the display screen 294, the camera 293, and the wireless communication module 260.
- the power management module 241 and the charging management module 240 may also be provided in the same device.
- the wireless communication function of the electronic device 200 can be implemented by the antenna 1, the antenna 2, the mobile communication module 250, the wireless communication module 260, the modem processor, and the baseband processor.
- the antenna 1 of the electronic device 200 is coupled with the mobile communication module 250
- the antenna 2 is coupled with the wireless communication module 260, so that the electronic device 200 can communicate with the network and other devices through wireless communication technology.
- the electronic device 200 may send the aforementioned first account and login password to other devices through wireless communication technology.
- the antenna 1 and the antenna 2 are used to transmit and receive electromagnetic wave signals.
- Each antenna in the electronic device 200 can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
- Antenna 1 can be multiplexed as a diversity antenna of a wireless local area network.
- the antenna can be used in combination with a tuning switch.
- the mobile communication module 250 can provide a wireless communication solution including 2G/3G/4G/5G and the like applied to the electronic device 200.
- the mobile communication module 250 may include at least one filter, a switch, a power amplifier, a low noise amplifier (LNA), and the like.
- the mobile communication module 250 can receive electromagnetic waves from the antenna 1, filter and amplify the received electromagnetic waves, and transmit them to the modem processor for demodulation.
- the mobile communication module 250 can also amplify the signal modulated by the modem processor, and convert it into electromagnetic wave radiation via the antenna 1.
- at least part of the functional modules of the mobile communication module 250 may be provided in the processor 210.
- at least part of the functional modules of the mobile communication module 250 and at least part of the modules of the processor 210 may be provided in the same device.
- the wireless communication module 260 can provide applications on the electronic device 200 including wireless local area networks (WLAN) (such as (wireless fidelity, Wi-Fi) networks), Bluetooth (bluetooth, BT), and global navigation satellite systems (global navigation satellite systems).
- WLAN wireless local area networks
- BT Bluetooth
- global navigation satellite systems global navigation satellite systems
- GNSS global navigation satellite systems
- FM frequency modulation
- NFC near field communication
- IR infrared technology
- the electronic device 200 may access a Wi-Fi network through the wireless communication module 260.
- the wireless communication module 260 may be one or more devices integrating at least one communication processing module.
- the wireless communication module 260 receives electromagnetic waves via the antenna 2, frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 210.
- the wireless communication module 260 may also receive the signal to be sent from the processor 210, perform frequency modulation, amplify, and convert it into electromagnetic waves and radiate it through the antenna 2.
- the electronic device 200 implements a display function through a GPU, a display screen 294, an application processor, and the like.
- the GPU is an image processing microprocessor, which is connected to the display screen 294 and the application processor.
- the GPU is used to perform mathematical and geometric calculations and is used for graphics rendering.
- the processor 210 may include one or more GPUs that execute program instructions to generate or change display information.
- the display screen 294 is used to display images, videos, and the like.
- the display screen 294 includes a display panel.
- the display screen 294 may be used to display the application interface of the above-mentioned first APP, such as a device sharing interface, a device search interface, and a QR code scanning interface.
- the electronic device 200 can implement a shooting function through an ISP, a camera 293, a video codec, a GPU, a display screen 294, and an application processor.
- the ISP is used to process the data fed back by the camera 293.
- the camera 293 is used to capture still images or videos.
- the electronic device 200 may include 1 or N cameras 293, and N is a positive integer greater than 1.
- the external memory interface 220 may be used to connect an external memory card, such as a Micro SD card, so as to expand the storage capacity of the electronic device 200.
- the external memory card communicates with the processor 210 through the external memory interface 220 to realize the data storage function. For example, save music, video and other files in an external memory card.
- the internal memory 221 may be used to store computer executable program code, where the executable program code includes instructions.
- the processor 210 executes various functional applications and data processing of the electronic device 200 by running instructions stored in the internal memory 221.
- the processor 210 may execute instructions stored in the internal memory 221, and the internal memory 221 may include a program storage area and a data storage area.
- the storage program area can store an operating system, an application program (such as a sound playback function, an image playback function, etc.) required by at least one function, and the like.
- the data storage area can store data (such as audio data, phone book, etc.) created during the use of the electronic device 200.
- the internal memory 221 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash storage (UFS), and the like.
- the electronic device 200 can implement audio functions through an audio module 270, a speaker 270A, a receiver 270B, a microphone 270C, a headphone interface 270D, and an application processor. For example, music playback, recording, etc.
- the button 290 includes a power button, a volume button, and so on.
- the button 290 may be a mechanical button. It can also be a touch button.
- the motor 291 can generate vibration prompts. The motor 291 can be used for incoming call vibration notification, and can also be used for touch vibration feedback.
- the indicator 292 can be an indicator light, which can be used to indicate the charging status, power change, or to indicate messages, missed calls, notifications, and so on.
- the SIM card interface 295 is used to connect to the SIM card. The SIM card can be inserted into the SIM card interface 295 or pulled out from the SIM card interface 295 to achieve contact and separation with the electronic device 200.
- the electronic device 200 may support 1 or N SIM card interfaces, and N is a positive integer greater than 1.
- the SIM card interface 295 may support Nano SIM cards, Micro SIM cards, SIM cards, etc.
- the first device 110 shown in FIG. 1 is the mobile phone A and the second device 120 is the mobile phone B as an example to introduce the method of the embodiment of the present application.
- the first application is installed in mobile phone A.
- the first application may be a shopping application, a video application, an instant messaging application, or any other application that has the function of registering and logging in to an account, such as an application for online learning.
- the main interface (ie desktop) of mobile phone A includes an icon 403 of the shopping application, an icon 402 of a video application, and an icon 401 of the learning application.
- the embodiment of the present application provides an account data sharing method.
- the method may include three processes of process (1)-process (3).
- Process (1) The manual login process of mobile phone A.
- Process (2) The process for mobile phone A to share account data with mobile phone B.
- Process (3) The automatic login process of mobile phone B.
- the above process (1) that is, the "manual login process of mobile phone A”
- Mobile phone A receives account data input by the user on the account login interface of the first application.
- the account login interface of the first application may include an "account input box” and a "login password input box".
- the "account input box” is used to input the account of the first application (such as the first account), and the “login password input box” is used to input the login password of the first account.
- the aforementioned account data may include the first account and the login password of the first account.
- the aforementioned account login interface may also include a "login” button.
- the "login” button is used to trigger the mobile phone A to log in to the first account by using the first account entered in the "account input box” and the login password of the first account entered in the "login password input box". For example, take the first application being a shopping application as an example.
- the mobile phone A can display the account login interface 410 shown in (b) of FIG. 4.
- the account login interface 410 includes an "account input box” 411, a "login password input box” 412, and a "login” button 413.
- the account login interface of the first application may also include an "auto save” option.
- the "Auto Save” option is used to trigger mobile phone A to automatically save the account entered in the "Account Input Box" and the login password entered in the "Login Password Input Box".
- the mobile phone A can display the account login interface 420 shown in (c) in FIG. 4.
- the account login interface 420 includes an “account input box” 421, a “login password input box” 422, a “login” button 424, and an “auto save” option 423.
- the aforementioned account login interface may include “account input box”, “verification code input box”, and “get verification code” buttons.
- the "account input box” is used to input accounts such as mobile phone numbers or email addresses.
- the above-mentioned first account may at least include the mobile phone number or email address of mobile phone A.
- the "Get Verification Code” button is used to trigger mobile phone A to request the server of the first application to send a verification code to the account entered in the "account input box” (ie, the first account, such as a mobile phone number).
- the "Verification Code Input Box” is used to input the verification code sent by the server to the electronic device using the aforementioned account (such as a mobile phone number).
- the aforementioned account data may include the first account number and the verification code.
- the verification code 1 is the first verification code.
- the verification code 1 is issued by mobile phone A requesting the server. Both the login password of the first account and the verification code 1 can be used as the login credentials for logging in to the first account.
- the difference is: after mobile phone A successfully logs in to the first account in the first application, the verification code 1 becomes invalid; or, the verification code 1 is valid for a preset duration of 1 (such as 5 minutes or 10 minutes), and the preset duration is 1 After that, the verification code 1 becomes invalid.
- the start time of the preset duration 1 is the time when the server sends the verification code.
- the aforementioned account login interface may also include a “login” button.
- the “login” button is used to trigger the mobile phone A to log in to the first account by using the first account entered in the "account input box” and the verification code 1 entered in the "verification code input box”.
- the mobile phone A may display the account login interface 500 of the video application shown in FIG. 5.
- the account login interface 500 includes an “account input box” 501, a “verification code input box” 502, a “get verification code” button 503, and a “login” button 504.
- mobile phone A uses the aforementioned account data to log in to the first account in the first application.
- the aforementioned login operation may be a user's click operation (such as a single click operation) on the "login" button shown in FIG. 4 (b), FIG. 4 (c), or FIG. 5.
- the method for mobile phone A to log in to the first account in the first application includes but is not limited to the methods described in S301-S302.
- the method of logging in to the account in the conventional technology refer to the method of logging in to the account in the conventional technology, which will not be repeated here.
- the mobile phone A can also save the first account and the login password of the first account, or save the first account according to the user's selection.
- the method in the embodiment of the present application may further include S303.
- the mobile phone A displays the second interface.
