CN113010858B - A method and device for logging in an application in user equipment - Google Patents
A method and device for logging in an application in user equipment Download PDFInfo
- Publication number
- CN113010858B CN113010858B CN202110224570.9A CN202110224570A CN113010858B CN 113010858 B CN113010858 B CN 113010858B CN 202110224570 A CN202110224570 A CN 202110224570A CN 113010858 B CN113010858 B CN 113010858B
- Authority
- CN
- China
- Prior art keywords
- information
- user equipment
- target application
- identification information
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 238000004806 packaging method and process Methods 0.000 claims abstract 6
- 238000013475 authorization Methods 0.000 claims description 140
- 238000012795 verification Methods 0.000 claims description 48
- 230000004044 response Effects 0.000 claims description 45
- 230000015654 memory Effects 0.000 claims description 34
- 238000004590 computer program Methods 0.000 claims description 15
- 238000004891 communication Methods 0.000 description 11
- 238000004422 calculation algorithm Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 5
- 230000005291 magnetic effect Effects 0.000 description 5
- 230000004913 activation Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000005538 encapsulation Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 101100498818 Arabidopsis thaliana DDR4 gene Proteins 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000005294 ferromagnetic effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B11/00—Transmission systems employing sonic, ultrasonic or infrasonic waves
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
技术领域technical field
本申请涉及通信领域,尤其涉及一种用于在用户设备中登录应用的技术。The present application relates to the field of communications, and in particular to a technology for logging into an application in a user equipment.
背景技术Background technique
目前,当用户拥有一个关于任意应用的用户账号后,若用户的多个设备需要同步共享该用户账号进行登录时,假设某个设备中该应用已经登录了,其它设备需要同时登录的时候,有两种方式:一是需要登录的其他设备提供一个二维码,用已经登录的设备来识别这个二维码,在已经登录的设备上点击授权登录,比如电脑浏览器上的商城,可以用手机应用来扫描登录;二是需要登录的其他设备提供用户名,密码输入框,由用户来手动输入登录。At present, when a user has a user account for any application, if multiple devices of the user need to share the user account to log in synchronously, assuming that the application in one device has already logged in, and other devices need to log in at the same time, there is Two ways: One is to provide a QR code for other devices that need to log in, use the logged-in device to identify the QR code, and click on the logged-in device to authorize login, such as the mall on the computer browser, you can use the mobile phone The application is used to scan and log in; the second is to provide user name and password input boxes for other devices that need to log in, and the user can manually input and log in.
发明内容Contents of the invention
本申请的一个目的是提供一种用于在用户设备中登录应用的方法与设备。An object of the present application is to provide a method and device for logging into an application in a user equipment.
根据本申请的一个方面,提供了一种用于在用户设备中登录应用的方法,应用于第一用户设备,其中,所述第一用户设备包括第一声音装置,该方法包括:According to one aspect of the present application, a method for logging into an application in a user equipment is provided, which is applied to a first user equipment, wherein the first user equipment includes a first sound device, and the method includes:
响应于所述第一用户设备中的触发事件,获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息;In response to a trigger event in the first user equipment, acquire current authorization login information of a target application corresponding to the trigger event, and encapsulate the authorization login information into first data information according to a preset protocol;
对所述第一数据信息执行第一预设操作以生成第二数据信息;performing a first preset operation on the first data information to generate second data information;
在所述第二数据信息中添加校验信息以生成音频数据信息;adding verification information to the second data information to generate audio data information;
通过所述第一声音装置按照预设频率播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用。Play the audio data information according to a preset frequency through the first sound device, so that the corresponding one or more second user equipments can collect the audio data information, and log in the target application according to the audio data information .
根据本申请的另一个方面,提供了一种用于在用户设备中登录应用的方法,应用于第二用户设备,其中,所述第二用户设备包括第二声音装置,该方法包括:According to another aspect of the present application, there is provided a method for logging into an application in a user equipment, which is applied to a second user equipment, wherein the second user equipment includes a second sound device, and the method includes:
响应于所述第二用户设备中的触发事件,通过所述第二声音装置获取第一用户设备播放的音频数据信息,其中,所述音频数据信息以预设频率进行播放;In response to a trigger event in the second user equipment, acquire audio data information played by the first user equipment through the second sound device, wherein the audio data information is played at a preset frequency;
对所述音频数据信息执行第二预设操作以生成第一数据信息;performing a second preset operation on the audio data information to generate first data information;
按照预设协议对所述第一数据信息进行解析以获得所述触发事件对应的目标应用的授权登录信息;Analyzing the first data information according to a preset protocol to obtain authorized login information of a target application corresponding to the trigger event;
根据所述授权登录信息对所述目标应用执行登录操作。Perform a login operation on the target application according to the authorized login information.
根据本申请的另一个方面,提供了一种用于在用户设备中登录应用的方法,应用于网络设备,其中,该方法包括:According to another aspect of the present application, a method for logging into an application in a user equipment is provided, which is applied to a network device, wherein the method includes:
接收第二用户设备发送的登录请求,其中,所述登录请求包括目标应用的标识信息以及授权登录信息,所述授权登录信息包括第一用户设备中当前登录所述目标应用的账号标识信息以及所述第一用户设备提供的授权标识信息;Receive a login request sent by the second user equipment, where the login request includes identification information of the target application and authorized login information, and the authorized login information includes the account identification information of the first user equipment that is currently logged into the target application and the The authorization identification information provided by the first user equipment;
响应于所述登录请求,根据所述目标应用的标识信息、所述账号标识信息以及所述授权标识信息在所述网络设备中进行查询,其中,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系;In response to the login request, perform a query in the network device according to the identification information of the target application, the account identification information, and the authorization identification information, wherein the network device stores the application identification information, account number The corresponding relationship between identification information and authorization identification information;
若查询结果不为空,向所述第二用户设备返回允许登录指令,其中,所述允许登录指令用于允许所述目标应用在所述第二用户设备中进行登录。If the query result is not empty, return a login permission instruction to the second user equipment, where the login permission instruction is used to allow the target application to log in the second user equipment.
根据本申请的又一个方面,提供了一种用于在用户设备中登录应用的方法,其中,第一用户设备包括第一声音装置,第二用户设备包括第二声音装置,该方法包括:According to still another aspect of the present application, a method for logging into an application in a user equipment is provided, wherein the first user equipment includes a first sound device, and the second user equipment includes a second sound device, and the method includes:
响应于所述第一用户设备中的触发事件,所述第一用户设备获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息,并对所述第一数据信息执行第一预设操作以生成第二数据信息,并在所述第二数据信息中添加校验信息以生成音频数据信息;并通过所述第一声音装置按照预设频率播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用;In response to a trigger event in the first user equipment, the first user equipment acquires current authorization login information of a target application corresponding to the trigger event, and encapsulates the authorization login information into first data according to a preset protocol information, and perform a first preset operation on the first data information to generate second data information, and add verification information to the second data information to generate audio data information; and through the first sound device Playing the audio data information according to a preset frequency, so that the corresponding one or more second user equipments can collect the audio data information, and log in the target application according to the audio data information;
响应于所述第二用户设备中的触发事件,所述第二用户设备通过所述第二声音装置获取所述音频数据信息,并对所述音频数据信息执行第二预设操作以生成所述第一数据信息,并按照预设协议对所述第一数据信息进行解析以获得所述触发事件对应的目标应用的授权登录信息;In response to a trigger event in the second user equipment, the second user equipment acquires the audio data information through the second sound device, and performs a second preset operation on the audio data information to generate the First data information, and analyzing the first data information according to a preset protocol to obtain authorized login information of the target application corresponding to the trigger event;
所述第二用户设备根据所述授权登录信息向所述目标应用对应的网络设备发送登录请求,其中,所述登录请求包括所述目标应用的标识信息以及所述授权登录信息,所述授权登录信息包括所述第一用户设备中当前登录所述目标应用的账号标识信息以及所述第一用户设备提供的授权标识信息;The second user equipment sends a login request to a network device corresponding to the target application according to the authorized login information, where the login request includes identification information of the target application and the authorized login information, and the authorized login The information includes account identification information currently logged into the target application in the first user equipment and authorization identification information provided by the first user equipment;
所述网络设备接收所述登录请求,并响应于所述登录请求,根据所述目标应用的标识信息、所述账号标识信息以及所述授权标识信息在所述网络设备中进行查询,其中,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系,并若查询结果不为空,所述网络设备向所述第二用户设备返回允许登录指令;The network device receives the login request, and in response to the login request, performs a query on the network device according to the identification information of the target application, the account identification information, and the authorization identification information, wherein the The corresponding relationship between application identification information, account identification information and authorization identification information is stored in the network device, and if the query result is not empty, the network device returns a login permission instruction to the second user device;
所述第二用户设备接收所述允许登录指令,并基于所述允许登录指令对所述目标应用执行登录操作,其中,所述目标应用以所述授权登录信息中的账号标识信息在所述第二用户设备中进行登录。The second user equipment receives the login permission instruction, and performs a login operation on the target application based on the login permission instruction, wherein the target application uses the account identification information in the authorized login information in the second Log in to the user's device.
根据本申请的一个方面,提供了一种用于在用户设备中登录应用的第一用户设备,所述第一用户设备包括第一声音装置,该设备包括:According to one aspect of the present application, there is provided a first user device for logging into an application in the user device, the first user device includes a first sound device, and the device includes:
一一模块,用于响应于所述第一用户设备中的触发事件,获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息;a module, configured to, in response to a trigger event in the first user equipment, acquire current authorization login information of a target application corresponding to the trigger event, and encapsulate the authorization login information into first data according to a preset protocol information;
一二模块,用于对所述第一数据信息执行第一预设操作以生成第二数据信息;A two-module, configured to perform a first preset operation on the first data information to generate second data information;
一三模块,用于在所述第二数据信息中添加校验信息以生成音频数据信息;A module, configured to add verification information to the second data information to generate audio data information;
一四模块,用于通过所述第一声音装置按照预设频率播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用。A module, configured to use the first sound device to play the audio data information according to a preset frequency, so that the corresponding one or more second user equipments can collect the audio data information, and play the audio data information according to the audio data information. information to log into the target application.
根据本申请的一个方面,提供了一种用于在用户设备中登录应用的第二用户设备,所述第二用户设备包括第二声音装置,该设备包括:According to one aspect of the present application, a second user equipment for logging into an application in the user equipment is provided, the second user equipment includes a second sound device, and the equipment includes:
二一模块,用于响应于所述第二用户设备中的触发事件,通过所述第二声音装置获取第一用户设备播放的音频数据信息,其中,所述音频数据信息以预设频率进行播放;A two-one module, configured to obtain, through the second sound device, audio data information played by the first user equipment in response to a trigger event in the second user equipment, wherein the audio data information is played at a preset frequency ;
二二模块,用于对所述音频数据信息执行第二预设操作以生成第一数据信息;A two-two module, configured to perform a second preset operation on the audio data information to generate first data information;
二三模块,用于按照预设协议对所述第一数据信息进行解析以获得所述触发事件对应的目标应用的授权登录信息;The second and third modules are configured to analyze the first data information according to a preset protocol to obtain the authorized login information of the target application corresponding to the trigger event;
二四模块,用于根据所述授权登录信息对所述目标应用执行登录操作。A 24 module, configured to perform a login operation on the target application according to the authorized login information.
根据本申请的一个方面,提供了一种用于在用户设备中登录应用的网络设备,该设备包括:According to one aspect of the present application, a network device for logging into an application in a user equipment is provided, the device includes:
三一模块,用于接收第二用户设备发送的登录请求,其中,所述登录请求包括目标应用的标识信息以及授权登录信息,所述授权登录信息包括第一用户设备中当前登录所述目标应用的账号标识信息以及所述第一用户设备提供的授权标识信息;Sany module, configured to receive a login request sent by the second user equipment, wherein the login request includes identification information of the target application and authorized login information, and the authorized login information includes the current login of the target application in the first user equipment account identification information and authorization identification information provided by the first user equipment;
三二模块,用于响应于所述登录请求,根据所述目标应用的标识信息、所述账号标识信息以及所述授权标识信息在所述网络设备中进行查询,其中,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系;A three-two module, configured to, in response to the login request, query in the network device according to the identification information of the target application, the account identification information, and the authorization identification information, wherein the network device stores There is a corresponding relationship between application identification information, account identification information, and authorization identification information;
三三模块,用于若查询结果不为空,向所述第二用户设备返回允许登录指令,其中,所述允许登录指令用于允许所述目标应用在所述第二用户设备中进行登录。The 33 module is configured to return a login permission instruction to the second user equipment if the query result is not empty, wherein the login permission instruction is used to allow the target application to log in to the second user equipment.