- the second interface is used to request the user to confirm whether to save the login information of the first account.
- the login information of the first account includes the first account and the login password of the first account. That is, the second interface is used to request the user to confirm whether to save the first account and the login password of the first account.
- the mobile phone A can log in to the first account in response to the user's click operation on the "login" button shown in (b) in FIG. 4. Take the first account number 180****7812 as an example.
- the second interface 610 shown in (a) in FIG. 6A can be displayed.
- the second interface 610 may include prompt information 611, such as "Please confirm whether to save the account number 180****7812 and the login password!.
- the second interface 610 may also include a “yes” button 612 and a “no” button 613.
- the "Yes” button 612 is used to trigger the mobile phone A to save the first account and the login password of the first account.
- the "No” button 613 is used to indicate that the mobile phone A does not need to save the first account and the login password of the first account.
- the second interface 610 may also include prompt information 614, such as "The saved account and password can be used to share with other devices, and the account can be automatically logged in to other devices!.
- the account login interface of the first application includes an "account input box” and a "login password input box".
- the account login interface shown in (b) in FIG. 4 and (c) in FIG. 4 both include an "account input box” and a "login password input box”.
- the account login interface of the first application may also include an "auto save” option.
- the account login interface 420 shown in (c) in FIG. 4 includes an "auto save” option 423.
- the account login interface of the first application includes "auto save”.
- the "auto save” is selected when mobile phone A executes S302; after S302, mobile phone A can execute S303 to display the second interface.
- the account login interface of the first application includes "auto save".
- the "auto save” is not selected; after S302, mobile phone A can execute S303 to display the second interface. If mobile phone A executes S302, the "auto save” is selected; after S302, mobile phone A may not execute S303 (that is, without displaying the second interface), but directly save the identity information of the first application and the login of the first account information.
- mobile phone A can also save the login information of the first account.
- the login information of the first account saved by mobile phone A is used to automatically log in to the first account in the first application when mobile phone A starts the first application next time.
- mobile phone A saves the login information of the first account, which can not only be used to automatically log in to the first account in the first application when mobile phone A starts the first application next time; it can also be used to log in to other applications.
- the device (such as mobile phone B) shares the login information of the first account, so that the mobile phone B can automatically log in to the first account according to the login information of the first account.
- the login information of the first account includes the first account. That is, the second interface is used to request the user to confirm whether to save the first account.
- mobile phone A can log in to the first account in response to the user's click operation on the "login” button shown in FIG. 5. Take the first account number 176****1860 as an example.
- the second interface 620 shown in (b) in FIG. 6A can be displayed.
- the second interface 620 may include prompt information 621, such as "Please confirm whether to save the account number 176****1860!.
- the second interface 620 may also include a “YES” button 622 and a “NO” button 623.
- the "YES” button 622 is used to trigger the mobile phone A to save the first account.
- the "NO” button 623 is used to indicate that the mobile phone A does not need to save the first account.
- the second interface 620 may also include prompt information 624, such as "The saved account can be used to share with the device, and the account can be automatically logged in to other devices!.
- the mobile phone A may also provide a system function switch (also called a menu switch).
- Mobile phone A can receive the user's opening operation of the function switch. In response to the opening operation, if the user inputs account data on the account login interface of the first application, mobile phone A can automatically save the identity information of the first application and the login information of the first account. If the above function switch is turned off, mobile phone A will not automatically save the identity information of the first application and the login information of the first account.
- mobile phone A may display the above-mentioned function switches on the setting interface of mobile phone A.
- mobile phone A can display the above function switches in the menu bar.
- the design of the above-mentioned function switch in the mobile phone A includes but is not limited to the above-mentioned manner, and the embodiment of the present application does not limit the specific position of the function switch.
- the mobile phone A In response to the user's operation 1 on the second interface, the mobile phone A saves the identity information of the first application and the login information of the first account.
- this operation 1 is the second operation.
- the identity information of the first application may include: the package name of the first application; or, the package name of the first application and the signature public key of the first application.
- the android system uses the package name to determine the identity of the application (that is, the application program).
- the package name of the application can be freely set by the application developer; therefore, in order to protect the application from being counterfeited, the developer’s signature can be added to the application when the application is released.
- Developers can generate signature private key and signature public key.
- the signature private key is used to generate the above-mentioned signature.
- the signature public key is used to verify or verify the above-mentioned signature when the application is started.
- the signature public key of the first application will not change. However, if the first application is tampered with, the signature of the first application will change.
- mobile phone A (such as the PMS in the framework of mobile phone A) can use the signature public key of the first application to verify the signature of the first application to determine the first application. Whether the application has been tampered with. If the first application is tampered with, mobile phone A cannot start the first application. If the first application has not been tampered with, mobile phone A can start the first application.
- the above-mentioned PMS refers to package manager service (PMS).
- the PMS of mobile phone A (such as the framework of mobile phone A) can determine whether the package name and signature public key of the first application in the PMS match with the identity information of the first application stored in mobile phone A to determine the first application. Whether the package name of an application has been tampered with.
- mobile phone A can obtain the package name and signature public key of the first application from the PMS; and combine the obtained package name and signature public key of the first application with the identity information of the first application (including the package name and signature) saved by mobile phone A. Public key) for comparison. If the package name of the first application obtained by mobile phone A from the PMS service is the same as the package name of the first application in the identity information of the first application saved by mobile phone A, and the signature of the first application obtained by mobile phone A from the PMS service If the key is the same as the signature public key of the first application in the identity information of the first application stored in mobile phone A, it means that the package name of the first application has not been tampered with.
- the activity management service (activity manager service, AMS) of the framework layer (framework) of mobile phone A can also be stored with mobile phone A by judging the package name and signature public key of the first application in the PMS Whether the identity information of the first application matches to determine whether the package name of the first application has been tampered with.
- the identity information of the first application includes the package name of the first application and the signature public key of the first application.
- the signature public key of the first application may be a character string including tens to hundreds of bytes.
- mobile phone A can obtain and save the following identity information and login information:
- the identity information of the first application includes the package name of the first application and the signature public key of the first application.
- mobile phone A can obtain and save the following identity information and login information:
- the method of the embodiment of the present application is introduced by taking the identity information of the first application including the package name of the first application as an example. It should be noted that, for the method for mobile phone A to obtain the identity information of the first application, reference may be made to related methods in conventional technologies, which are not described in detail in the embodiments of the present application.
- the mobile phone A can store relevant parameters of different applications in different storage areas, such as data created during application use (such as audio data, image data, or video data, etc.).
- the mobile phone A may save the login information of the first application in the storage area corresponding to the first application.
- mobile phone A may be specially set up with a storage area. The storage area can be used to save the login information of each application. For example, mobile phone A may store login information of multiple applications shown in Table 1 in the storage area.
- mobile phone A saves the login information of the account "180****7812" of the shopping application, such as the account "180****7812” and the login password "123xyz56789”; the account of the video application "176" ****1860" login information, such as the account "176****1860”; and the login information of the learning application account "Xy123456", such as the account "Xy123456” and the login password "Abc369x246".
- the mobile phone A can save the login information of multiple accounts of one application. For example, as shown in Table 1, mobile phone A saves the login information of the account "180****7812" of the shopping application, and also saves the login information of the account "157****7568" of the shopping application, such as the account "157****7568" and login password "123abc56789".
- the mobile phone A may save the identity information of each application and the login information of the account in a database, file or other form.
- the embodiment of the present application does not limit the specific manner in which the mobile phone A saves the identity information of each application and the login information of the account.
- mobile phone A In response to operation 2 of the user on the second interface, mobile phone A does not save the identity information of the first application and the login information of the first account.
- the above operation 1 is the second operation, and the operation 2 is the sixth operation.
- the operation 1 may be the user's click operation on the "Yes" button 612 in the second interface 610 shown in (a) in FIG. Second, the click operation of the "YES" button 622 in the interface 620.
- operation 1 may also be a first preset gesture input by the user on the above-mentioned second interface, such as an S-shaped gesture.
- operation 1 may also be a voice command input by the user when the mobile phone A displays the above-mentioned second interface.
- the voice command may include voice data such as "save", “YES", "yes” or "yes".
- the operation 2 may be the user's clicking operation on the "No" button 613 in the second interface 610 shown in (a) in FIG. Click the "NO" button 623 in the second interface 620.
- operation 2 may also be a second preset gesture input by the user on the above-mentioned second interface, such as an L-shaped gesture.
- operation 2 may also be a voice command input by the user when the mobile phone A displays the above-mentioned second interface.
- the voice command may include voice data such as "do not save” or "NO".
- FIG. 6B shows a flowchart of process (1) (ie, the manual login process of mobile phone A).
- mobile phone A can execute S301-S302 to log in to the first account in the first application.
- mobile phone A can execute S303 to request the user to confirm whether to save the login information of the first account.
- mobile phone A can receive user operation 1, which is used to instruct mobile phone A to save the login information of the first account.
- mobile phone A can execute S304 to save the identity information of the first application and the login information of the first account.
- the mobile phone A may receive the user's operation 2, which is used to instruct the mobile phone A not to save the login information of the first account.
- mobile phone A can execute S305 without saving the identity information of the first application and the login information of the first account.
- the login information of the first account can be saved.
- mobile phone A receives the operation for sharing the first account, it can share the saved login information with other devices.