根据本申请的一个方面,提供了一种用于在用户设备中登录应用的设备,该设备包括:According to one aspect of the present application, a device for logging into an application in a user device is provided, the device comprising:
处理器;以及processor; and
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如上所述任一方法的操作。A memory arranged to store computer-executable instructions which, when executed, cause the processor to perform the operations of any of the methods described above.
根据本申请的另一个方面,提供了存储指令的计算机可读介质,所述指令在被执行时使得系统进行如上所述任一方法的操作。According to another aspect of the present application, there is provided a computer-readable medium storing instructions which, when executed, cause a system to perform the operations of any of the methods described above.
根据本申请的一个方面,提供了一种计算机程序产品,包括计算机程序,其特征在于,该计算机程序被处理器执行时实现如上所述方法的步骤。According to one aspect of the present application, a computer program product is provided, including a computer program. It is characterized in that, when the computer program is executed by a processor, the steps of the above method are implemented.
与现有技术相比,本申请中第一用户设备获取触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息,并对所述第一数据信息执行第一预设操作以生成第二数据信息,并在所述第二数据信息中添加校验信息以生成音频数据信息,随后通过所述第一声音装置按照预设频率播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用。本申请中第二用户设备可以根据第一用户设备播放出的音频数据信息(声波信息),执行第二用户设备中目标应用的登录操作,本申请可以无需用户进行复杂的手动操作,即简化了用户的手动登录操作,并且能安全高效的进行目标应用的登录(即不会产生目标应用密码泄露的可能),从而提升用户登录应用的体验。Compared with the prior art, in this application, the first user equipment obtains the current authorized login information of the target application corresponding to the trigger event, and encapsulates the authorized login information into first data information according to a preset protocol, and records the authorized login information of the second application. Performing a first preset operation on a piece of data information to generate second data information, adding verification information to the second data information to generate audio data information, and then playing the audio data information at a preset frequency through the first sound device Audio data information, so that the corresponding one or more second user equipments collect the audio data information, and log in the target application according to the audio data information. In this application, the second user equipment can perform the login operation of the target application in the second user equipment according to the audio data information (sound wave information) played by the first user equipment. The user's manual login operation, and can safely and efficiently log in to the target application (that is, there is no possibility of leaking the target application password), thereby improving the user's experience in logging in to the application.
附图说明Description of drawings
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:Other characteristics, objects and advantages of the present application will become more apparent by reading the detailed description of non-limiting embodiments made with reference to the following drawings:
图1示出根据本申请一个实施例的一个系统拓扑图;Fig. 1 shows a system topology diagram according to an embodiment of the present application;
图2示出根据本申请一个实施例的一种用于在用户设备中登录应用的系统方法的方法流程图;Fig. 2 shows a method flowchart of a system method for logging in an application in a user equipment according to an embodiment of the present application;
图3示出根据本申请一个实施例的一种用于在用户设备中登录应用的方法流程图,应用于第一用户设备;FIG. 3 shows a flow chart of a method for logging into an application in a user equipment according to an embodiment of the present application, which is applied to a first user equipment;
图4示出根据本申请一个实施例的一种用于在用户设备中登录应用的协议示意图;Fig. 4 shows a schematic diagram of a protocol for logging into an application in a user equipment according to an embodiment of the present application;
图5示出根据本申请一个实施例的一种用于在用户设备中登录应用的方法流程图,应用于第二用户设备;FIG. 5 shows a flow chart of a method for logging into an application in a user equipment according to an embodiment of the present application, which is applied to a second user equipment;
图6示出根据本申请一个实施例的一种用于在用户设备中登录应用的方法流程图,应用于网络设备;FIG. 6 shows a flow chart of a method for logging into an application in a user equipment according to an embodiment of the present application, which is applied to a network device;
图7示出根据本申请一个实施例的一种用于在用户设备中登录应用的示意图;Fig. 7 shows a schematic diagram for logging into an application in a user equipment according to an embodiment of the present application;
图8示出根据本申请一个实施例的一种用于在用户设备中登录应用的第一用户设备结构图;Fig. 8 shows a structural diagram of a first user equipment for logging into an application in a user equipment according to an embodiment of the present application;
图9示出根据本申请一个实施例的一种用于在用户设备中登录应用的第二用户设备结构图;FIG. 9 shows a structural diagram of a second user equipment for logging into an application in the user equipment according to an embodiment of the present application;
图10示出根据本申请一个实施例的一种用于在用户设备中登录应用的网络设备结构图;FIG. 10 shows a structural diagram of a network device for logging into an application in a user device according to an embodiment of the present application;
图11示出根据本申请一个实施例的一种用于在用户设备中登录应用的系统设备结构图;FIG. 11 shows a structural diagram of a system device for logging into an application in a user device according to an embodiment of the present application;
图12示出可被用于实施本申请中所述的各个实施例的示例性系统。Figure 12 illustrates an exemplary system that may be used to implement various embodiments described in this application.
附图中相同或相似的附图标记代表相同或相似的部件。The same or similar reference numerals in the drawings represent the same or similar components.
具体实施方式Detailed ways
下面结合附图对本申请作进一步详细描述。The application will be described in further detail below in conjunction with the accompanying drawings.
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input/output interfaces, network interfaces and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and/or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Flash memory or other memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cartridge, tape disk storage or other magnetic storage device or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
本申请所指设备包括但不限于用户设备、网络设备、或用户设备与网络设备通过网络相集成所构成的设备。所述用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等,所述移动电子产品可以采用任意操作系统,如android操作系统、iOS操作系统等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。优选地,所述设备还可以是运行于所述用户设备、网络设备、或用户设备与网络设备、网络设备、触摸终端或网络设备与触摸终端通过网络相集成所构成的设备上的程序。The equipment referred to in this application includes, but is not limited to, user equipment, network equipment, or equipment formed by integrating user equipment and network equipment through a network. The user equipment includes but is not limited to any mobile electronic product that can perform human-computer interaction (such as human-computer interaction through a touch panel) with the user, such as a smart phone, a tablet computer, etc., and the mobile electronic product can use any operation System, such as android operating system, iOS operating system, etc. Wherein, the network device includes an electronic device that can automatically perform numerical calculation and information processing according to preset or stored instructions, and its hardware includes but is not limited to microprocessors, application-specific integrated circuits (ASICs), programmable logic device (PLD), field programmable gate array (FPGA), digital signal processor (DSP), embedded device, etc. The network equipment includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud composed of multiple servers; here, the cloud is composed of a large number of computers or network servers based on Cloud Computing, Among them, cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets. The network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad Hoc network) and the like. Preferably, the device may also be a program running on the user device, network device, or a device formed by integrating user device and network device, network device, touch terminal or network device and touch terminal through a network.
当然,本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。Of course, those skilled in the art should understand that the above-mentioned equipment is only an example, and other existing or future equipment that may be applicable to this application should also be included in the scope of protection of this application, and it is included in this application by reference. this.
在本申请的描述中,“多个”的含义是两个或者更多,除非另有明确具体的限定。In the description of the present application, "plurality" means two or more, unless otherwise specifically defined.
图1示出了本申请的一个典型场景,第一用户设备中安装有目标应用(例如,视频应用、社交应用等),一个或者多个第二用户设备中安装有同款目标应用,例如,第一用户设备中安装有A应用,该一个或者多个第二用户设备中均安装有A应用,其中,该第一用户设备、第二用户设备包括但限于手机、平板、电脑以及电视等计算设备,该第一用户设备、第二用户设备可搭载的系统包括但不限于Android(安卓)系统以及IOS系统等,在此对系统不作任何限定。第一用户设备的持有用户可以采取多种方式登录该目标应用,例如,用户在目标应用中输入已经注册的用户账户标识信息(例如,用户名或者用户ID)以及登录密码,用户通过其他已登录所述目标应用的设备协助该目标应用在第一用户设备中的登录(例如,第一用户设备提供关于目标应用的二维码,用户用该已登录设备中的目标应用扫描该二维码以进行目标应用在第一用户设备的登录),第一用户设备与所述目标应用的网络设备建立通信连接,基于该通信连接,第一用户设备将获取的当前目标应用的授权登录信息并将该授权登录信息发送至网络设备,其中,所述授权登录信息包括当前登录目标应用的账号标识信息以及授权标识信息(例如,该授权标识信息是第一用户设备随机生成的),网络设备在接收到该授权登录信息后根据该信息更新应用标识信息、账号标识信息以及授权标识信息的对应关系列表,以便后续其他设备根据该授权登录信息获取登录该设备中的目标应用的指令。第一用户设备对所述授权登录信息执行加密、编码等操作以转换成音频数据信息(随后,第一用户设备播放所述音频数据,例如,以声波形式播放的数据),第二用户设备在第一用户设备的附近接收到该音频数据后,根据所述音频数据获取该音频数据中的授权登录信息,并基于该授权登录信息向所述网络设备发送登录请求,网络设备根据第二用户设备提供的授权登录信息在对应关系列表中进行查询,若查询结果不为空,向第二用户设备发送关于目标应用的允许登录指令,该目标应用在第二用户设备中登录成功。Figure 1 shows a typical scenario of the present application, where a target application (for example, a video application, a social application, etc.) is installed in a first user device, and one or more second user devices are installed with the same target application, for example, The A application is installed in the first user equipment, and the A application is installed in the one or more second user equipment, wherein the first user equipment and the second user equipment include but are limited to mobile phones, tablets, computers, and televisions. Devices, the systems that can be carried by the first user equipment and the second user equipment include but are not limited to Android (Android) system and IOS system, etc., and there is no limitation on the system here. The user holding the first user device can log in to the target application in a variety of ways. For example, the user enters the registered user account identification information (for example, user name or user ID) and login password in the target application. The device that logs in the target application assists the log-in of the target application in the first user device (for example, the first user device provides a two-dimensional code related to the target application, and the user scans the two-dimensional code with the target application in the logged-in device To log in the target application on the first user equipment), the first user equipment establishes a communication connection with the network device of the target application, and based on the communication connection, the first user equipment obtains the authorized login information of the current target application and The authorized login information is sent to the network device, wherein the authorized login information includes account identification information of the current login target application and authorization identification information (for example, the authorization identification information is randomly generated by the first user equipment), and the network device receives After obtaining the authorized login information, update the correspondence list of application identification information, account identification information, and authorization identification information according to the information, so that other devices can obtain instructions to log in to the target application in the device according to the authorized login information. The first user equipment performs operations such as encryption and encoding on the authorized login information to convert it into audio data information (then, the first user equipment plays the audio data, for example, data played in the form of sound waves), and the second user equipment After receiving the audio data, the vicinity of the first user equipment obtains the authorized login information in the audio data according to the audio data, and sends a login request to the network equipment based on the authorized login information, and the network equipment according to the second user equipment The provided authorized login information is queried in the correspondence list, and if the query result is not empty, a login permission instruction about the target application is sent to the second user equipment, and the target application successfully logs in in the second user equipment.
图2示出根据本申请一个实施例的一种在用户设备中登录应用的系统方法,其中,第一用户设备包括第一声音装置,第二用户设备包括第二声音装置,该方法包括:Fig. 2 shows a system method for logging into an application in a user device according to an embodiment of the present application, wherein the first user device includes a first sound device, and the second user device includes a second sound device, and the method includes:
响应于所述第一用户设备中的触发事件,所述第一用户设备获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息,并对所述第一数据信息执行第一预设操作以生成第二数据信息,并在所述第二数据信息中添加校验信息以生成音频数据信息;并通过所述第一声音装置按照预设频率播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用;In response to a trigger event in the first user equipment, the first user equipment acquires current authorization login information of a target application corresponding to the trigger event, and encapsulates the authorization login information into first data according to a preset protocol information, and perform a first preset operation on the first data information to generate second data information, and add verification information to the second data information to generate audio data information; and through the first sound device Playing the audio data information according to a preset frequency, so that the corresponding one or more second user equipments can collect the audio data information, and log in the target application according to the audio data information;
响应于所述第二用户设备中的触发事件,所述第二用户设备通过所述第二声音装置获取所述音频数据信息,并对所述音频数据信息执行第二预设操作以生成所述第一数据信息,并按照预设协议对所述第一数据信息进行解析以获得所述触发事件对应的目标应用的授权登录信息;In response to a trigger event in the second user equipment, the second user equipment acquires the audio data information through the second sound device, and performs a second preset operation on the audio data information to generate the First data information, and analyzing the first data information according to a preset protocol to obtain authorized login information of the target application corresponding to the trigger event;
所述第二用户设备根据所述授权登录信息向所述目标应用对应的网络设备发送登录请求,其中,所述登录请求包括所述目标应用的标识信息以及所述授权登录信息,所述授权登录信息包括所述第一用户设备中当前登录所述目标应用的账号标识信息以及所述第一用户设备提供的授权标识信息;The second user equipment sends a login request to a network device corresponding to the target application according to the authorized login information, where the login request includes identification information of the target application and the authorized login information, and the authorized login The information includes account identification information currently logged into the target application in the first user equipment and authorization identification information provided by the first user equipment;
所述网络设备接收所述登录请求,并响应于所述登录请求,根据所述目标应用的标识信息、所述账号标识信息以及所述授权标识信息在所述网络设备中进行查询,其中,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系,并若查询结果不为空,所述网络设备向所述第二用户设备返回允许登录指令;The network device receives the login request, and in response to the login request, performs a query on the network device according to the identification information of the target application, the account identification information, and the authorization identification information, wherein the The corresponding relationship between application identification information, account identification information and authorization identification information is stored in the network device, and if the query result is not empty, the network device returns a login permission instruction to the second user device;
所述第二用户设备接收所述允许登录指令,并基于所述允许登录指令对所述目标应用执行登录操作,其中,所述目标应用以所述授权登录信息中的账号标识信息在所述第二用户设备中进行登录。The second user equipment receives the login permission instruction, and performs a login operation on the target application based on the login permission instruction, wherein the target application uses the account identification information in the authorized login information in the second Log in to the user's device.