- mobile phone A has logged in to the first account in the first application, and mobile phone A has saved the login information of the first account. It can be seen from Table 1 that mobile phone A can log in to multiple accounts in the first application, and mobile phone A can store login information of multiple accounts for the first application. However, mobile phone A cannot log in to multiple accounts at the same time in the first application, and can only selectively log in to one account at the same time.
- the first account mentioned in the embodiment of this application refers to the account that mobile phone A currently logs in to the first application.
- the embodiment of the application provides an account data sharing method.
- the above process (2) that is, "the process of sharing account data from mobile phone A to mobile phone B"
- the account data sharing method may include S701-S704.
- Mobile phone A receives operation 3 of the user on the first application. Operation 3 is used to trigger mobile phone A to share the login information of the first account with other devices.
- the above operation 3 is the first operation.
- the foregoing operation 3 may be the user operation described in the following implementation (1) or implementation (2).
- the mobile phone A can receive the user's preset operation on the icon of the first application displayed on the main interface (ie, the desktop).
- the preset operation is any operation such as a long-press operation, a double-click operation, or a sliding operation (such as a sliding operation or a sliding operation) on the icon of the first application.
- the mobile phone A may display a preset option of the first application (also referred to as a shared login option or a shared login status option).
- a preset option of the first application also referred to as a shared login option or a shared login status option
- mobile phone A may execute S702 to display the device search interface of mobile phone A.
- the above-mentioned first application is a shopping application
- the above-mentioned preset operation is a long-press operation.
- the mobile phone A may display the sharing login option 701 shown in (a) in FIG. 7B.
- the mobile phone A may display the device search interface 703 shown in (b) of FIG. 7B.
- operation 3 (ie, the first operation) may include: the user's preset operation on the icon of the first application, and the user's click operation on the sharing login option.
- Mobile phone A can display the preset page of the first application.
- the preset page may be any page of the first application, such as the home page of the first application, or other pages of the first application.
- the preset page may include preset controls, such as a sharing login control.
- the preset control is used to trigger mobile phone A to share the login information of the first account with other devices.
- the aforementioned operation 3 ie, the first operation
- the aforementioned operation 3 may be a user's click operation on the preset control, such as any operation such as a single-click operation or a double-click operation.
- the foregoing operation 3 (such as the first operation) may also be a voice command received for instructing the mobile phone A to trigger the preset control when the mobile phone A displays a preset page including the preset control.
- the foregoing preset page is the account management interface 705 of the shopping application shown in FIG. 7C as an example.
- the account management interface 705 includes a sharing login control 706 (ie, a preset control).
- the mobile phone A may display the device search interface 703 shown in (b) in FIG. 7B.
- the mobile phone A displays the first interface.
- the first interface includes one or more device options, and each device option corresponds to a wireless device searched by mobile phone A.
- the wireless device corresponding to the one or more device options mentioned above is: the wireless device that mobile phone A can search for wireless signals.
- the wireless signal may be any signal such as a Bluetooth signal, a Wi-Fi signal, or an NFC signal.
- the above-mentioned first interface may be the device search interface 703 shown in (b) in FIG. 7B.
- the device search interface 703 includes the following device options: "ABC” option, "SHOUJI-B” option 704, "Xyzd” option, and "G1B-1B-19-7R” option.
- Each device option corresponds to a Bluetooth device.
- "SHOUJI-B” option 704 is the Bluetooth name of mobile phone B
- the Bluetooth device corresponding to "SHOUJI-B” option 704 is mobile phone B.
- the state in which the mobile phone A displays the first interface may be referred to as the state to be shared. That is to say, in response to the above operation 3, the mobile phone A can enter the to-be-shared state.
- the to-share state in response to the user's selection operation of the device option, the mobile phone A can share the login information of the first account with the wireless device corresponding to the device option selected by the user.
- S703 The mobile phone A receives the user's selection operation of the first device option in the first interface.
- the mobile phone A In response to the user's selection operation of the first device option, the mobile phone A sends the identity information of the first application and the login information of the first account to the mobile phone B corresponding to the first device option.
- the above-mentioned first device option may be any device option selected by the user in the first interface.
- the above-mentioned first device option is the "SHOUJI-B" option 704 in the device search interface 703 (that is, the first interface) shown in (b) of FIG. 7B.
- mobile phone A can send a message to mobile phone B through the Bluetooth connection between mobile phone A and mobile phone B The identity information of the first application and the login information of the first account.
- the mobile phone B corresponding to the first device option has already established a wireless connection with the mobile phone A.
- the mobile phone A can directly send the identity information of the first application and the login information of the first account to the mobile phone B through the Bluetooth connection between the mobile phone A and the mobile phone B.
- the mobile phone B corresponding to the first device option has not yet established a wireless connection with the mobile phone A.
- mobile phone A may request to establish a wireless connection with mobile phone B.
- the identity information of the first application and the login information of the first account can be automatically sent to the mobile phone B.
- the method for establishing a wireless connection between the mobile phone A and the mobile phone B can refer to the method for establishing a wireless connection between two devices in the conventional technology.
- the embodiments of this application will not be repeated here.
- the mobile phone A in response to the user's selection operation of the first device option, may send out the first prompt message.
- the first prompt information is used to request the user to confirm whether to share the login information of the first account with the wireless device corresponding to the first device option.
- mobile phone A in response to the user's selection operation of the "SHOUJI-B" option 704 shown in (b) in FIG. 7B, mobile phone A may display the first prompt message 707 shown in FIG. B Share the login information of the account '180****7812'!.
- the above-mentioned first prompt information may also include a "Yes" button and a "No" button.
- Mobile phone A can receive the user's operation 4 on the first prompt message. This operation 4 is the third operation.
- mobile phone A may send the identity information of the first application and login information of the first account to mobile phone B.
- mobile phone A will not send the identity information of the first application and the login information of the first account to mobile phone B, and mobile phone A can display the image
- the mobile phone A in response to the user's selection operation of the first device option, may perform user identity authentication. If the user's identity is authenticated, mobile phone A can send the identity information of the first application and the login information of the first account to mobile phone B. Or, if the user's identity is authenticated, mobile phone A can display the above-mentioned first prompt information; in response to the user's first operation on the first prompt information, mobile phone A can send the identity information of the first application and the first account to mobile phone B Login information.
- the mobile phone A in response to the third operation (such as operation 4) of the above-mentioned first prompt information, the mobile phone A may perform user identity authentication. If the user's identity is authenticated, mobile phone A can send the identity information of the first application and the login information of the first account to mobile phone B.
- mobile phone A will not send the identity information of the first application and the login information of the first account to mobile phone B, and mobile phone A can fall back to (b) in Figure 7B.
- the aforementioned user identity authentication may be password authentication or fingerprint authentication.
- Mobile phone A can display a password and/or fingerprint entry interface, and receive the password or fingerprint entered by the user for user identity authentication.
- the aforementioned user identity authentication may also be face recognition or iris recognition.
- Mobile phone A can display a face recognition or iris recognition interface, and collect the face image or iris information input by the user for user identity authentication.
- the mobile phone A can collect the user's face image or iris information in a way that the user does not perceive to perform user identity authentication.
- mobile phone A may send out the second prompt message.
- the second prompt message is used to indicate that mobile phone A has shared the login information of the first account with mobile phone B.
- mobile phone A can display the second prompt message 708 shown in FIG. 7E, such as "The login information of account '180****7812' has been shared to SHOUJI-B!.
- the embodiment of the application provides a method for sharing account data without further development of the client and server of the application.
- the mobile phone A can share the data with other devices.
- the login information of the application That is to say, through the method of the embodiment of the present application, the electronic device can share the login information of the application selected by the user with other devices (such as mobile phone B) in a targeted manner.
- the effect of one-time authorized login between devices can be intelligently realized under the premise of low cost and protection of user information security.
- the mobile phone B can receive the login information of the first account sent by the mobile phone A.
- Mobile phone B can log in to the first account in the first application according to the login information of the first account.
- the above-mentioned process (3) that is, the "automatic login process of mobile phone B”
- the account data sharing method may include S801-S805.
- Mobile phone B receives the identity information of the first application from mobile phone A and the login information of the first account.
- the mobile phone B can receive the identity information of the first application and the login information of the first account from the mobile phone A through the wireless connection between the mobile phone B and the mobile phone A.
- the mobile phone B judges whether the mobile phone B runs the first application according to the identity information of the first application.
- the mobile phone B running the first application may specifically include any of the following three situations.
- Situation (1) Mobile phone B runs the first application in the foreground.
- Situation (2) Mobile phone B runs the first application in the background.
- Case (3) Mobile phone B displays the webpage of the first application in the browser.
- mobile phone B can determine whether mobile phone B is running the first application by performing the following steps 1 to step 7.
- Step 1 Mobile phone A compares the identity information of the first application (such as the package name of the first application) with the package name of the application running in the foreground of mobile phone B.
- Step 2 If the package name of the first application is the same as the package name of the application running in the foreground, it means that mobile phone B is running the first application, that is, mobile phone B is running the first application in the above situation (1).
- Step 3 If the package name of the first application is different from the package name of the application running in the foreground, mobile phone B can compare the package name of the first application with the package name of the application running in the background of mobile phone B.
- Step 4 If the package name of the first application is the same as the package name of any application running in the background of mobile phone B, it means that mobile phone B is running the first application, that is, mobile phone B is running the first application in the above situation (2).