图3示出根据本申请一个实施例的一种用于在用户设备中登录应用的方法,应用于第一用户设备,所述方法包括步骤S101、步骤S102、步骤S103和步骤S104。Fig. 3 shows a method for logging in an application in a user equipment according to an embodiment of the present application, which is applied to a first user equipment, and the method includes step S101, step S102, step S103 and step S104.
具体地,在步骤S101中,第一用户设备响应于所述第一用户设备中的触发事件,获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息。例如,响应于所述第一用户设备的持有用户在目标应用的设置中的触发操作,第一用户设备生成触发事件,在一些实施例中,在步骤S101中,第一用户设备响应于所述第一用户设备中的触发事件,启用所述触发事件对应的目标应用中的声波启用设置,获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息。例如,所述触发操作包括对所述目标应用中声波启用设置的开启操作,其中,所述声波启用设置用于控制所述第一用户设备生成与所述目标应用相关的声波信息,并向外部发送该相关的声波信息。在开启所述声波启用设置的前提下,为后续生成与所述目标应用相关的声波信息提供基础。在一些实施例中,在步骤S101中,第一用户设备响应于所述第一用户设备中的触发事件,检测所述触发事件对应的目标应用的登录状态,若所述目标应用的登录状态包括已登录,获取所述目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息。例如,只有在目标应用在第一用户设备中已登录的情况下,第一用户设备才可启用所述触发事件对应的目标应用中的声波启用设置,从而基于该启用的声波启用设置获取目标应用当前的授权登录信息。或者例如,无论目标应用在第一用户设备中是否登录,用户都可打开所述目标应用中的声波启用设置,第一用户设备基于该启用的声波启用设置检测所述目标应用的当前登录状态,若已在第一用户设备中登录,则获取所述目标应用当前的授权登录信息;若未在第一用户设备中登录,不执行任何操作。Specifically, in step S101, in response to a trigger event in the first user equipment, the first user equipment obtains the current authorized login information of the target application corresponding to the trigger event, and stores the authorized login information according to the preset The protocol is encapsulated into first data information. For example, in response to a trigger operation of the user holding the first user device in the setting of the target application, the first user device generates a trigger event. In some embodiments, in step S101, the first user device responds to the The trigger event in the first user equipment, enable the sound wave enabling setting in the target application corresponding to the trigger event, obtain the current authorized login information of the target application corresponding to the trigger event, and set the authorized login information according to the preset The protocol is encapsulated into first data information. For example, the triggering operation includes an operation of enabling a sound wave enabling setting in the target application, wherein the sound wave enabling setting is used to control the first user equipment to generate sound wave information related to the target application, and send the sound wave information to the outside The relevant sonic information is sent. On the premise of enabling the sound wave enabling setting, a basis is provided for subsequent generation of sound wave information related to the target application. In some embodiments, in step S101, in response to a trigger event in the first user device, the first user equipment detects the login status of the target application corresponding to the trigger event, if the login status of the target application includes already logged in, obtaining the current authorized login information of the target application, and encapsulating the authorized login information into first data information according to a preset protocol. For example, only when the target application is logged in in the first user equipment, the first user equipment can enable the sound wave activation setting in the target application corresponding to the trigger event, so as to acquire the target application based on the enabled sound wave activation setting Current authorization login information. Or for example, regardless of whether the target application is logged in in the first user equipment, the user can enable the sound wave enabling setting in the target application, and the first user equipment detects the current login state of the target application based on the enabled sound wave enabling setting, If the first user equipment has been logged in, the current authorized login information of the target application is obtained; if the first user equipment is not logged in, no operation is performed.
在目标应用在第一用户设备中已登录的情况下,可以确定此时登录所述目标应用的账号标识信息(例如,用户名、用户ID(例如,用户在目标应用中的ID或者用户的手机号))以及与该账号匹配的密码信息都已上传至所述目标应用对应的网络设备中,其中,所述账号标识信息是唯一的,该网络设备存储有目标应用的账户标识信息与密码信息的映射关系。在一些实施例中,所述获取所述触发事件对应的目标应用当前的授权登录信息之前还包括生成所述授权登录信息,其中,所述授权登录信息包括所述目标应用的应用标识信息、所述目标应用中已登录的账号标识信息以及授权标识信息,所述生成所述授权登录信息的方式包括以下任一项:In the case that the target application has been logged in in the first user equipment, it can be determined that the account identification information (for example, user name, user ID (for example, the ID of the user in the target application or the user's mobile phone) for logging in to the target application at this time can be determined. number)) and the password information matching the account have been uploaded to the network device corresponding to the target application, wherein the account identification information is unique, and the network device stores the account identification information and password information of the target application mapping relationship. In some embodiments, before obtaining the current authorization login information of the target application corresponding to the trigger event, the acquisition further includes generating the authorization login information, wherein the authorization login information includes the application identification information of the target application, the The logged-in account identification information and authorization identification information in the target application, and the method of generating the authorization login information includes any of the following:
1)由第一用户设备本地生成,例如,一旦开启声波启用装置,第一用户设备即生成与所述用户账号标识信息对应的授权标识信息(即该授权标识信息与该账号匹配的密码信息也对应),其中,该授权标识信息用作允许其他设备使用所述用户账号标识信息登录所述目标应用的验证信息。例如,该目标应用的授权标识信息可以是唯一的(即与该用户账号标识信息是绑定的),也可以是第一用户设备随机生成的一个字符串。在一些实施例中,所述方法还包括步骤S105(未示出),在步骤S105中,第一用户设备将所述授权登录信息发送至所述目标应用对应的网络设备,其中,所述授权登录信息还包括所述目标应用中已登录的账号标识信息以及授权标识信息,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系。例如,第一用户设备将生成的授权登录信息发送至目标应用对应的网络设备中,以便后续其他第二用户设备获取到所述授权登录信息后利用所述授权登录信息在网络设备端进行关于目标应用的登录验证,从而避免直接使用密码导致密码产生泄露的可能,其中,所述对应关系包括应用标识信息(例如,应用的名称或者应用的ID)、账号标识信息(用户ID、手机号等)以及授权标识信息(与账号标识信息对应的字符串),例如:1) locally generated by the first user equipment, for example, once the sound wave activation device is turned on, the first user equipment generates the authorization identification information corresponding to the user account identification information (that is, the authorization identification information and the password information matching the account are also corresponding), wherein the authorization identification information is used as verification information allowing other devices to use the user account identification information to log in to the target application. For example, the authorization identification information of the target application may be unique (that is, bound to the user account identification information), or may be a character string randomly generated by the first user equipment. In some embodiments, the method further includes step S105 (not shown), in step S105, the first user equipment sends the authorization login information to the network device corresponding to the target application, wherein the authorization The login information also includes account identification information and authorization identification information that have been logged in in the target application, and the corresponding relationship between the application identification information, account identification information, and authorization identification information is stored in the network device. For example, the first user equipment sends the generated authorization login information to the network device corresponding to the target application, so that after other second user equipment obtains the authorization login information, they can use the authorization login information to conduct information about the target on the network equipment side. Application login verification, so as to avoid the possibility of password leakage caused by direct use of passwords, wherein the correspondence includes application identification information (for example, application name or application ID), account identification information (user ID, mobile phone number, etc.) And the authorization identification information (the string corresponding to the account identification information), for example:
应用ID1-用户ID1-授权标识信息1;Application ID1-user ID1-authorization identification information 1;
应用ID2-用户ID2-授权标识信息2;Application ID2-user ID2-authorization identification information 2;
应用ID3-用户ID3-授权标识信息3…应用IDn-用户IDn-授权标识信息n。Application ID3-user ID3-authorization identification information 3...application IDn-user IDn-authorization identification information n.
2)所述授权标识信息可以是网络设备生成并下发给第一用户设备的,在一些实施例中,所述方法还包括步骤S106(未示出),在步骤S106中,第一用户设备响应于所述触发事件,向所述目标应用对应的网络设备发送信息请求,其中,所述信息请求包括所述目标应用中已登录的账号标识信息;接收所述网络设备基于所述账号标识信息返回的授权登录信息,其中,所述网络设备根据查询到的授权标识信息以及所述账号标识信息生成所述授权登录信息,所述授权标识信息与所述账号标识信息对应的密码信息相匹配。例如,一旦开启声波启用装置,第一用户设备即向所述目标应用对应的网络设备发送信息请求,以请求与所述目标应用相关的授权登录信息,以便后续利用授权登录信息登录所述目标应用所在的第二用户设备。其中,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系,响应于所述信息请求,网络设备根据所述目标应用的应用标识、所述已登录的账号标识信息在所述对应关系中进行查找以获取与所述目标应用的应用标识、所述已登录的账号标识信息对应的授权标识信息。例如,目标应用的应用标识、所述已登录的账号标识信息分别为应用ID3、用户ID3,所述网络设备存储的对应关系包括:2) The authorization identification information may be generated by a network device and delivered to the first user equipment. In some embodiments, the method further includes step S106 (not shown), in step S106, the first user equipment In response to the trigger event, sending an information request to the network device corresponding to the target application, wherein the information request includes account identification information that has been logged in in the target application; receiving the network device based on the account identification information The returned authorization login information, wherein the network device generates the authorization login information according to the queried authorization identification information and the account identification information, and the authorization identification information matches the password information corresponding to the account identification information. For example, once the sound wave enabling device is turned on, the first user equipment sends an information request to the network device corresponding to the target application to request authorized login information related to the target application, so as to subsequently log in to the target application using the authorized login information The second user equipment where it is located. Wherein, the corresponding relationship between application identification information, account identification information, and authorization identification information is stored in the network device, and in response to the information request, the network device, according to the application identification of the target application and the logged-in account identification information, A search is performed in the corresponding relationship to obtain authorization identification information corresponding to the application identification of the target application and the login account identification information. For example, the application identifier of the target application and the logged-in account identifier information are application ID3 and user ID3 respectively, and the corresponding relationship stored in the network device includes:
应用ID1-用户ID1-授权标识信息1;Application ID1-user ID1-authorization identification information 1;
应用ID2-用户ID2-授权标识信息2;Application ID2-user ID2-authorization identification information 2;
应用ID3-用户ID3-授权标识信息3。基于此,网络设备确定该对应的授权标识信息为授权标识信息3。网络设备根据该授权标识信息3以及用户ID3生成授权登录信息,并将该授权登录信息返回至第一用户设备,在一些实施例中,该网络设备存储有目标应用的账户标识信息与密码信息的映射关系,在授权标识信息3与所述用户ID3是对应关系的前提下,该授权标识信息3与所述用户ID3的密码信息也是对应关系。Application ID3-user ID3-authorization identification information3. Based on this, the network device determines that the corresponding authorization identification information is authorization identification information 3 . The network device generates authorized login information according to the authorization identification information 3 and the user ID 3, and returns the authorized login information to the first user equipment. In some embodiments, the network device stores the account identification information and password information of the target application. As for the mapping relationship, on the premise that the authorization identification information 3 is in a corresponding relationship with the user ID3, the authorization identification information 3 is also in a corresponding relationship with the password information of the user ID3.