- Step 5 If the package name of the first application is different from the package names of all applications running in the background of mobile phone B, mobile phone B can determine whether mobile phone B has opened the webpage of the first application in the browser. Step 6: If the mobile phone B opens the webpage of the first application in the browser, it means that the mobile phone B is running the first application, that is, the mobile phone B is running the first application in the above situation (3). Step 7: If mobile phone B does not open the webpage of the first application in the browser, it means that mobile phone B is not running the first application.
- mobile phone B can run the browser in the foreground or run the browser in the background.
- Mobile phone B may pre-store the correspondence between the package name of the first application and the webpage of the first application.
- the mobile phone B may obtain the correspondence between the package name of the first application and the webpage of the first application from the server of the first application.
- mobile phone B may not perform step 5 (that is, determine whether mobile phone B is in the browser The webpage of the first application is opened), but it is directly determined that the mobile phone B is not running the first application.
- mobile phone B can execute S803. If mobile phone B is not running the first application, mobile phone B can execute S805.
- the mobile phone B may display the third interface.
- the third interface is used to request the user to confirm whether to use the login information of the first account shared by mobile phone A to log in to the first account.
- mobile phone B may display the third interface 800 shown in FIG. 8.
- the third interface 800 includes the prompt message "This machine has received the login information of the account "180****7812" shared by SHOUJI-A. Please confirm whether to log in to the account!.
- the third interface 800 also includes a "login” button and a "discard” button.
- the mobile phone B can receive the user's operation 6 on the third interface 800. This operation 6 is the fifth operation.
- the mobile phone A may execute S802.
- the mobile phone A may execute S805.
- the above operation 6 is used to trigger the mobile phone B to log in to the above first account.
- the operation 6 may be a user's click operation on the "login” button in the third interface 800.
- Operation 7 is used to indicate that the mobile phone B does not need to log in to the above-mentioned first account.
- operation 7 may be a user's click operation on the "discard" button in the third interface 800.
- mobile phone B may display the third interface. For example, mobile phone B may display the third interface 800 shown in FIG. 8. In response to the user's first operation on the third interface 800, the mobile phone B may perform S803. In response to the user's second operation on the third interface 800, the mobile phone B may execute S805.
- Mobile phone B displays the account login interface of the first application, and fills in the login information of the first account in the account login interface.
- mobile phone B when mobile phone B executes S801, mobile phone B runs the first application in the foreground.
- mobile phone B is displaying the account login interface of the first application.
- the user of mobile phone B can operate mobile phone B in advance to display the account login interface of the first application.
- S801 that is, receives the identity information of the first application from mobile phone A and the login information of the first account
- the first application in response to the user's operation, the first application is already running in the foreground; and the first application is being displayed.
- An application account login interface In this case, mobile phone B can directly input the login information of the first account on the account login interface.
- mobile phone B when mobile phone B executes S801, mobile phone B runs the first application in the foreground. However, mobile phone B does not display the account login interface of the first application. For example, mobile phone B displays the homepage of the first application. In this case, mobile phone B can automatically jump to the account login interface of the first application, that is, automatically display the account login interface of the first application, and enter the login information of the first account on the account login interface.
- mobile phone B when mobile phone B executes S801, mobile phone B runs the first application in the background.
- the interface that mobile phone B needs to display when running the first application in the background is the account login interface.
- mobile phone B can run the first application in the foreground, display the account login interface of the first application, and enter the login information of the first account in the account login interface.
- mobile phone B when mobile phone B executes S801, mobile phone B runs the first application in the background.
- the interface that mobile phone B needs to display when the first application runs in the background is not the account login interface.
- mobile phone B can run the first application in the foreground and automatically jump to the account login interface of the first application, that is, automatically display the account login interface of the first application, and enter the first account in the account login interface Login information.
- mobile phone B when mobile phone B executes S801, mobile phone B displays the webpage of the first application in the browser.
- mobile phone B can run the browser in the foreground or in the background.
- the webpage is the account login interface of the first application.
- mobile phone B can run the browser in the foreground, and display the webpage of the first application in the browser, that is, the account login interface. Then, mobile phone B can input the login information of the first account in the account login interface.
- the login information of the first account includes the first account and the login password of the first account.
- the account login interface of the first application described in S803 may be the account login interface 901 of the first application shown in (a) of FIG. 9.
- the account login interface 901 includes an "account input box” 902 and a "login password input box” 903.
- mobile phone B can detect the "account input box” on the account login interface, fill the first account in the detected “account input box” 902; detect the "login password input box” on the account login interface ", fill the login password of the first account into the detected "login password input box” 903.
- Mobile phone B can display the account login interface shown in (b) in Figure 9.
- the "account input box” 902 is filled with the first account "180****7812
- the "login password input box” 903 is filled with the login password.
- mobile phone B can detect the attribute and hint information of the input box control (such as "account input box” 902 or "login password input box” 903) in the current page displayed by mobile phone B to determine whether the input box control is used for Account or password input.
- the hint information is the default hint information in the text box (such as the input box control above).
- the hint information may be the prompt message "please enter the account number" in the "account input box” 902 shown in FIG. 9(a), and the prompt message “please enter the password” in the "login password input box” 903.
- the hint information in the input box control can disappear.
- the account login interface of the first application is the web login interface of the first application.
- Mobile phone B can obtain relevant information (such as attributes and hint information) of the input box control through the gethtmlinfo method to determine whether the input box control is used for account or password input.
- mobile phone B can obtain the Hypertext Markup Language (HTML) information in the login interface of the first application account, that is, the relevant information of the above-mentioned input box control, so as to identify the information used for input Input box control for account or password.
- HTML Hypertext Markup Language
- the login information of the first account includes the first account, but does not include the login password of the first account.
- the account login interface of the first application described in S803 may be the account login interface 1001 of the first application shown in (a) of FIG. 10.
- the account login interface 1001 includes an "account input box” 1002, a "verification code input box” 1003, and a "get verification code” button 1004.
- mobile phone B can detect the "account input box” of the account login interface, and fill the first account in the detected “account input box” 1002.
- Mobile phone B can display the account login interface shown in (b) in Figure 10. In the account login interface shown in (b) of FIG. 10, the first account "180****7812" is filled in the "account input box" 1002.
- the identity information of the first application includes the package name of the first application and the signature public key of the first application.
- mobile phone B can also determine whether the package name of the first application has been tampered with.
- the method for mobile phone B to determine whether the package name of the first application has been tampered with is similar to the method for mobile phone A to determine whether the package name of the first application has been tampered with, and will not be repeated here in this embodiment of the application. If the package name of the first application has not been tampered with, mobile phone B can execute S803; if the package name of the first application has been tampered with, mobile phone B can execute S805.
- mobile phone B uses the login information of the first account to log in to the first account in the first application.
- the above operation 8 is the fourth operation.
- the operation 8 may be the user's clicking operation on the "login” button 904 shown in (b) in FIG. 9.
- the operation 8 may be an automatic clicking operation of the "login” button 904 after the mobile phone B fills in the first account and the login password of the first account in the account login interface shown in (b) of FIG. 9.
- mobile phone B executes S803 to display the account login interface shown in (a) in FIG. 9.
- mobile phone B can display a dynamic screen that automatically fills in the first account and the login password of the first account on the account login interface, and automatically clicks the "login” button 904.
- mobile phone B can log in to the first account and display the interface of the first application after logging in.
- S804 may include S804a-S804e.
- S804 shown in FIG. 7A may include S804a-S804e.
- the mobile phone B sends a verification code acquisition request to the server of the first application.
- the verification code acquisition request includes the first account "176****1860", and the verification code acquisition request is used to request the server to send the verification code to 176****1860.
- the foregoing operation of obtaining a verification code may be a user's clicking operation on the "obtain verification code" button 1004 shown in (b) of FIG. 10.
- the foregoing operation of obtaining the verification code may be an automatic clicking operation of the mobile phone B on the "obtain verification code” button shown in (b) in FIG. 10.
- the server receives the verification code acquisition request, and sends the verification code 2 to the mobile phone A (ie, the device using 180****7812).
- the verification code 2 is the second verification code.
- the verification code 2 is issued by the mobile phone B requesting the server to the first account (that is, the device using the first account).
- Mobile phone A receives the verification code 2 from the server.
- the method for the mobile phone B to send the verification code acquisition request to the server can refer to the specific implementation in the conventional technology.
- the embodiments of this application will not be repeated here.
- Mobile phone A sends the verification code 2 to mobile phone B.
- mobile phone A can send the verification code 2 to mobile phone B through the wireless connection between mobile phone A and mobile phone B.
- the mobile phone A can send the verification code to the mobile phone B Code 2. If mobile phone A receives the verification code 2 from the server after the preset duration of 2, mobile phone A will not send the verification code 2 to mobile phone B. In this case, mobile phone A can discard the verification code 2.
- S804e Mobile phone B fills in the verification code 2 on the account login interface, and uses the first account and verification code 2 to log in to the first account in the first application.
- mobile phone B can receive verification code 2 (such as 567568) from mobile phone A, and fill in the verification code 2 on the account login interface.
- verification code 2 such as 567568
- the method for mobile phone B to fill in the verification code 2 on the account login interface can refer to the method for mobile phone B to fill in the login password of the first account on the account login interface, which will not be repeated here.