在第一用户设备获取所述触发事件对应的目标应用当前的授权登录信息的前提下,第一用户设备按照预设协议将所述授权登录信息封装成第一数据信息,所述预设协议如图4所示,其中,a中的4个字节存储总长度;b中的4个字节存储账户标识信息;c中的4个字节存授权标识信息的长度x;d中的x个字节存储授权标识信息。例如,40 88888 32adfd95a4b3634b58b0cf3b8c67b18a29,其中,40为第一数据信息所在的数据包的总长度:40个字节,88888为账户标识信息(例如,用户ID),32为授权码长度:32个字节,adfd95a4b3634b58b0cf3b8c67b18a29为授权标识信息。在一些实施例中,第一用户设备提前将授权登录信息将所有字符按位读取得到二进制串再根据预设协议封装成第一数据信息,或者,先将授权登录信息按照预设协议进行封装随后再所有字符按位读取得到二进制串,以生成第一数据信息。On the premise that the first user equipment obtains the current authorized login information of the target application corresponding to the trigger event, the first user equipment encapsulates the authorized login information into first data information according to a preset protocol, such as As shown in Figure 4, the 4 bytes in a store the total length; the 4 bytes in b store the account identification information; the 4 bytes in c store the length x of the authorization identification information; the x number in d Bytes store authorization identification information. For example, 40 88888 32adfd95a4b3634b58b0cf3b8c67b18a29, wherein, 40 is the total length of the data packet where the first data information is located: 40 bytes, 88888 is the account identification information (for example, user ID), 32 is the length of the authorization code: 32 bytes, adfd95a4b3634b58b0cf3b8c67b18a29 is the authorization identification information. In some embodiments, the first user equipment reads all the characters of the authorized login information in advance to obtain a binary string and then encapsulates it into the first data information according to a preset protocol, or first encapsulates the authorized login information according to a preset protocol Then all the characters are read bit by bit to obtain a binary string, so as to generate the first data information.
在步骤S102中,第一用户设备对所述第一数据信息执行第一预设操作以生成第二数据信息。基于该第一预设操作,使得第一数据信息能转变为一音频数据,以便后续可以进行播放。在一些实施例中,所述第一预设操作包括以下至少一项:In step S102, the first user equipment performs a first preset operation on the first data information to generate second data information. Based on the first preset operation, the first data information can be transformed into an audio data, so that it can be played later. In some embodiments, the first preset operation includes at least one of the following:
1)执行AES(Advanced Encryption Standard、高级加密标准)加密操作;1) Perform AES (Advanced Encryption Standard, Advanced Encryption Standard) encryption operations;
2)执行Base64编码操作;2) Execute Base64 encoding operation;
3)执行快速傅里叶变换操作。例如,所述第一用户设备对所述第一数据信息依次执行AES加密操作、Base64编码操作以及快速傅里叶变换操作,其中,前述三个操作的操作顺序固定。在一些实施例中第一用户设备可以用其他加密算法替代AES加密,只需要该加密算法是对称出现的,即加密端和解密端必现保持算法一致,使用同个加密算法,同一个秘钥即可,其中,由于生成的第一数据信息为二进制文件,该AES可对二进制格式的数据信息加密,得到加密内容后,第一用户设备再调用系统底层接口进行一次Base64(基于64个可打印字符来表示二进制数据)编码以得到Base64编码字符串,其中,所述第一用户设备利用所述Base64编码将前述加密内容转换成键盘上可见的字符串,以方便使用,随后第一用户设备调用开源的kissfft库对Base64编码字符串执行快速傅里叶变换以得到第二数据信息,其中,所述快速傅里叶变换用于将Base64编码字符串转换成以音频格式存储的第二数据信息。经过上述第一预设操作后的数据信息能够在后续更加安全地进行传输,从而降低泄露风险。3) Perform a Fast Fourier Transform operation. For example, the first user equipment sequentially performs an AES encryption operation, a Base64 encoding operation, and a fast Fourier transform operation on the first data information, where the operation order of the foregoing three operations is fixed. In some embodiments, the first user equipment can use other encryption algorithms instead of AES encryption, as long as the encryption algorithm is symmetrical, that is, the encryption end and the decryption end must maintain the same algorithm, use the same encryption algorithm, and the same secret key That is, wherein, since the generated first data information is a binary file, the AES can encrypt the data information in the binary format, and after obtaining the encrypted content, the first user device calls the system bottom layer interface to perform a Base64 (based on 64 printable character to represent binary data) encoding to obtain a Base64 encoded character string, wherein the first user equipment uses the Base64 encoding to convert the aforementioned encrypted content into a character string visible on the keyboard to facilitate use, and then the first user equipment invokes The open-source kissfft library performs Fast Fourier Transform on the Base64 encoded string to obtain the second data information, wherein the Fast Fourier Transform is used to convert the Base64 encoded string into the second data information stored in audio format. The data information after the above-mentioned first preset operation can be transmitted more securely in the future, thereby reducing the risk of leakage.
在步骤S103中,第一用户设备在所述第二数据信息中添加校验信息以生成音频数据信息。其中,所述校验信息包括第一用户设备与第二用户设备约定的校验规则,在一些实施例中,在后续第一用户设备播放所述音频数据信息时,该音频数据信息中包括该校验规则,以供接收所述音频数据信息的第二用户设备通过该校验规则校验接收的数据信息。在一些实施例中,在步骤S103中,第一用户设备在所述第二数据信息的内容前添加校验信息以生成音频数据信息。例如,第一用户设备调用开源的libefc库中的qrencoder接口在所述第二数据信息的内容前添加校验信息以得到包括原始音频pcm(Pulse Code Modulation,脉冲编码调制)数据的音频数据信息,其中,所述校验信息包括奇校验信息、偶校验信息等,具体采用何种校验信息,由第一用户设备和后续接收第一用户设备播出的声波的第二用户设备共同约定。In step S103, the first user equipment adds verification information to the second data information to generate audio data information. Wherein, the verification information includes a verification rule agreed between the first user equipment and the second user equipment. In some embodiments, when the first user equipment plays the audio data information, the audio data information includes the A verification rule is used for the second user equipment receiving the audio data information to verify the received data information through the verification rule. In some embodiments, in step S103, the first user equipment adds verification information before the content of the second data information to generate audio data information. For example, the first user equipment calls the qrencoder interface in the open source libefc library to add verification information before the content of the second data information to obtain audio data information including original audio pcm (Pulse Code Modulation, pulse code modulation) data, Wherein, the parity information includes odd parity information, even parity information, etc., and the specific parity information to be used shall be jointly agreed upon by the first user equipment and the second user equipment that subsequently receives the sound wave played by the first user equipment. .
在步骤S104中,第一用户设备通过所述第一声音装置按照预设频率播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用。其中,所述第一声音装置包括但不限于第一用户设备自带的扬声器、第一用户设备所连接的语音播放设备(例如,蓝牙音箱等)。在一些实施例中,在所述目标应用启用声波启用装置时,第一用户设备为该目标应用匹配对应的预设频率(例如,对应该目标应用使用对应的预设协议,在所述第一用户设备采用预设协议对好友请求信息进行封装时,所述预设协议中便已约定后续第一用户设备播放音频数据信息时的预设频率),以便后续第一用户设备以该预设频率发出声波信息时,第二用户设备根据该预设频率的声波信息确定该声波信息所指示的目标应用以及声波信息所指示的用途(例如,包含登录第二用户设备中目标应用的相关信息)。例如,若所述第一用户设备为android系统,第一用户设备调用系统的AudioTrack组件接口以在第一声音装置中播放所述音频数据信息;若所述第一用户设备为IOS系统,第一用户设备调用系统的AudioUnit组件接口以在第一声音装置中播放所述音频数据信息。例如,第一用户设备尽量在靠近一个或者多个第二用户设备的位置处播放所述音频数据信息,该一个或者多个第二用户设备可为安装所述目标应用的不同设备。在一些实施例中,当一个或者多个第二用户设备获取所述音频数据信息,并解析出对应的授权登录信息以请求登录后,在网络设备确认对该一个或者多个第二用户设备中至少一个第二用户设备的允许登录指令时,网络设备向所述第一用户设备发送是否允许该至少一个第二用户设备登录所述目标应用的提示信息(例如,是否允许第二用户设备1同时登录、是否允许第二用户设备2同时登录、是否允许第二用户设备3同时登录),待第一用户设备端的持有用户对所述提示信息进行触发操作后,向所述网络设备发送确认指令,例如,该持有用户只触发了允许第二用户设备1同时登录,网络设备根据该确认指令,向所述第二用户设备1发送允许登录指令,该第二用户设备1中登录所述目标应用。In step S104, the first user equipment plays the audio data information at a preset frequency through the first sound device, so that the corresponding one or more second user equipment can collect the audio data information, and play the audio data information according to the set frequency. Logging the audio data information into the target application. Wherein, the first sound device includes, but is not limited to, a speaker provided by the first user equipment, and a voice playback device (for example, a bluetooth speaker, etc.) connected to the first user equipment. In some embodiments, when the target application activates the sound wave enabling device, the first user equipment matches a corresponding preset frequency for the target application (for example, using a corresponding preset protocol corresponding to the target application, in the first When the user equipment adopts the preset protocol to encapsulate the friend request information, the preset protocol has stipulated the preset frequency when the subsequent first user equipment plays the audio data information), so that the subsequent first user equipment uses the preset frequency When sending out the sound wave information, the second user equipment determines the target application indicated by the sound wave information and the usage indicated by the sound wave information according to the sound wave information of the preset frequency (for example, including information related to logging in the target application in the second user equipment). For example, if the first user equipment is an android system, the first user equipment calls the AudioTrack component interface of the system to play the audio data information in the first sound device; if the first user equipment is an IOS system, the first The user equipment calls the AudioUnit component interface of the system to play the audio data information in the first sound device. For example, the first user equipment tries to play the audio data information at a position close to one or more second user equipments, and the one or more second user equipments may be different equipments on which the target application is installed. In some embodiments, when one or more second user equipment obtains the audio data information and parses out the corresponding authorized login information to request login, after the network device confirms that the one or more second user equipment When at least one second user equipment receives a login permission instruction, the network device sends prompt information to the first user equipment whether to allow the at least one second user equipment to log in to the target application (for example, whether to allow the second user equipment 1 to simultaneously login, whether the second user equipment 2 is allowed to log in at the same time, whether the second user equipment 3 is allowed to log in at the same time), after the user holding the first user equipment end triggers the prompt information, a confirmation command is sent to the network device For example, the holding user only triggers the simultaneous login of the second user equipment 1, and the network device sends the login permission instruction to the second user equipment 1 according to the confirmation instruction, and the second user equipment 1 logs in the target application.
在一些实施例中,所述响应于所述第一用户设备中的触发事件,启用所述触发事件对应的目标应用中的声波启用设置,获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息包括:响应于所述第一用户设备中的触发事件,启用所述触发事件对应的目标应用中的声波启用设置;检测所述第一用户设备中是否安装有所述目标应用的关联应用,若是,获取所述目标应用以及所述关联应用的当前授权登录信息,并将所述目标应用当前的授权登录信息按照预设协议封装成第一数据信息,其中,所述授权登录信息包括所述关联应用的应用标识信息;在步骤S104中,第一用户设备通过所述第一声音装置播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用以及所述关联应用。例如,在第一用户设备启用所述触发事件对应的目标应用中的声波启用设置的前提下,第一用户设备检测所述第一用户设备中是否安装有所述目标应用的关联应用,其中,所述关联应用包括以下至少任一项:In some embodiments, in response to the trigger event in the first user equipment, enable the sound wave enabling setting in the target application corresponding to the trigger event, and obtain the current authorized login information of the target application corresponding to the trigger event , and encapsulating the authorized login information into first data information according to a preset protocol includes: responding to a trigger event in the first user equipment, enabling the sound wave enabling setting in the target application corresponding to the trigger event; detecting the Whether the associated application of the target application is installed in the first user equipment, if so, obtain the current authorized login information of the target application and the associated application, and use the current authorized login information of the target application according to a preset protocol encapsulated into first data information, wherein the authorized login information includes the application identification information of the associated application; in step S104, the first user equipment plays the audio data information through the first sound device for corresponding The one or more second user equipments in the system collect the audio data information, and log in the target application and the associated application according to the audio data information. For example, on the premise that the sound wave activation setting in the target application corresponding to the trigger event is enabled by the first user equipment, the first user equipment detects whether an associated application of the target application is installed in the first user equipment, wherein, The associated application includes at least any of the following:
所述目标应用与所述关联应用同属一家公司;The target application and the associated application belong to the same company;
所述目标应用的当前登录信息(例如,账户标识信息和对应密码)同样可以登录所述关联应用;The current login information (for example, account identification information and corresponding password) of the target application can also log in the associated application;
所述目标应用与所述关联应用互为授权应用关系;The target application and the associated application are mutually authorized application relationships;
所述目标应用为所述关联应用的授权应用,其中,所述授权应用包括可以目标应用发起所述关联应用的登录请求并进行登录。The target application is an authorized application of the associated application, wherein the authorized application may initiate a login request of the associated application by the target application and log in.