- mobile phone B can automatically use the first account and verification code 2 to log in to the first account in the first application; that is, mobile phone B can automatically trigger
- the "login” button 1005 shown in (c) uses the first account and verification code 2 to log in to the first account in the first application.
- the mobile phone B can use the first account in response to the user clicking the "login" button 1005 shown in (c) in Figure 10 Log in to the first account in the first application with the verification code 2.
- the above operation 8 may include the above operation of obtaining the verification code (for example, the operation of clicking the "get verification code” button 1004 shown in (b) in FIG. 10) and the operation of FIG. 10 Click operation of the "login” button 1005 shown in (c).
- mobile phone B may execute S805. In this embodiment, mobile phone B will not automatically log in to the first account in the first application based on the login information of the first account.
- mobile phone B can determine whether the first application is installed in mobile phone B according to the identity information of the first application. If the first application is installed in mobile phone B, mobile phone B can automatically start the first application, and then execute S803-S804.
- the embodiment of the application provides an account data sharing method.
- Mobile phone B can use the login information of the first account shared by mobile phone A to log in to the first account in the first application.
- the login information of the first account can be shared among devices, and the cost of realizing the sharing of login information between devices can be reduced.
- the mobile phone B may also save the identity information of the first application and the login information of the first account.
- mobile phone B After mobile phone B saves the identity information of the first application and the login information of the first account, it can also execute the method steps performed by mobile phone A in the above process (1)-process (3) to share the login information of the first account with other devices .
- mobile phone B may display the above-mentioned second interface to request the user to confirm whether to save the login information of the first account .
- mobile phone B may save the identity information of the first application and the login information of the first account.
- mobile phone B may delete the identity information of the first application and the login information of the first account.
- mobile phone A and mobile phone B can negotiate a session key.
- Mobile phone A can use the session key to add data shared with mobile phone B.
- S704 can be replaced with S1201-S1203, and the above S801 can be replaced with S1204-S1205.
- S704 shown in FIG. 7A can be replaced with S1201-S1203, and S801 can be replaced with S1204-S1205.
- mobile phone A and mobile phone B negotiate a session key.
- mobile phone A and mobile phone B can communicate through the wireless connection between mobile phone A and mobile phone B, and negotiate a session key.
- Mobile phone A uses the session key to encrypt the identity information of the first application and the login information of the first account to obtain encrypted data.
- mobile phone A can use Advanced Encryption Standard (AES) encryption algorithm, (Ron Rivest, Adi Shamir, Leonard Adleman, RSA) encryption algorithm, or elliptic curve integrated encryption scheme (ECIES) encryption algorithm Wait for any algorithm, use the session key to encrypt the identity information of the first application and the login information of the first account to obtain encrypted data.
- AES Advanced Encryption Standard
- RSA Rivest, Adi Shamir, Leonard Adleman
- RSA Rivest, Adi Shamir, Leonard Adleman
- ECIES elliptic curve integrated encryption scheme
- Mobile phone A sends the above-mentioned encrypted data to mobile phone B.
- Mobile phone B receives encrypted data from mobile phone A.
- mobile phone A and mobile phone B can transmit the above-mentioned encrypted data through a wireless connection between mobile phone A and mobile phone B.
- Mobile phone B uses the session key to decrypt the encrypted data to obtain the identity information of the first application and the login information of the first account.
- the method for using the session key to decrypt the encrypted data by the mobile phone B can refer to the method for decrypting the encrypted data in the conventional technology, which will not be repeated here in the embodiment of the application.
- the verification code sent by mobile phone A to mobile phone B by executing S804d may also be a verification code encrypted with the aforementioned session key. After mobile phone B receives the encrypted verification code, it can be decrypted by using the session key to obtain the verification code.
- the session key is a key negotiated between mobile phone A and mobile phone B; therefore, only mobile phone A and mobile phone B know the session key. Other devices do not know the session key, and thus cannot decrypt the encrypted data, and thus cannot obtain the login information of the first account. In this way, the information security of login information sharing between devices can be improved.
- the above-mentioned electronic device (such as a mobile phone) includes a hardware structure and/or software module corresponding to each function.
- the embodiments of the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered as going beyond the scope of the embodiments of the present application.
- the embodiments of the present application can divide the above-mentioned electronic devices (such as mobile phones) into functional modules according to the above-mentioned method examples.
- each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module. middle.
- the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
- FIG. 13 shows a schematic diagram of a possible structure of the first device (such as mobile phone A) involved in the foregoing embodiment.
- (B) in FIG. 13 shows a schematic diagram of a possible structure of the second device (such as mobile phone B).
- the first device 1310 may include an account password storage module 1311, a sharing status processing module 1312, a device connection module 1313, and a sending module 1314.
- the second device 1320 may include a device connection module 1321, a receiving module 1322, a filling module 1323, and an account password storage module 1324.
- the account password storage module 1311 is used to store the account logged in on the application installed on the first device 1310 and the login password of the account.
- the account password storage module 1311 is used to support the first device 1310 to execute S304 in the above-mentioned example, and/or other processes used in the technology described herein.
- the sharing status processing module 1312 is used to trigger the first device 1310 to share the login information of the first account with other devices. Specifically, the sharing status processing module 1312 can trigger the first device 1310 to establish a wireless connection with other devices, and share the login information of the first account with the other devices through the wireless connection.
- the shared state processing module 1312 is used to support the first device 1310 to execute S701, S702, and S703 in the foregoing example, and/or other processes used in the technology described herein.
- the device connection module 1313 is used to support the first device 1310 to establish a wireless connection with other devices.
- the device connection module 1313 may interact with the device connection module 1321 of the second device 1320, so that the first device 1310 and the second device 1320 establish a wireless connection.
- the sending module 1314 is configured to send the login information of the first account to other devices.
- the sending module 1314 is used to support the first device 1310 to perform S704 in the foregoing example, and/or other processes used in the technology described herein.
- the aforementioned first device 1310 may further include an account login module.
- the account login module is used to support the first device 1310 to perform S301 and S302, and/or other processes used in the technology described herein.
- the device connection module 1321 is used to support the second device 1320 to establish a wireless connection with other devices.
- the device connection module 1321 may interact with the device connection module 1313 of the first device 1310 to enable the second device 1320 to establish a wireless connection with the first device 1310.
- the receiving module 1322 is configured to receive the login information of the first account from the first device 1310.
- the receiving module 1322 is used to support the second device 1320 to perform S801 in the foregoing example, and/or other processes used in the technology described herein.
- the filling module 1323 is used to fill the login information of the first account received by the receiving module 1322 into the account login interface.
- the filling module 1323 is used to support the second device 1320 to perform the operations of filling the verification code in S803 and S804e in the foregoing example, and/or other processes used in the technology described herein.
- the account password storage module 1324 is configured to store the account logged in on the application installed on the second device 1320 and the login password of the account.
- the account password storage module 1324 is used to support the second device 1320 to store the login information of the first account from the first device 1310.
- the aforementioned second device 1320 may further include an account login module.
- the account login module is used to support the second device 1320 to perform S804, and/or other processes used in the technology described herein.
- the functions of the shared state processing module 1312 of the first device 1310 can be integrated in the processing module, and the functions of the device connection module 1313 and the sending module 1314 can be integrated in the communication module.
- Account password The functions of the storage module 1311 can be integrated in the storage module for implementation.
- the functions of the device connection module 1321 and the receiving module 1322 of the second device 1320 can be integrated in the communication module, the function of the filling module 1323 can be integrated in the processing module, and the function of the account password storage module 1324 can be integrated in the storage module.
- the unit modules of the first device 1310 and the second device 1320 include but are not limited to the aforementioned processing module, storage module, and wireless communication module.
- the first device 1310 and the second device 1320 may further include a display module.
- the processing module may be one or more processors (the processor 210 shown in FIG. 2), and the communication module includes a wireless communication module (the wireless communication module 260 shown in FIG. 2).
- the wireless communication module may be called a communication interface.
- the storage module may be a memory (internal memory 221 as shown in FIG. 2).
- the display module may be a display screen (the display screen 294 shown in FIG. 2).
- the above-mentioned one or more processors, memories, display screens, etc. may be connected together, for example, connected through a bus.
- the aforementioned memory is used to store computer program code, and the computer program code includes computer instructions.
- the electronic device can execute various functions or steps executed by the mobile phone in the foregoing method embodiments.
- the structure of the electronic device can refer to the structure of the electronic device 200 shown in FIG. 2.
- the chip system includes at least one processor 1401 and at least one interface circuit 1402.
- the processor 1401 and the interface circuit 1402 may be interconnected by wires.
- the interface circuit 1402 may be used to receive signals from other devices (such as the memory of an electronic device).
- the interface circuit 1402 may be used to send signals to other devices (such as the processor 1401).
- the interface circuit 1402 may read instructions stored in the memory, and send the instructions to the processor 1401.
- an electronic device such as the electronic device 200 shown in FIG. 2 can execute each step in the foregoing embodiment.
- the chip system may also include other discrete devices, which are not specifically limited in the embodiment of the present application.
- An embodiment of the present application also provides a computer storage medium.
- the computer storage medium includes computer instructions.
- the computer instructions run on the above-mentioned electronic device (the electronic device 200 shown in FIG. 2), the electronic device is caused to execute the above-mentioned Each function or step performed by the mobile phone in the method embodiment.
- the embodiments of the present application also provide a computer program product, which when the computer program product runs on a computer, causes the computer to execute each function or step performed by the mobile phone in the above method embodiment.
- the disclosed device and method may be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, for example, multiple units or components may be divided. It can be combined or integrated into another device, or some features can be omitted or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate parts may or may not be physically separate.
- the parts displayed as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a readable storage medium.
- the technical solutions of the embodiments of the present application are essentially or the part that contributes to the prior art, or all or part of the technical solutions can be embodied in the form of a software product, and the software product is stored in a storage medium. It includes several instructions to make a device (which may be a single-chip microcomputer, a chip, etc.) or a processor (processor) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read only memory (read only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (32)
- 一种账号数据共享方法,其特征在于,所述方法包括:第一设备接收用户对第一应用的第一操作;其中,所述第一设备在所述第一应用登录了第一账号;所述第一操作用于触发所述第一设备向其他设备分享所述第一账号的登录信息;所述第一账号的登录信息包括所述第一账号;或者,所述第一账号的登录信息包括所述第一账号和所述第一账号的登录密码;响应于所述第一操作,所述第一设备显示第一界面;其中,所述第一界面包括一个或多个设备选项,每个设备选项对应所述第一设备搜索到的一个无线设备;响应于所述用户对所述第一界面中第一设备选项的选择操作,所述第一设备向所述第一设备选项对应的第二设备发送所述第一应用的身份信息和所述第一账号的登录信息;其中,所述第一应用的身份信息包括所述第一应用的包名,所述第一应用的包名用于标识所述第一应用。
- 根据权利要求1所述的方法,其特征在于,在所述第一设备接收用户对第一应用的第一操作之前,所述方法还包括:所述第一设备显示所述第一设备的主界面,所述主界面包括所述第一应用的图标;其中,所述第一操作是对所述第一应用的图标的预设操作;或者,所述第一设备显示所述第一应用的预设页面,所述预设页面中包括预设控件,所述预设控件用于触发所述第一设备向其他设备分享所述第一账号的登录信息。
- 根据权利要求1或2所述的方法,其特征在于,所述第一应用的身份信息还包括所述第一应用的签名公钥,所述签名公钥用于验证所述第一应用的包名是否被篡改。
- 根据权利要求1-3中任一项所述的方法,其特征在于,所述第一账号的登录信息包括所述第一账号,不包括所述第一账号的登录密码;其中,所述第一账号至少包括所述第一设备的手机号码或者邮箱地址;在所述第一设备接收用户对第一应用的第一操作之前,所述方法还包括:所述第一设备接收所述用户在所述第一应用的账号登录界面输入的所述第一账号和第一验证码;响应于所述用户在所述账号登录界面的登录操作,所述第一设备使用所述第一账号和所述第一验证码,在所述第一应用登录所述第一账号。
- 根据权利要求4所述的方法,其特征在于,在所述响应于所述用户对所述第一界面中第一设备选项的选择操作,所述第一设备向所述第一设备选项对应的第二设备发送所述第一应用的身份信息和所述第一账号的登录信息之后,所述方法还包括:所述第一设备接收来自所述第一应用的服务器的第二验证码;其中,所述第二验证码是所述第二设备请求所述服务器向所述第一账号发送的;所述第一设备向所述第二设备发送所述第二验证码;其中,所述第二验证码用于所述第二设备在所述第一应用登录所述第一账号。
- 根据权利要求1-5中任一项所述的方法,其特征在于,所述方法还包括:所述第一设备在所述第一应用登录所述第一账号之后,显示第二界面;其中,所述第二界面用于请求所述用户确认是否保存所述第一账号的登录信息;响应于所述用户在所述第二界面的第二操作,所述第一设备保存所述第一应用的身份信息和所述第一账号的登录信息。
- 根据权利要求1-6中任一项所述的方法,其特征在于,所述响应于所述用户对所述第一界面中第一设备选项的选择操作,所述第一设备向所述第一设备选项对应的第二设备发送所述第一应用的身份信息和所述第一账号的登录信息,包括:响应于所述用户对所述第一设备选项的选择操作,所述第一设备发出第一提示信息;其中,所述第一提示信息用于请求所述用户确认是否向所述第二设备分享所述第一账号的登录信息;响应于所述用户对所述第一提示信息的第三操作,所述第一设备向所述第二设备发送所述第一应用的身份信息和所述第一账号的登录信息。
- 根据权利要求1-7中任一项所述的方法,其特征在于,所述响应于所述用户对所述第一界面中第一设备选项的选择操作,所述第一设备向所述第一设备选项对应的第二设备发送所述第一应用的身份信息和所述第一账号的登录信息,包括:响应于所述用户对所述第一设备选项的选择操作,所述第一设备与所述第二设备协商出会话密钥;所述第一设备采用所述会话密钥加密所述第一应用的身份信息和所述第一账号的登录信息得到加密数据,并向所述第二设备发送所述加密数据。
- 一种账号数据共享方法,其特征在于,所述方法包括:第二设备接收来自第一设备的第一应用的身份信息和所述第一应用的第一账号的登录信息;其中,所述第一应用的身份信息包括所述第一应用的包名,所述第一应用的包名用于标识所述第一应用;所述第一账号的登录信息包括所述第一账号;或者,所述第一账号的登录信息包括所述第一账号和所述第一账号的登录密码;所述第二设备显示所述第一应用的账号登录界面,并在所述账号登录界面填充所述第一账号的登录信息;响应于用户在所述账号登录界面的第四操作,所述第二设备使用所述第一账号的登录信息,在所述第一应用登录所述第一账号。
- 根据权利要求9所述的方法,其特征在于,在所述第二设备接收来自第一设备的第一应用的身份信息和所述第一应用的第一账号的登录信息之后,所述第二设备显示所述第一应用的账号登录界面之前,所述方法还包括:所述第二设备显示第三界面;其中,所述第三界面用于请求所述用户确认是否使用所述第一账号的登录信息登录所述第一账号;其中,所述第二设备显示所述第一应用的账号登录界面,包括:响应于所述用户在所述第三界面的第五操作,所述第二设备显示所述账号登录界面。
- 根据权利要求9或10所述的方法,其特征在于,所述第一账号的登录信息包括所述第一账号,不包括所述第一账号的登录密码;所述响应于所述用户在所述账号登录界面的第四操作,所述第二设备使用所述第一账号的登录信息,在所述第一应用登录所述第一账号,包括:响应于所述用户在所述账号登录界面输入的获取验证码的操作,所述第二设备向 所述第一应用的服务器发送验证码获取请求;其中,所述验证码获取请求中包括所述第一账号,用于请求所述服务器向所述第一账号发送验证码;所述第四操作包括所述获取验证码的操作;所述第二设备接收来自所述第一设备的第二验证码;其中,所述第二验证码是所述第二设备请求所述服务器向所述第一账号发送的;所述第二设备在所述账号登录界面填充所述第二验证码,使用所述第一账号和所述第二验证码,在所述第一应用登录所述第一账号。
- 根据权利要求9-11中任一项所述的方法,其特征在于,所述第二设备显示所述第一应用的账号登录界面,包括:如果所述第二设备根据所述第一应用的身份信息,确定所述第二设备正在运行所述第一应用,所述第二设备显示所述账号登录界面;其中,所述第二设备正在运行所述第一应用包括以下任一种情况:所述第二设备正在前台运行所述第一应用;所述第二设备正在后台运行所述第一应用;所述第二设备正在前台运行浏览器,且所述浏览器显示所述第一应用的网页;所述第二设备正在后台运行浏览器,且所述浏览器显示所述第一应用的网页。
- 根据权利要求9-12中任一项所述的方法,其特征在于,所述第一应用的身份信息还包括所述第一应用的签名公钥,所述签名公钥用于验证所述第一应用的包名是否被篡改;在所述第二设备显示所述第一应用的账号登录界面之前,所述方法还包括:所述第二设备根据所述签名公钥,确定所述第一应用的包名未被篡改。
- 根据权利要求9-13中任一项所述的方法,其特征在于,所述第二设备接收来自第一设备的第一应用的身份信息和所述第一应用的第一账号的登录信息,包括:所述第二设备与所述第一设备协商出会话密钥;所述第二设备接收来自所述第一设备的加密数据,所述加密数据是采用所述会话密钥加密所述第一应用的身份信息和所述第一账号的登录信息得到的;所述第二设备采用所述会话密钥,解密所述加密数据,得到所述第一应用的身份信息和所述第一账号的登录信息。
- 一种账号数据共享方法,其特征在于,所述方法包括:第一设备接收第一用户对第一应用的第一操作;其中,所述第一设备在所述第一应用使用第一验证码登录了第一账号;所述第一操作用于触发所述第一设备向其他设备分享所述第一账号;响应于所述第一操作,所述第一设备显示第一界面;其中,所述第一界面包括一个或多个设备选项,每个设备选项对应所述第一设备搜索到的一个无线设备;响应于所述第一用户对所述第一界面中第一设备选项的选择操作,所述第一设备向所述第一设备选项对应的第二设备发送所述第一应用的身份信息和所述第一账号,所述第一应用的身份信息用于标识所述第一应用;所述第二设备接收来自所述第一设备的所述第一应用的身份信息和所述第一账号;所述第二设备显示所述第一应用的账号登录界面,并在所述账号登录界面填充所述第一账号;响应于第二用户在所述账号登录界面的输入的获取验证码的操作,所述第二设备向所述第一应用的服务器发送验证码获取请求;其中,所述验证码获取请求中包括所述第一账号,用于请求所述服务器向所述第一账号发送验证码;所述服务器接收来自所述第二设备的所述验证码获取请求,向所述第一设备发送所述第一账号的第二验证码;所述第一设备接收来自所述服务器的所述第二验证码,向所述第二设备发送所述第二验证码;所述第二设备接收来自所述第一设备的所述第二验证码,在所述账号登录界面填充所述第二验证码,使用所述第一账号和所述第二验证码,在所述第一应用登录所述第一账号。