在一些实施例中,在存在关联应用的前提下,第一用户设备生成的关于所述目标应用的授权标识信息同样也可作为所述关联应用的授权标识信息,第一用户设备获取包括所述目标应用以及所述关联应用的当前的授权登录信息,其中,该授权登录信息可在后续同时授予第二用户设备中的目标应用以及关联应用进行登录,在此所述授权登录信息包括所述关联应用的应用标识信息以便后续第二用户设备获取所述授权登录信息后根据该关联应用的应用标识信息确定是否安装该关联应用,以便后续将该关联应用进行登录。In some embodiments, on the premise that an associated application exists, the authorization identification information about the target application generated by the first user equipment can also be used as the authorization identification information of the associated application, and the first user equipment obtains the The current authorized login information of the target application and the associated application, wherein the authorized login information can be subsequently granted to the target application and the associated application in the second user equipment to log in, and the authorized login information includes the associated The application identification information of the application allows the second user equipment to determine whether to install the associated application according to the application identification information of the associated application after obtaining the authorized login information, so as to log in the associated application subsequently.
图5示出根据本申请一个实施例的一种用于在用户设备中登录应用的方法,应用于第二用户设备,其中,所述第二用户设备包括第二声音装置,所述方法包括步骤S201、步骤S202、步骤S203和步骤S204。Fig. 5 shows a method for logging into an application in a user equipment according to an embodiment of the present application, which is applied to a second user equipment, wherein the second user equipment includes a second sound device, and the method includes steps S201, step S202, step S203 and step S204.
具体地,在步骤S201中,第二用户设备响应于所述第二用户设备中的触发事件,通过所述第二声音装置获取第一用户设备播放的音频数据信息,其中,所述音频数据信息以预设频率进行播放。例如,第一用户设备、第二用户设备安装有目标应用,所述第一用户设备中的目标应用处于登录状态,第二用户设备包括Android设备、IOS设备、TV设备或者电脑设备,所述第二声音装置包括麦克风、或者与所述第二用户设备配对的声音接收设备(例如,智能音箱)。例如,所述第一用户设备(或者第一声音装置)与所述第二用户设备(或者第二声音装置)的距离小于或者等于预定的声波传输距离,以便第一用户设备播放的声波信息能被第二用户设备接听到。在一些实施例中,在步骤S201中,第二用户设备响应于所述第二用户设备中的触发事件,启用所述触发事件对应的目标应用中的声波接收设置,通过所述第二声音装置获取第一用户设备播放的音频数据信息,其中,所述音频数据信息以预设频率进行播放。响应于所述第二用户设备的持有用户(例如,该用户可以是第一用户设备的持有用户)在目标应用的设置中的触发操作,第二用户设备生成触发事件,所述触发操作包括对所述目标应用中声波接收设置的开启操作,其中,所述声波接收设置用于控制所述第二用户设备接收与所述目标应用相关的声波信息。在开启所述声波接收设置的前提下,为后续解析与所述目标应用相关的声波信息提供基础。在一些实施例中,当所述目标应用的声波接收设置开启时,第二用户设备已设置了关于该目标应用的预设接收频率(即,该第二用户设备仅能接收该预设接收频率的声波数据信息),由于第一用户设备中同样启用该目标应用的声波启用设置,因此,在该第一用户设备播放关于该目标应用的声波时,该第一用户设备已设置了关于该目标应用的预设发送频率(即预设频率),其中,该预设发送频率和该预设接收频率的频率范围相同,例如,7000~8000HZ。因此第一用户设备发出的音频数据信息可以被第二用户设备接收到。Specifically, in step S201, the second user equipment obtains the audio data information played by the first user equipment through the second sound device in response to a trigger event in the second user equipment, wherein the audio data information Play at a preset frequency. For example, the target application is installed on the first user equipment and the second user equipment, the target application in the first user equipment is in a login state, the second user equipment includes Android equipment, IOS equipment, TV equipment or computer equipment, and the first user equipment The second sound device includes a microphone, or a sound receiving device (for example, a smart speaker) paired with the second user device. For example, the distance between the first user equipment (or the first sound device) and the second user equipment (or the second sound device) is less than or equal to a predetermined sound wave transmission distance, so that the sound wave information played by the first user equipment can is heard by the second user equipment. In some embodiments, in step S201, in response to a trigger event in the second user equipment, the second user equipment enables the sound wave receiving setting in the target application corresponding to the trigger event, and through the second sound device Acquire audio data information played by the first user equipment, where the audio data information is played at a preset frequency. In response to a trigger operation of the user holding the second user equipment (for example, the user may be the user holding the first user equipment) in the setting of the target application, the second user equipment generates a trigger event, and the trigger operation The method includes an operation of enabling sound wave receiving settings in the target application, wherein the sound wave receiving settings are used to control the second user equipment to receive sound wave information related to the target application. On the premise that the sound wave receiving setting is turned on, a basis is provided for subsequent analysis of sound wave information related to the target application. In some embodiments, when the sound wave receiving setting of the target application is turned on, the second user equipment has set a preset receiving frequency for the target application (that is, the second user equipment can only receive the preset receiving frequency sound wave data information), since the sound wave enabling setting of the target application is also enabled in the first user equipment, therefore, when the first user equipment plays the sound wave about the target application, the first user equipment has already set the The preset sending frequency of the application (ie, the preset frequency), wherein the preset sending frequency and the preset receiving frequency have the same frequency range, for example, 7000-8000 Hz. Therefore, the audio data information sent by the first user equipment can be received by the second user equipment.
在步骤S202中,第二用户设备对所述音频数据信息执行第二预设操作以生成第一数据信息。其中,所述音频数据信息包括音频数据信息,基于该第二预设操作,可以将包括音频数据信息的目标数据转换成包括二进制数据的第一数据信息。In step S202, the second user equipment performs a second preset operation on the audio data information to generate first data information. Wherein, the audio data information includes audio data information, and based on the second preset operation, target data including audio data information can be converted into first data information including binary data.
在一些实施例中,所述响应于所述第二用户设备中触发事件,启用所述触发事件对应的目标应用中的声波接收设置,通过所述第二声音装置获取第一用户设备播放的音频数据信息,其中,所述音频数据信息以预设频率进行播放,包括:响应于所述第二用户设备中触发事件,启用所述触发事件对应的目标应用中的声波接收设置,通过所述第二声音装置获取第一用户设备播放的音频数据信息,检测所述音频数据信息是否满足预设条件,其中,所述音频数据信息以预设频率进行播放;在步骤S202中,若满足所述预设条件,第二用户设备对所述音频数据信息执行第二预设操作以生成第一数据信息。例如,在第二用户设备接收到所述音频数据信息时,需要先检测所述音频数据信息(即声波数据信息)是否完整合法,例如,该音频数据信息是否满足预设条件,若不满足(例如,在一些实施例中,所述第二用户设备接收到除所述音频数据信息以外的其他用音频数据信息,该其他音频数据信息对于第二用户设备来说是杂音,导致第二用户设备接收到的音频数据信息不完整或者不安全),继续等待第一用户设备再次播放的音频数据信息,随后继续检测所述音频数据信息是否满足预设条件,依次类推,直至检测到第一用户设备播放的音频数据信息满足预设条件。在音频数据信息满足预设条件的前提下,第二用户设备才对所述音频数据信息执行第二预设操作,从而提高解析音频数据信息的效率和准确率。In some embodiments, in response to the trigger event in the second user equipment, enable the sound wave receiving setting in the target application corresponding to the trigger event, and obtain the audio played by the first user equipment through the second sound device The data information, wherein the audio data information is played at a preset frequency, includes: in response to a trigger event in the second user equipment, enabling the sound wave receiving setting in the target application corresponding to the trigger event, through the first The second sound device obtains the audio data information played by the first user equipment, and detects whether the audio data information satisfies a preset condition, wherein the audio data information is played at a preset frequency; in step S202, if the preset condition is met, Assuming a condition, the second user equipment performs a second preset operation on the audio data information to generate the first data information. For example, when the second user equipment receives the audio data information, it needs to first detect whether the audio data information (that is, sound wave data information) is complete and legal, for example, whether the audio data information satisfies a preset condition, if not ( For example, in some embodiments, the second user equipment receives other audio data information except the audio data information, and the other audio data information is noise for the second user equipment, causing the second user equipment to The received audio data information is incomplete or insecure), continue to wait for the audio data information played again by the first user equipment, and then continue to detect whether the audio data information meets the preset conditions, and so on, until the first user equipment is detected The played audio data information satisfies a preset condition. Only on the premise that the audio data information satisfies the preset condition, the second user equipment performs the second preset operation on the audio data information, thereby improving the efficiency and accuracy of parsing the audio data information.
在一些实施例中,所述预设条件包括以下至少任一项:In some embodiments, the preset conditions include at least any of the following:
1)所述音频数据信息的长度与所述预设协议规定的总长度一致;1) The length of the audio data information is consistent with the total length specified in the preset protocol;
2)所述音频数据信息符合预设的校验规则,其中,所述音频数据信息是由所述音频信息中的校验信息进行校验的;例如,第二用户设备在接收到所述音频数据信息后,由于第一用户设备与第二用户设备约定了对音频数据信息的预设的校验规则(例如,奇偶校验规则),该校验规则用于校验音频数据信息所在数据包中具体的音频数据是否未丢失且是完整的,第一用户设备在将所述音频数据信息播出前在所述音频数据信息中添加校验信息,以供第二用户设备接收到该音频数据信息根据所述校验信息(例如,奇偶校验信息)检测所述音频数据信息是否符合预设的校验规则,若符合,第二用户设备确定音频数据信息中具体内容完整,以便后续解析获取授权登录信息,例如,在第一个接收单元数据中,第一位是本单元数据校验码,第二位是下个单元数据的校验码,在第二接收单元数据的第一位会跟上一个单元的第二位进行比较,如果相同,则第二用户设备标识该单元数据正确,依此类推,直到出现不合法的校验位即停止,若整个数据校验完后未出现不合法的校验位则确定当前音频数据信息中具体内容完整,并且第二用户设备需要检测接收到的音频数据信息的预设频率是否与预设协议中的频率一致。在上述校验完成后,第二用户设查看所述音频数据信息所在的数据包中的字节总长度,当该字节总长度与预设协议中设定的总长度一致时,第二用户设备确定该音频数据信息满足预设条件,或者,在上述校验完成后,第二用户设备解析该音频数据信息,具体解析多长的数据,由预设协议里面定义的长度来决定。2) The audio data information conforms to a preset verification rule, wherein the audio data information is verified by the verification information in the audio information; for example, the second user equipment receives the audio After the data information, since the first user equipment and the second user equipment have agreed on a preset check rule (for example, a parity check rule) for the audio data information, the check rule is used to check the data packet where the audio data information is located. Whether the specific audio data in is not lost and is complete, the first user equipment adds verification information to the audio data information before playing the audio data information, so that the second user equipment can receive the audio data The information detects whether the audio data information conforms to a preset verification rule according to the verification information (for example, parity information), and if so, the second user equipment determines that the specific content in the audio data information is complete for subsequent analysis and acquisition Authorized login information, for example, in the data of the first receiving unit, the first digit is the check code of this unit data, the second digit is the check code of the next unit data, and the first digit of the data of the second receiving unit will be Compare it with the second bit of the previous unit. If they are the same, the second user equipment will identify that the unit data is correct, and so on, until an illegal check bit appears, then stop. A legal check digit determines that the specific content of the current audio data information is complete, and the second user equipment needs to detect whether the preset frequency of the received audio data information is consistent with the frequency in the preset protocol. After the above verification is completed, the second user sets to check the total length of bytes in the data packet where the audio data information is located, and when the total length of the bytes is consistent with the total length set in the preset protocol, the second user The device determines that the audio data information satisfies the preset condition, or, after the above verification is completed, the second user equipment parses the audio data information, and the specific length of the data to be parsed is determined by the length defined in the preset protocol.
在一些实施例中,所述第二预设操作包括以下至少一项:In some embodiments, the second preset operation includes at least one of the following:
1)移除校验信息;1) Remove the verification information;
2)执行逆快速傅里叶变换操作;2) perform an inverse fast Fourier transform operation;
3)执行Base64解码操作;3) Perform Base64 decoding operation;
4)执行AES解密操作。例如,所述第二用户设备对所述音频数据信息依次执行移除校验信息、逆快速傅里叶变换操作、Base64解码操作、AES解密操作,其中,前述四个个操作的操作顺序固定。在一些实施例中,一旦检测完所述音频数据信息是否满足预设条件,则对音频数据信息中的校验数据进行移除操作(例如,第二用户设备使用该校验信息检测音频数据信息是否满足预设条件),在一些实施例中第二用户设备可以用其他加密算法替代AES加密,只需要该加密算法是对称出现的,即加密端和解密端必现保持算法一致,使用同个加密算法,同一个秘钥即可。4) Perform AES decryption operation. For example, the second user equipment sequentially performs removing verification information, inverse fast Fourier transform operation, Base64 decoding operation, and AES decryption operation on the audio data information, wherein the operation order of the foregoing four operations is fixed. In some embodiments, once it is detected whether the audio data information satisfies the preset condition, the verification data in the audio data information is removed (for example, the second user equipment uses the verification information to detect the audio data information meet the preset conditions), in some embodiments, the second user equipment can use other encryption algorithms instead of AES encryption, as long as the encryption algorithm is symmetrical, that is, the encryption end and the decryption end must maintain the same algorithm, use the same Encryption algorithm, the same secret key is enough.
由于当前的音频数据信息包括原始音频pcm数据,第二用户设备调用开源的libefc库中的qrencoder接口在所述音频数据信息中移除校验信息,随后第二用户设备调用开源的kissfft库对移除校验信息后的音频数据信息执行逆快速傅里叶变换操作以得到一个数据信息,再调用系统底层接口进行一次Base64(基于64个可打印字符来表示二进制数据)解码以得到AES加密的数据,再对该AES加密的数据执行AES解密操作以得到第一数据信息,其中,该第一数据信息为二进制文件。Since the current audio data information includes original audio pcm data, the second user equipment calls the qrencoder interface in the open-source libefc library to remove the verification information from the audio data information, and then the second user equipment calls the open-source kissfft library for mobile Perform an inverse fast Fourier transform operation on the audio data information after removing the verification information to obtain a data information, and then call the system underlying interface to perform a Base64 (based on 64 printable characters to represent binary data) decoding to obtain AES encrypted data , and then perform an AES decryption operation on the AES-encrypted data to obtain first data information, where the first data information is a binary file.
在步骤S203中,第二用户设备按照预设协议对所述第一数据信息进行解析以获得所述触发事件对应的目标应用的授权登录信息。所述预设协议如图4所示,其中,a中的4个字节存储总长度;b中的4个字节存储账户标识信息;c中的4个字节存授权标识信息的长度x;d中的x个字节存储授权标识信息。例如,所述第二用户设备可先将所述第一数据信息转换为十进制数据形式,在此基础上,根据所述预设协议从中获取账户标识信息以及授权标识信息,其中,所述授权登录信息由该账户标识信息以及授权标识信息组成,所述账户标识信息包括所述第一用户设备中当前登录所述目标应用的账号标识信息,所述授权标识信息包括所述第一用户设备提供的授权标识信息。In step S203, the second user equipment parses the first data information according to a preset protocol to obtain authorized login information of the target application corresponding to the trigger event. The preset protocol is shown in Figure 4, wherein, the 4 bytes in a store the total length; the 4 bytes in b store the account identification information; the 4 bytes in c store the length x of the authorization identification information ; The x bytes in d store authorization identification information. For example, the second user equipment may first convert the first data information into a decimal data form, and on this basis, obtain account identification information and authorization identification information according to the preset protocol, wherein the authorized login The information is composed of the account identification information and authorization identification information, the account identification information includes the account identification information currently logged into the target application in the first user equipment, and the authorization identification information includes the account identification information provided by the first user equipment. Authorization ID information.
在步骤S204中,第二用户设备根据所述授权登录信息对所述目标应用执行登录操作。例如,所述授权登录信息是第一用户设备发送的用于授权第二用户设备登录目标应用的登录凭证,基于该登录凭证,所述目标应用以所述第一用户设备中当前登录所述目标应用的账号标识信息在所述第二用户设备中进行登录。In step S204, the second user equipment performs a login operation on the target application according to the authorized login information. For example, the authorized login information is a login credential sent by the first user equipment to authorize the second user equipment to log in to the target application. The account identification information of the application is logged in the second user equipment.
在一些实施例中,所述授权登录信息包括所述第一用户设备中当前登录所述目标应用的账号标识信息以及所述第一用户设备提供的授权标识信息,在步骤S204中,第二用户设备根据所述授权登录信息向所述目标应用对应的网络设备发送登录请求,其中,所述登录请求包括所述目标应用的标识信息以及所述授权登录信息;接收所述网络设备响应于所述登录请求返回的允许登录指令,并基于所述允许登录指令对所述目标应用执行登录操作,其中,所述目标应用以所述授权登录信息中的账号标识信息在所述第二用户设备中进行登录。例如,第二用户设备基于该授权登录信息向所述目标应用对应的网络设备发送登录请求,其中,所述登录请求包括所述目标应用的标识信息(例如,应用ID1)、所述授权登录信息中的账号标识信息(用户ID1)、以及所述授权登录信息中的授权标识信息(授权标识信息1),网络设备接收该登录请求并响应于该登录请求,根据所述目标应用的标识信息、所述授权登录信息中的账号标识信息、以及所述授权登录信息中的授权标识信息在对应关系中进行查询,例如,所述对应关系包括应用标识信息(例如,应用的名称或者应用的ID)、账号标识信息(用户ID、手机号等)以及授权标识信息(与账号标识信息对应的字符串),例如:In some embodiments, the authorized login information includes the account identification information currently logged into the target application in the first user equipment and the authorization identification information provided by the first user equipment. In step S204, the second user The device sends a login request to a network device corresponding to the target application according to the authorized login information, where the login request includes identification information of the target application and the authorized login information; receiving a response from the network device to the A login permission instruction returned by the login request, and perform a login operation on the target application based on the login permission instruction, wherein the target application uses the account identification information in the authorized login information to perform the login operation on the second user equipment Log in. For example, the second user equipment sends a login request to the network device corresponding to the target application based on the authorized login information, where the login request includes identification information (for example, application ID1) of the target application, the authorized login information The account identification information (user ID1) in the authorization login information, and the authorization identification information (authorization identification information 1) in the authorization login information, the network device receives the login request and responds to the login request, according to the identification information of the target application, The account identification information in the authorized login information and the authorization identification information in the authorized login information are queried in a corresponding relationship, for example, the corresponding relationship includes application identification information (for example, the name of the application or the ID of the application) , account identification information (user ID, mobile phone number, etc.) and authorization identification information (a string corresponding to the account identification information), for example:
应用ID1-用户ID1-授权标识信息1;Application ID1-user ID1-authorization identification information 1;
应用ID2-用户ID2-授权标识信息2;Application ID2-user ID2-authorization identification information 2;
应用ID3-用户ID3-授权标识信息3…应用IDn-用户IDn-授权标识信息n。网络设备确定存在查询结果信息(即查询结果不为空),则确定该第二用户设备获取的授权登录信息为登录目标应用的有效凭证,基于此,向所述第二用户设备返回关于目标应用的允许登录指令,第二用户设备基于该指令对目标应用执行登录操作,其中,所述目标应用当前的登录信息和所述第一用户设备中目标应用的登录信息一致。Application ID3-user ID3-authorization identification information 3... application IDn-user IDn-authorization identification information n. The network device determines that there is query result information (that is, the query result is not empty), then determines that the authorized login information obtained by the second user equipment is a valid credential for logging in to the target application, and based on this, returns information about the target application to the second user equipment. The second user equipment performs a login operation on the target application based on the instruction allowing login, wherein the current login information of the target application is consistent with the login information of the target application in the first user equipment.
图6示出根据本申请一个实施例的一种用于在用户设备中登录应用的方法,应用于网络设备,所述方法包括步骤S301、步骤S302、步骤S303。Fig. 6 shows a method for logging in an application in a user equipment according to an embodiment of the present application, which is applied to a network device, and the method includes step S301, step S302, and step S303.
具体地,在步骤S301中,网络设备接收第二用户设备发送的登录请求,其中,所述登录请求包括目标应用的标识信息以及授权登录信息,所述授权登录信息包括第一用户设备中当前登录所述目标应用的账号标识信息以及所述第一用户设备提供的授权标识信息。例如,在第二用户设备接收到第一用户设备播放的关于目标应用的音频数据信息后,从所述音频数据信息中解析出授权登录信息,第二用户设备根据所述授权登录信息向所述目标应用对应的网络设备发送登录请求,其中,所述登录请求包括所述目标应用的标识信息以及所述授权登录信息,网络设备接收该登录请求。Specifically, in step S301, the network device receives a login request sent by the second user equipment, wherein the login request includes the identification information of the target application and authorized login information, and the authorized login information includes the current login information in the first user equipment. The account identification information of the target application and the authorization identification information provided by the first user equipment. For example, after the second user equipment receives the audio data information about the target application played by the first user equipment, it parses out the authorization login information from the audio data information, and the second user equipment submits the authorization login information to the The network device corresponding to the target application sends a login request, wherein the login request includes identification information of the target application and the authorized login information, and the network device receives the login request.
在步骤S302中,网络设备响应于所述登录请求,根据所述目标应用的标识信息、所述账号标识信息以及所述授权标识信息在所述网络设备中进行查询,其中,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系。例如,所述登录请求包括所述目标应用的标识信息(例如,应用ID1)、所述授权登录信息中的账号标识信息(用户ID1)、以及所述授权登录信息中的授权标识信息(授权标识信息1),网络设备接收该登录请求并响应于该登录请求,根据所述目标应用的标识信息、所述授权登录信息中的账号标识信息、以及所述授权登录信息中的授权标识信息在对应关系中进行查询,例如,所述对应关系包括应用标识信息(例如,应用的名称或者应用的ID)、账号标识信息(用户ID、手机号等)以及授权标识信息(与账号标识信息对应的字符串),例如:In step S302, in response to the login request, the network device performs a query on the network device according to the identification information of the target application, the account identification information, and the authorization identification information, wherein the network device Correspondence between application identification information, account identification information, and authorization identification information is stored. For example, the login request includes identification information of the target application (for example, application ID1), account identification information (user ID1) in the authorized login information, and authorization identification information (authorization ID Information 1), the network device receives the login request and responds to the login request, according to the identification information of the target application, the account identification information in the authorized login information, and the authorization identification information in the authorized login information in the corresponding For example, the corresponding relationship includes application identification information (for example, application name or application ID), account identification information (user ID, mobile phone number, etc.) and authorization identification information (characters corresponding to the account identification information string), for example:
应用ID1-用户ID1-授权标识信息1;Application ID1-user ID1-authorization identification information 1;
应用ID2-用户ID2-授权标识信息2;Application ID2-user ID2-authorization identification information 2;
应用ID3-用户ID3-授权标识信息3…应用IDn-用户IDn-授权标识信息n。Application ID3-user ID3-authorization identification information 3...application IDn-user IDn-authorization identification information n.
在步骤S303中,若查询结果不为空,网络设备向所述第二用户设备返回允许登录指令,其中,所述允许登录指令用于允许所述目标应用在所述第二用户设备中进行登录。网络设备将该目标应用的标识信息(例如,应用ID1)、所述授权登录信息中的账号标识信息(用户ID1)、以及所述授权登录信息中的授权标识信息(授权标识信息1)在对应关系中进行逐条查询,若确定存在查询结果信息(即查询结果不为空),则确定该第二用户设备获取的授权登录信息为登录目标应用的有效凭证,基于此,向所述第二用户设备返回关于目标应用的允许登录指令,第二用户设备基于该指令对目标应用执行登录操作。In step S303, if the query result is not empty, the network device returns a login permission instruction to the second user equipment, wherein the login permission instruction is used to allow the target application to log in to the second user equipment . The network device associates the identification information of the target application (for example, application ID1), the account identification information (user ID1) in the authorization login information, and the authorization identification information (authorization identification information 1) in the authorization login information If it is determined that there is query result information (that is, the query result is not empty), it is determined that the authorized login information obtained by the second user equipment is a valid credential for logging in to the target application. Based on this, the second user The device returns a login permission instruction about the target application, and the second user equipment performs a login operation on the target application based on the instruction.