- 一种电子设备,其特征在于,所述电子设备是第一设备,所述第一设备包括:无线通信模块、存储器、显示屏和一个或多个处理器;所述无线通信模块、所述存储器、所述显示屏与所述处理器耦合;其中,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令;当所述计算机指令被所述处理器执行时,使得所述第一设备执行以下操作:接收用户对第一应用的第一操作;其中,所述第一设备在所述第一应用登录了第一账号;所述第一操作用于触发所述第一设备向其他设备分享所述第一账号的登录信息;所述第一账号的登录信息包括所述第一账号;或者,所述第一账号的登录信息包括所述第一账号和所述第一账号的登录密码;响应于所述第一操作,显示第一界面;其中,所述第一界面包括一个或多个设备选项,每个设备选项对应所述第一设备搜索到的一个无线设备;响应于所述用户对所述第一界面中第一设备选项的选择操作,向所述第一设备选项对应的第二设备发送所述第一应用的身份信息和所述第一账号的登录信息;其中,所述第一应用的身份信息包括所述第一应用的包名,所述第一应用的包名用于标识所述第一应用。
- 根据权利要求16所述的电子设备,其特征在于,当所述计算机指令被所述处理器执行时,使得所述第一设备还执行以下步骤:在接收所述用户对所述第一应用的所述第一操作之前,显示所述第一设备的主界面,所述主界面包括所述第一应用的图标;其中,所述第一操作是对所述第一应用的图标的预设操作;或者,在接收所述用户对所述第一应用的所述第一操作之前,显示所述第一应用的预设页面,所述预设页面中包括预设控件,所述预设控件用于触发所述第一设备向其他设备分享所述第一账号的登录信息;其中,所述第一操作是对所述预设控件的点击操作。
- 根据权利要求16或17所述的电子设备,其特征在于,所述第一应用的身份信息还包括所述第一应用的签名公钥,所述签名公钥用于验证所述第一应用的包名是否被篡改。
- 根据权利要求16-18中任一项所述的电子设备,其特征在于,所述第一账号的登录信息包括所述第一账号,不包括所述第一账号的登录密码;其中,所述第一账 号至少包括所述第一设备的手机号码或者邮箱地址;当所述计算机指令被所述处理器执行时,使得所述第一设备还执行以下步骤:在接收所述用户对所述第一应用的所述第一操作之前,接收所述用户在所述第一应用的账号登录界面输入的所述第一账号和第一验证码;响应于所述用户在所述账号登录界面的登录操作,使用所述第一账号和所述第一验证码,在所述第一应用登录所述第一账号。
- 根据权利要求19所述的电子设备,其特征在于,当所述计算机指令被所述处理器执行时,使得所述第一设备还执行以下步骤:在向所述第二设备发送所述第一应用的身份信息和所述第一账号的登录信息之后,接收来自所述第一应用的服务器的第二验证码;其中,所述第二验证码是所述第二设备请求所述服务器向所述第一账号发送的;向所述第二设备发送所述第二验证码;其中,所述第二验证码用于所述第二设备在所述第一应用登录所述第一账号。
- 根据权利要求16-20中任一项所述的电子设备,其特征在于,当所述计算机指令被所述处理器执行时,使得所述第一设备还执行以下步骤:在所述第一应用登录所述第一账号之后,显示第二界面;其中,所述第二界面用于请求所述用户确认是否保存所述第一账号的登录信息;响应于所述用户在所述第二界面的第二操作,保存所述第一应用的身份信息和所述第一账号的登录信息。
- 根据权利要求16-21中任一项所述的电子设备,其特征在于,当所述计算机指令被所述处理器执行时,使得所述第一设备还执行以下步骤:响应于所述用户对所述第一设备选项的选择操作,发出第一提示信息;其中,所述第一提示信息用于请求所述用户确认是否向所述第二设备分享所述第一账号的登录信息;响应于所述用户对所述第一提示信息的第三操作,向所述第二设备发送所述第一应用的身份信息和所述第一账号的登录信息。
- 根据权利要求16-22中任一项所述的电子设备,其特征在于,当所述计算机指令被所述处理器执行时,使得所述第一设备还执行以下步骤:响应于所述用户对所述第一设备选项的选择操作,与所述第二设备协商出会话密钥;采用所述会话密钥加密所述第一应用的身份信息和所述第一账号的登录信息得到加密数据,并向所述第二设备发送所述加密数据。
- 一种电子设备,其特征在于,所述电子设备是第二设备,所述第二设备包括:无线通信模块、存储器、显示屏和一个或多个处理器;所述无线通信模块、所述存储器、所述显示屏与所述处理器耦合;其中,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令;当所述计算机指令被所述处理器执行时,使得所述第二设备执行以下操作:接收来自第一设备的第一应用的身份信息和所述第一应用的第一账号的登录信息;其中,所述第一应用的身份信息包括所述第一应用的包名,所述第一应用的包名用于 标识所述第一应用;所述第一账号的登录信息包括所述第一账号;或者,所述第一账号的登录信息包括所述第一账号和所述第一账号的登录密码;显示所述第一应用的账号登录界面,并在所述账号登录界面填充所述第一账号的登录信息;响应于用户在所述账号登录界面的第四操作,使用所述第一账号的登录信息,在所述第一应用登录所述第一账号。
- 根据权利要求24所述的电子设备,其特征在于,当所述计算机指令被所述处理器执行时,使得所述第二设备还执行以下步骤:在接收所述第一应用的身份信息和所述第一账号的登录信息之后,显示所述第一应用的账号登录界面之前,显示第三界面;其中,所述第三界面用于请求所述用户确认是否使用所述第一账号的登录信息登录所述第一账号;响应于所述用户在所述第三界面的第五操作,显示所述账号登录界面。
- 根据权利要求24或25所述的电子设备,其特征在于,所述第一账号的登录信息包括所述第一账号,不包括所述第一账号的登录密码;当所述计算机指令被所述处理器执行时,使得所述第二设备还执行以下步骤:响应于所述用户在所述账号登录界面输入的获取验证码的操作,向所述第一应用的服务器发送验证码获取请求;其中,所述验证码获取请求中包括所述第一账号,用于请求所述服务器向所述第一账号发送验证码;所述第四操作包括所述获取验证码的操作;接收来自所述第一设备的第二验证码;其中,所述第二验证码是所述第二设备请求所述服务器向所述第一账号发送的;在所述账号登录界面填充所述第二验证码,使用所述第一账号和所述第二验证码,在所述第一应用登录所述第一账号。
- 根据权利要求24-26中任一项所述的电子设备,其特征在于,当所述计算机指令被所述处理器执行时,使得所述第二设备还执行以下步骤:如果根据所述第一应用的身份信息,确定所述第二设备正在运行所述第一应用,则显示所述账号登录界面;其中,所述第二设备正在运行所述第一应用包括以下任一种情况:所述第二设备正在前台运行所述第一应用;所述第二设备正在后台运行所述第一应用;所述第二设备正在前台运行浏览器,且所述浏览器显示所述第一应用的网页;所述第二设备正在后台运行浏览器,且所述浏览器显示所述第一应用的网页。
- 根据权利要求24-27中任一项所述的电子设备,其特征在于,所述第一应用的身份信息还包括所述第一应用的签名公钥,所述签名公钥用于验证所述第一应用的包名是否被篡改;当所述计算机指令被所述处理器执行时,使得所述第二设备还执行以下步骤:在显示所述第一应用的账号登录界面之前,根据所述签名公钥,确定所述第一应用的包名未被篡改。
- 根据权利要求24-28中任一项所述的电子设备,其特征在于,当所述计算机指令被所述处理器执行时,使得所述第二设备还执行以下步骤:与所述第一设备协商出会话密钥;接收来自所述第一设备的加密数据,所述加密数据是采用所述会话密钥加密所述第一应用的身份信息和所述第一账号的登录信息得到的;采用所述会话密钥,解密所述加密数据,得到所述第一应用的身份信息和所述第一账号的登录信息。
- 一种芯片***,其特征在于,所述芯片***应用于包括无线通信模块、存储器和显示屏的电子设备;所述芯片***包括一个或多个接口电路和一个或多个处理器;所述接口电路和所述处理器通过线路互联;所述接口电路用于从所述存储器接收信号,并向所述处理器发送所述信号,所述信号包括所述存储器中存储的计算机指令;当所述处理器执行所述计算机指令时,所述电子设备执行如权利要求1-15中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在电子设备上运行时,使得所述电子设备执行如权利要求1-15中任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求1-15中任一项所述的方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/798,689 US20230125139A1 (en) | 2020-02-12 | 2020-11-02 | Account Data Sharing Method and Electronic Device |
BR112022015703A BR112022015703A2 (pt) | 2020-02-12 | 2020-11-02 | Método e dispositivo eletrônico de compartilhamento de dados de conta |
EP20918671.7A EP4092980A4 (en) | 2020-02-12 | 2020-11-02 | ACCOUNT DATA SHARING METHOD AND ELECTRONIC DEVICE |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010088205.5 | 2020-02-12 | ||
CN202010088205.5A CN113259301B (zh) | 2020-02-12 | 2020-02-12 | 一种账号数据共享方法及电子设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021159765A1 true WO2021159765A1 (zh) | 2021-08-19 |
Family
ID=77219687
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/125973 WO2021159765A1 (zh) | 2020-02-12 | 2020-11-02 | 一种账号数据共享方法及电子设备 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230125139A1 (zh) |
EP (1) | EP4092980A4 (zh) |
CN (2) | CN116155586A (zh) |
BR (1) | BR112022015703A2 (zh) |
WO (1) | WO2021159765A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113688374A (zh) * | 2021-10-25 | 2021-11-23 | 荣耀终端有限公司 | 验证方法及电子设备 |
CN115576460A (zh) * | 2022-01-06 | 2023-01-06 | 荣耀终端有限公司 | 一种帐号绑定方法和电子设备 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115774501A (zh) * | 2021-09-07 | 2023-03-10 | 北京字跳网络技术有限公司 | 交互方法、装置和电子设备 |
CN114697078A (zh) * | 2022-02-24 | 2022-07-01 | 青岛海尔科技有限公司 | 信息验证方法及装置、存储介质、电子装置 |
CN114861154B (zh) * | 2022-07-04 | 2023-04-11 | 荣耀终端有限公司 | 一种协同登录方法 |
CN116723203B (zh) * | 2022-10-10 | 2024-04-19 | 荣耀终端有限公司 | 数据备份方法、数据恢复方法及电子设备 |