图7示出根据本申请一个实施例的一种用于在用户设备中登录应用的示意图,设备A发起授权其它设备登录应用的声波,将授权登录信息按照封装协议打包成协议串,将协议串AES加密后base64再加密依次,将base64字符串进行FFT(快速傅里叶变换),将变换后的内容添加声波校验信息并生成声音数据,将声音数据通过声音设备播放,设备B打开程序里的接收声波登录的功能,当设备B接收到特定频率的声波段后,先校验声波,如果校验不通过,继续等待声波;如果声波校验通过,则对声音数据进行逆快速傅里叶变换,并对逆快速傅里叶变换后的数据进行BASE64解码,得到AES加密的数据,对AES加密数据进行解密,在根据封装协议进行解析,以得到授权登录的信息,设备B根据授权登录的信息登录应用。Fig. 7 shows a schematic diagram for logging in an application in a user device according to an embodiment of the present application. Device A initiates a sound wave to authorize other devices to log in to the application, and packages the authorized login information into a protocol string according to the encapsulation protocol, and the protocol string After AES encryption, base64 is encrypted again, and the base64 string is subjected to FFT (Fast Fourier Transform), and the converted content is added with sound wave verification information to generate sound data, and the sound data is played through the sound device, and device B opens the program. The function of receiving sound wave registration, when device B receives the sound wave band of a specific frequency, first check the sound wave, if the verification fails, continue to wait for the sound wave; if the sound wave verification passes, perform inverse fast Fourier transform on the sound data Transform, and perform BASE64 decoding on the data after the inverse fast Fourier transform to obtain the AES encrypted data, decrypt the AES encrypted data, and analyze according to the encapsulation protocol to obtain the authorized login information. Device B logs in according to the authorized information to log in to the application.
图8示出根据本申请一个实施例的一种用于在用户设备中登录应用的第一用户设备,所述第一用户设备包括一一模块101、一二模块102、一三模块103和一四模块104。FIG. 8 shows a first user equipment for logging into an application in a user equipment according to an embodiment of the present application. The first user equipment includes a
具体地,一一模块101,用于响应于所述第一用户设备中的触发事件,获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息。例如,响应于所述第一用户设备的持有用户在目标应用的设置中的触发操作,第一用户设备生成触发事件。Specifically, a
一二模块102,用于对所述第一数据信息执行第一预设操作以生成第二数据信息。基于该第一预设操作,使得第一数据信息能转变为一音频数据,以便后续可以进行播放。A two-module 102, configured to perform a first preset operation on the first data information to generate second data information. Based on the first preset operation, the first data information can be transformed into an audio data, so that it can be played later.
一三模块103,用于在所述第二数据信息中添加校验信息以生成音频数据信息。其中,所述校验信息包括第一用户设备与第二用户设备约定的校验规则,在一些实施例中,在后续第一用户设备播放所述音频数据信息时,该音频数据信息中包括该校验规则,以供接收所述音频数据信息的第二用户设备通过该校验规则校验接收的数据信息。A module 103, configured to add verification information to the second data information to generate audio data information. Wherein, the verification information includes a verification rule agreed between the first user equipment and the second user equipment. In some embodiments, when the first user equipment plays the audio data information, the audio data information includes the A verification rule is used for the second user equipment receiving the audio data information to verify the received data information through the verification rule.
一四模块104,用于通过所述第一声音装置按照预设频率播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用。其中,所述第一声音装置包括但不限于第一用户设备自带的扬声器、第一用户设备所连接的语音播放设备(例如,蓝牙音箱等)。在一些实施例中,在所述目标应用启用声波启用装置时,第一用户设备为该目标应用匹配对应的预设频率,以便后续第一用户设备以该预设频率发出声波信息时,第二用户设备根据该预设频率的声波信息确定该声波信息所指示的目标应用以及声波信息所指示的用途(例如,包含登录第二用户设备中目标应用的相关信息)。例如,若所述第一用户设备为android系统,第一用户设备调用系统的AudioTrack组件接口以在第一声音装置中播放所述音频数据信息;若所述第一用户设备为IOS系统,第一用户设备调用系统的AudioUnit组件接口以在第一声音装置中播放所述音频数据信息。例如,第一用户设备尽量在靠近一个或者多个第二用户设备的位置处播放所述音频数据信息,该一个或者多个第二用户设备可为安装所述目标应用的不同设备。A module 104, configured to play the audio data information at a preset frequency through the first sound device, so that the corresponding one or more second user equipments can collect the audio data information, and The data information is logged into the target application. Wherein, the first sound device includes, but is not limited to, a speaker provided by the first user equipment, and a voice playback device (for example, a bluetooth speaker, etc.) connected to the first user equipment. In some embodiments, when the target application activates the sound wave enabling device, the first user equipment matches the corresponding preset frequency for the target application, so that when the first user equipment subsequently sends out sound wave information at the preset frequency, the second The user device determines the target application indicated by the sound wave information and the usage indicated by the sound wave information according to the sound wave information of the preset frequency (for example, including related information about logging into the target application in the second user device). For example, if the first user equipment is an android system, the first user equipment calls the AudioTrack component interface of the system to play the audio data information in the first sound device; if the first user equipment is an IOS system, the first The user equipment calls the AudioUnit component interface of the system to play the audio data information in the first sound device. For example, the first user equipment tries to play the audio data information at a position close to one or more second user equipments, and the one or more second user equipments may be different equipments on which the target application is installed.
在一些实施例中,一一模块101,用于响应于所述第一用户设备中的触发事件,检测所述触发事件对应的目标应用的登录状态,若所述目标应用的登录状态包括已登录,获取所述目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息。相关操作与图3所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。In some embodiments, a
在一些实施例中,一一模块101,用于响应于所述第一用户设备中的触发事件,启用所述触发事件对应的目标应用中的声波启用设置,获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息。相关操作与图3所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。In some embodiments, a
在一些实施例中,所述响应于所述第一用户设备中的触发事件,启用所述触发事件对应的目标应用中的声波启用设置,获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息包括:响应于所述第一用户设备中的触发事件,启用所述触发事件对应的目标应用中的声波启用设置;检测所述第一用户设备中是否安装有所述目标应用的关联应用,若是,获取所述目标应用以及所述关联应用的当前授权登录信息,并将所述目标应用当前的授权登录信息按照预设协议封装成第一数据信息,其中,所述授权登录信息包括所述关联应用的应用标识信息;一四模块104,用于通过所述第一声音装置播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用以及所述关联应用。相关操作与图3所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。In some embodiments, in response to the trigger event in the first user equipment, enable the sound wave enabling setting in the target application corresponding to the trigger event, and obtain the current authorized login information of the target application corresponding to the trigger event , and encapsulating the authorized login information into first data information according to a preset protocol includes: responding to a trigger event in the first user equipment, enabling the sound wave enabling setting in the target application corresponding to the trigger event; detecting the Whether the associated application of the target application is installed in the first user equipment, if so, obtain the current authorized login information of the target application and the associated application, and use the current authorized login information of the target application according to a preset protocol Encapsulated into the first data information, wherein the authorized login information includes the application identification information of the associated application; a module 104, configured to play the audio data information through the first sound device for a corresponding one Or multiple second user equipments collect the audio data information, and log in the target application and the associated application according to the audio data information. Relevant operations are the same or similar to those of the embodiment shown in FIG. 3 , so details are not repeated here, and are incorporated herein by reference.
在一些实施例中,所述第一用户设备还包括一五模块105(未示出),一五模块105,用于将所述授权登录信息发送至所述目标应用对应的网络设备,其中,所述授权登录信息还包括所述目标应用中已登录的账号标识信息以及授权标识信息,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系。相关操作与图3所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。In some embodiments, the first user equipment further includes a five module 105 (not shown), a five module 105, configured to send the authorized login information to the network device corresponding to the target application, wherein, The authorized login information also includes account identification information and authorization identification information that have been logged in in the target application, and the network device stores the corresponding relationship between the application identification information, account identification information, and authorization identification information. Relevant operations are the same or similar to those of the embodiment shown in FIG. 3 , so details are not repeated here, and are incorporated herein by reference.
在一些实施例中,所述第一用户设备还包括一六模块106(未示出),一六模块106,用于响应于所述触发事件,向所述目标应用对应的网络设备发送信息请求,其中,所述信息请求包括所述目标应用中已登录的账号标识信息;接收所述网络设备基于所述账号标识信息返回的授权登录信息,其中,所述网络设备根据查询到的授权标识信息以及所述账号标识信息生成所述授权登录信息,所述授权标识信息与所述账号标识信息对应的密码信息相匹配。相关操作与图3所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。In some embodiments, the first user equipment further includes a six-module 106 (not shown), a six-module 106, configured to send an information request to the network device corresponding to the target application in response to the trigger event , wherein the information request includes the account identification information that has been logged in in the target application; receiving the authorized login information returned by the network device based on the account identification information, wherein the network device receives the authorized login information based on the queried authorization identification information And the account identification information generates the authorized login information, and the authorization identification information matches the password information corresponding to the account identification information. Relevant operations are the same or similar to those of the embodiment shown in FIG. 3 , so details are not repeated here, and are incorporated herein by reference.
在一些实施例中,所述第一预设操作包括以下至少一项:In some embodiments, the first preset operation includes at least one of the following:
执行AES加密操作;Perform AES encryption operations;
执行Base64编码操作;Perform Base64 encoding operation;
执行快速傅里叶变换操作;相关操作与图3所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。Executing a fast Fourier transform operation; related operations are the same or similar to those in the embodiment shown in FIG. 3 , so they will not be described in detail here, and are hereby incorporated by reference.
在一些实施例中,一三模块103,用于在所述第二数据信息的内容前添加校验信息以生成音频数据信息。相关操作与图3所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。In some embodiments, a module 103 is configured to add verification information before content of the second data information to generate audio data information. Relevant operations are the same or similar to those of the embodiment shown in FIG. 3 , so details are not repeated here, and are incorporated herein by reference.
图9示出根据本申请一个实施例的一种用于在用户设备中登录应用的第二用户设备,其中,所述第二用户设备包括第二声音装置,所述第二用户设备包括二一模块201、二二模块202、二三模块203和二四模块204。Fig. 9 shows a second user equipment for logging into an application in the user equipment according to an embodiment of the present application, wherein the second user equipment includes a second sound device, and the second user equipment includes two Module 201, module 22 202, module 23 203 and module 24 204.
具体地,二一模块201,用于响应于所述第二用户设备中的触发事件,通过所述第二声音装置获取第一用户设备播放的音频数据信息,其中,所述音频数据信息以预设频率进行播放。例如,第一用户设备、第二用户设备安装有目标应用,所述第一用户设备中的目标应用处于登录状态,第二用户设备包括Android设备、IOS设备、TV设备或者电脑设备,所述第二声音装置包括麦克风、或者与所述第二用户设备配对的声音接收设备(例如,智能音箱)。例如,所述第一用户设备(或者第一声音装置)与所述第二用户设备(或者第二声音装置)的距离小于或者等于预定的声波传输距离,以便第一用户设备播放的声波信息能被第二用户设备接听到。Specifically, the two-one module 201 is configured to, in response to a trigger event in the second user equipment, acquire the audio data information played by the first user equipment through the second sound device, wherein the audio data information is in a preset Set the frequency to play. For example, the target application is installed on the first user equipment and the second user equipment, the target application in the first user equipment is in a login state, the second user equipment includes Android equipment, IOS equipment, TV equipment or computer equipment, and the first user equipment The second sound device includes a microphone, or a sound receiving device (for example, a smart speaker) paired with the second user device. For example, the distance between the first user equipment (or the first sound device) and the second user equipment (or the second sound device) is less than or equal to a predetermined sound wave transmission distance, so that the sound wave information played by the first user equipment can is heard by the second user equipment.
二二模块202,用于对所述音频数据信息执行第二预设操作以生成第一数据信息。其中,所述音频数据信息包括音频数据信息,基于该第二预设操作,可以将包括音频数据信息的目标数据转换成包括二进制数据的第一数据信息。The two-two module 202 is configured to perform a second preset operation on the audio data information to generate first data information. Wherein, the audio data information includes audio data information, and based on the second preset operation, target data including audio data information can be converted into first data information including binary data.
二三模块203,用于按照预设协议对所述第一数据信息进行解析以获得所述触发事件对应的目标应用的授权登录信息。所述预设协议如图4所示,其中,a中的4个字节存储总长度;b中的4个字节存储账户标识信息;c中的4个字节存授权标识信息的长度x;d中的x个字节存储授权标识信息。例如,所述第二用户设备可先将所述第一数据信息转换为十进制数据形式,在此基础上,根据所述预设协议从中获取账户标识信息以及授权标识信息,其中,所述授权登录信息由该账户标识信息以及授权标识信息组成,所述账户标识信息包括所述第一用户设备中当前登录所述目标应用的账号标识信息,所述授权标识信息包括所述第一用户设备提供的授权标识信息。The second and third modules 203 are configured to analyze the first data information according to a preset protocol to obtain authorized login information of the target application corresponding to the trigger event. The preset protocol is shown in Figure 4, wherein, the 4 bytes in a store the total length; the 4 bytes in b store the account identification information; the 4 bytes in c store the length x of the authorization identification information ; The x bytes in d store authorization identification information. For example, the second user equipment may first convert the first data information into a decimal data form, and on this basis, obtain account identification information and authorization identification information according to the preset protocol, wherein the authorized login The information is composed of the account identification information and authorization identification information, the account identification information includes the account identification information currently logged into the target application in the first user equipment, and the authorization identification information includes the account identification information provided by the first user equipment. Authorization ID information.