CN117131481A (zh) * | 2023-02-09 | 2023-11-28 | 荣耀终端有限公司 | 用户登录方法和电子设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101351022A (zh) * | 2007-07-16 | 2009-01-21 | 艾威梯软件技术(北京)有限公司 | 根据信号强度进行无线设备排序的方法和设备 |
CN105208013A (zh) * | 2015-08-31 | 2015-12-30 | 张方华 | 一种跨设备的高安全性无密码登录方法 |
US20160261473A1 (en) * | 2015-03-04 | 2016-09-08 | ShareG, Inc. | System and method for distributing mobile data |
CN109788005A (zh) * | 2017-11-10 | 2019-05-21 | 中兴通讯股份有限公司 | 设备控制权限共享方法、装置、***及计算机存储介质 |
CN110602216A (zh) * | 2019-09-16 | 2019-12-20 | 宁波奥克斯电气股份有限公司 | 多终端使用单账号的方法、装置、云服务器及存储介质 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9363251B2 (en) * | 2013-10-01 | 2016-06-07 | Google Technology Holdings LLC | Systems and methods for credential management between electronic devices |
US10313264B2 (en) * | 2014-05-28 | 2019-06-04 | Apple Inc. | Sharing account data between different interfaces to a service |
CN104967596B (zh) * | 2014-10-31 | 2018-05-22 | 腾讯科技(深圳)有限公司 | 用户终端与物联网设备绑定、通信的实现方法和装置 |
CN105306577A (zh) * | 2015-11-10 | 2016-02-03 | 上海卓易科技股份有限公司 | 基于app的手持设备间的资料共享***及方法 |
CN108365958B (zh) * | 2018-03-01 | 2021-06-29 | 广州南方人才资讯科技有限公司 | 账号登录的验证方法、装置、计算机设备和存储介质 |
US11374937B2 (en) * | 2018-06-03 | 2022-06-28 | Apple Inc. | Proximity credential sharing |
US11233779B2 (en) * | 2018-06-03 | 2022-01-25 | Apple Inc. | Wireless credential sharing |
CN109508527A (zh) * | 2018-11-16 | 2019-03-22 | 聚好看科技股份有限公司 | 一种实现不同终端账户统一的方法、终端及服务器 |
CN109818922A (zh) * | 2018-12-14 | 2019-05-28 | 深圳壹账通智能科技有限公司 | 应用程序的帐号分享方法及计算机设备 |
CN110336720B (zh) * | 2019-06-29 | 2021-08-20 | 华为技术有限公司 | 设备控制方法和设备 |
CN110598385B (zh) * | 2019-09-16 | 2022-03-22 | 宁波奥克斯电气股份有限公司 | 一种空调器用户账号分享授权的方法及*** |
CN110719319B (zh) * | 2019-09-18 | 2022-12-27 | 维沃移动通信有限公司 | 一种资源共享方法、装置、终端设备及存储介质 |
-
2020
- 2020-02-12 CN CN202310102499.6A patent/CN116155586A/zh active Pending
- 2020-02-12 CN CN202010088205.5A patent/CN113259301B/zh active Active
- 2020-11-02 EP EP20918671.7A patent/EP4092980A4/en active Pending
- 2020-11-02 BR BR112022015703A patent/BR112022015703A2/pt unknown
- 2020-11-02 WO PCT/CN2020/125973 patent/WO2021159765A1/zh unknown
- 2020-11-02 US US17/798,689 patent/US20230125139A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101351022A (zh) * | 2007-07-16 | 2009-01-21 | 艾威梯软件技术(北京)有限公司 | 根据信号强度进行无线设备排序的方法和设备 |
US20160261473A1 (en) * | 2015-03-04 | 2016-09-08 | ShareG, Inc. | System and method for distributing mobile data |
CN105208013A (zh) * | 2015-08-31 | 2015-12-30 | 张方华 | 一种跨设备的高安全性无密码登录方法 |
CN109788005A (zh) * | 2017-11-10 | 2019-05-21 | 中兴通讯股份有限公司 | 设备控制权限共享方法、装置、***及计算机存储介质 |
CN110602216A (zh) * | 2019-09-16 | 2019-12-20 | 宁波奥克斯电气股份有限公司 | 多终端使用单账号的方法、装置、云服务器及存储介质 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4092980A4 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113688374A (zh) * | 2021-10-25 | 2021-11-23 | 荣耀终端有限公司 | 验证方法及电子设备 |
CN113688374B (zh) * | 2021-10-25 | 2022-04-01 | 荣耀终端有限公司 | 验证方法及电子设备 |
CN115576460A (zh) * | 2022-01-06 | 2023-01-06 | 荣耀终端有限公司 | 一种帐号绑定方法和电子设备 |
Also Published As
Publication number | Publication date |
---|---|
EP4092980A4 (en) | 2023-07-12 |
EP4092980A1 (en) | 2022-11-23 |
US20230125139A1 (en) | 2023-04-27 |
CN116155586A (zh) | 2023-05-23 |
CN113259301B (zh) | 2023-02-17 |
CN113259301A (zh) | 2021-08-13 |
BR112022015703A2 (pt) | 2022-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021159765A1 (zh) | 一种账号数据共享方法及电子设备 | |
EP3913516B1 (en) | File access authority authentication method and electronic device | |
WO2022057742A1 (zh) | 一种跨设备调用应用的方法及电子设备 | |
WO2021135593A1 (zh) | 一种分享设备的方法及电子设备 | |
WO2021115038A1 (zh) | 一种应用数据处理方法及相关装置 | |
WO2021115113A1 (zh) | 数据处理方法、装置及存储介质 | |
CN108769992B (zh) | 用户认证方法、装置、终端及存储介质 | |
CN107959727B (zh) | 网页与客户端之间进行通讯的方法及装置 | |
EP3817322A1 (en) | Method for upgrading service application range of electronic identity card, and terminal device | |
JP2023511914A (ja) | オーディオ出力方法および端末デバイス | |
CN111357255B (zh) | 构建多个应用通用的可信应用 | |
CN110851823B (zh) | 数据访问方法、装置、终端及存储介质 | |
CN111368232A (zh) | 口令分享回流方法、装置、电子设备及存储介质 | |
EP4280646A1 (en) | In-vehicle infotainment product connection method and apparatus | |
CN112262548B (zh) | 一种文件处理方法及终端设备 | |
US11736149B2 (en) | Data transmission method for Bluetooth card reader and electronic device | |
WO2020224478A1 (zh) | 一种显示的方法及设备 | |
CN110532324B (zh) | 基于区块链的公告信息展示方法、装置、设备及存储介质 | |
CN110597840B (zh) | 基于区块链的伴侣关系建立方法、装置、设备及存储介质 | |
CN111917916B (zh) | 一种显示的方法及设备 | |
US10178087B2 (en) | Trusted pin management | |
WO2022242343A1 (zh) | 一种跨设备的文本接续的方法和电子设备 | |
CN110738491A (zh) | 数值转移方法、***、装置、终端及存储介质 | |
WO2022165939A1 (zh) | 一种跨设备认证方法及电子设备 | |
US20240064519A1 (en) | Method and apparatus for verifying personal identification number pin code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20918671 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112022015703 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2020918671 Country of ref document: EP Effective date: 20220816 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112022015703 Country of ref document: BR Kind code of ref document: A2 Effective date: 20220809 |