二四模块204,用于根据所述授权登录信息对所述目标应用执行登录操作。例如,所述授权登录信息是第一用户设备发送的用于授权第二用户设备登录目标应用的登录凭证,基于该登录凭证,所述目标应用以所述第一用户设备中当前登录所述目标应用的账号标识信息在所述第二用户设备中进行登录。24 module 204, configured to perform a login operation on the target application according to the authorized login information. For example, the authorized login information is a login credential sent by the first user equipment to authorize the second user equipment to log in to the target application. The account identification information of the application is logged in the second user equipment.
在一些实施例中,二一模块201,用于响应于所述第二用户设备中的触发事件,启用所述触发事件对应的目标应用中的声波接收设置,通过所述第二声音装置获取第一用户设备播放的音频数据信息,其中,所述音频数据信息以预设频率进行播放。相关操作与图5所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。In some embodiments, the two-one module 201 is configured to, in response to a trigger event in the second user equipment, enable the sound wave receiving setting in the target application corresponding to the trigger event, and acquire the first sound wave through the second sound device. An audio data information played by the user equipment, wherein the audio data information is played at a preset frequency. Relevant operations are the same or similar to those of the embodiment shown in FIG. 5 , so details are not repeated here, and are incorporated herein by reference.
在一些实施例中所述响应于所述第二用户设备中触发事件,启用所述触发事件对应的目标应用中的声波接收设置,通过所述第二声音装置获取第一用户设备播放的音频数据信息,其中,所述音频数据信息以预设频率进行播放,包括:In some embodiments, in response to the trigger event in the second user equipment, enable the sound wave receiving setting in the target application corresponding to the trigger event, and obtain the audio data played by the first user equipment through the second sound device Information, wherein the audio data information is played at a preset frequency, including:
响应于所述第二用户设备中触发事件,启用所述触发事件对应的目标应用中的声波接收设置,通过所述第二声音装置获取第一用户设备播放的音频数据信息,检测所述音频数据信息是否满足预设条件,其中,所述音频数据信息以预设频率进行播放;二二模块202,用于若满足所述预设条件,对所述音频数据信息执行第二预设操作以生成第一数据信息。相关操作与图5所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。In response to the trigger event in the second user equipment, enable the sound wave receiving setting in the target application corresponding to the trigger event, acquire the audio data information played by the first user equipment through the second sound device, and detect the audio data Whether the information satisfies a preset condition, wherein the audio data information is played at a preset frequency; the two-two module 202 is configured to perform a second preset operation on the audio data information to generate first data information. Relevant operations are the same or similar to those of the embodiment shown in FIG. 5 , so details are not repeated here, and are incorporated herein by reference.
在一些实施例中所述预设条件包括以下至少任一项:In some embodiments, the preset conditions include at least any of the following:
所述音频数据信息的长度与所述预设协议规定的总长度一致;The length of the audio data information is consistent with the total length specified in the preset protocol;
所述音频数据信息符合预设的校验规则,其中,所述音频数据信息是由所述音频信息中的校验信息进行校验的;相关操作与图5所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。The audio data information conforms to the preset verification rules, wherein the audio data information is verified by the verification information in the audio information; the related operations are the same as or similar to the embodiment shown in Figure 5, so No more details are included here by reference.
在一些实施例中,所述第二预设操作包括以下至少一项:In some embodiments, the second preset operation includes at least one of the following:
移除校验信息;Remove verification information;
执行逆快速傅里叶变换操作;Perform an inverse fast Fourier transform operation;
执行Base64解码操作。Perform Base64 decoding operation.
执行AES解密操作;相关操作与图5所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。Executing an AES decryption operation; related operations are the same as or similar to those in the embodiment shown in FIG. 5 , so details are not repeated here, and are hereby incorporated by reference.
在一些实施例中,所述授权登录信息包括所述第一用户设备中当前登录所述目标应用的账号标识信息以及所述第一用户设备提供的授权标识信息,In some embodiments, the authorized login information includes account identification information currently logged into the target application in the first user equipment and authorization identification information provided by the first user equipment,
二四模块204,用于根据所述授权登录信息向所述目标应用对应的网络设备发送登录请求,其中,所述登录请求包括所述目标应用的标识信息以及所述授权登录信息;24 module 204, configured to send a login request to a network device corresponding to the target application according to the authorized login information, wherein the login request includes identification information of the target application and the authorized login information;
接收所述网络设备响应于所述登录请求返回的允许登录指令,并基于所述允许登录指令对所述目标应用执行登录操作,其中,所述目标应用以所述授权登录信息中的账号标识信息在所述第二用户设备中进行登录。相关操作与图5所示实施例相同或相近,故不再赘述,在此以引用方式包含于此。receiving a login permission instruction returned by the network device in response to the login request, and performing a login operation on the target application based on the login permission instruction, wherein the target application uses the account identification information in the authorized login information Log in in the second user equipment. Relevant operations are the same or similar to those of the embodiment shown in FIG. 5 , so details are not repeated here, and are incorporated herein by reference.
图10示出根据本申请一个实施例的一种用于在用户设备中登录应用的网络设备,所述网络设备包括三一模块301、三二模块302、三三模块303。FIG. 10 shows a network device for logging in an application in a user equipment according to an embodiment of the present application, and the network device includes a three-one module 301 , a three-two module 302 and a three-three module 303 .
具体地,三一模块301,用于接收第二用户设备发送的登录请求,其中,所述登录请求包括目标应用的标识信息以及授权登录信息,所述授权登录信息包括第一用户设备中当前登录所述目标应用的账号标识信息以及所述第一用户设备提供的授权标识信息。例如,在第二用户设备接收到第一用户设备播放的关于目标应用的音频数据信息后,从所述音频数据信息中解析出授权登录信息,第二用户设备根据所述授权登录信息向所述目标应用对应的网络设备发送登录请求,其中,所述登录请求包括所述目标应用的标识信息以及所述授权登录信息,网络设备接收该登录请求。Specifically, the Sany module 301 is configured to receive a login request sent by the second user equipment, wherein the login request includes the identification information of the target application and authorized login information, and the authorized login information includes the current login information in the first user equipment. The account identification information of the target application and the authorization identification information provided by the first user equipment. For example, after the second user equipment receives the audio data information about the target application played by the first user equipment, it parses out the authorization login information from the audio data information, and the second user equipment submits the authorization login information to the The network device corresponding to the target application sends a login request, wherein the login request includes identification information of the target application and the authorized login information, and the network device receives the login request.
三二模块302,用于响应于所述登录请求,根据所述目标应用的标识信息、所述账号标识信息以及所述授权标识信息在所述网络设备中进行查询,其中,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系。例如,所述登录请求包括所述目标应用的标识信息(例如,应用ID1)、所述授权登录信息中的账号标识信息(用户ID1)、以及所述授权登录信息中的授权标识信息(授权标识信息1),网络设备接收该登录请求并响应于该登录请求,根据所述目标应用的标识信息、所述授权登录信息中的账号标识信息、以及所述授权登录信息中的授权标识信息在对应关系中进行查询,例如,所述对应关系包括应用标识信息(例如,应用的名称或者应用的ID)、账号标识信息(用户ID、手机号等)以及授权标识信息(与账号标识信息对应的字符串),例如:The three-two module 302 is configured to, in response to the login request, perform a query in the network device according to the identification information of the target application, the account identification information, and the authorization identification information, wherein, in the network device Correspondence between application identification information, account identification information, and authorization identification information is stored. For example, the login request includes identification information of the target application (for example, application ID1), account identification information (user ID1) in the authorized login information, and authorization identification information (authorization ID Information 1), the network device receives the login request and responds to the login request, according to the identification information of the target application, the account identification information in the authorized login information, and the authorization identification information in the authorized login information in the corresponding For example, the corresponding relationship includes application identification information (for example, application name or application ID), account identification information (user ID, mobile phone number, etc.) and authorization identification information (characters corresponding to the account identification information string), for example:
应用ID1-用户ID1-授权标识信息1;Application ID1-user ID1-authorization identification information 1;
应用ID2-用户ID2-授权标识信息2;Application ID2-user ID2-authorization identification information 2;
应用ID3-用户ID3-授权标识信息3…应用IDn-用户IDn-授权标识信息n。Application ID3-user ID3-authorization identification information 3... application IDn-user IDn-authorization identification information n.
三三模块303若查询结果不为空,向所述第二用户设备返回允许登录指令,其中,所述允许登录指令用于允许所述目标应用在所述第二用户设备中进行登录。网络设备将该目标应用的标识信息(例如,应用ID1)、所述授权登录信息中的账号标识信息(用户ID1)、以及所述授权登录信息中的授权标识信息(授权标识信息1)在对应关系中进行逐条查询,若确定存在查询结果信息(即查询结果不为空),则确定该第二用户设备获取的授权登录信息为登录目标应用的有效凭证,基于此,向所述第二用户设备返回关于目标应用的允许登录指令,第二用户设备基于该指令对目标应用执行登录操作。If the query result is not empty, the 33 module 303 returns a login permission instruction to the second user equipment, wherein the login permission instruction is used to allow the target application to log in to the second user equipment. The network device associates the identification information of the target application (for example, application ID1), the account identification information (user ID1) in the authorization login information, and the authorization identification information (authorization identification information 1) in the authorization login information If it is determined that there is query result information (that is, the query result is not empty), it is determined that the authorized login information obtained by the second user equipment is a valid credential for logging in to the target application. Based on this, the second user The device returns a login permission instruction about the target application, and the second user equipment performs a login operation on the target application based on the instruction.
图11示出根据本申请一个实施例的一种在用户设备中登录应用的系统设备,其中,第一用户设备包括第一声音装置,第二用户设备包括第二声音装置,该系统包括:Fig. 11 shows a system device for logging into an application in a user device according to an embodiment of the present application, wherein the first user device includes a first sound device, and the second user device includes a second sound device, and the system includes:
响应于所述第一用户设备中的触发事件,所述第一用户设备获取所述触发事件对应的目标应用当前的授权登录信息,并将所述授权登录信息按照预设协议封装成第一数据信息,并对所述第一数据信息执行第一预设操作以生成第二数据信息,并在所述第二数据信息中添加校验信息以生成音频数据信息;并通过所述第一声音装置按照预设频率播放所述音频数据信息,以供对应的一个或者多个第二用户设备采集到所述音频数据信息,并根据所述音频数据信息登录所述目标应用;In response to a trigger event in the first user equipment, the first user equipment acquires current authorization login information of a target application corresponding to the trigger event, and encapsulates the authorization login information into first data according to a preset protocol information, and perform a first preset operation on the first data information to generate second data information, and add verification information to the second data information to generate audio data information; and through the first sound device Playing the audio data information according to a preset frequency, so that the corresponding one or more second user equipments can collect the audio data information, and log in the target application according to the audio data information;
响应于所述第二用户设备中的触发事件,所述第二用户设备通过所述第二声音装置获取所述音频数据信息,并对所述音频数据信息执行第二预设操作以生成所述第一数据信息,并按照预设协议对所述第一数据信息进行解析以获得所述触发事件对应的目标应用的授权登录信息;In response to a trigger event in the second user equipment, the second user equipment acquires the audio data information through the second sound device, and performs a second preset operation on the audio data information to generate the First data information, and analyzing the first data information according to a preset protocol to obtain authorized login information of the target application corresponding to the trigger event;
所述第二用户设备根据所述授权登录信息向所述目标应用对应的网络设备发送登录请求,其中,所述登录请求包括所述目标应用的标识信息以及所述授权登录信息,所述授权登录信息包括所述第一用户设备中当前登录所述目标应用的账号标识信息以及所述第一用户设备提供的授权标识信息;The second user equipment sends a login request to a network device corresponding to the target application according to the authorized login information, where the login request includes identification information of the target application and the authorized login information, and the authorized login The information includes account identification information currently logged into the target application in the first user equipment and authorization identification information provided by the first user equipment;
所述网络设备接收所述登录请求,并响应于所述登录请求,根据所述目标应用的标识信息、所述账号标识信息以及所述授权标识信息在所述网络设备中进行查询,其中,所述网络设备中存储有应用标识信息、账号标识信息以及授权标识信息的对应关系,并若查询结果不为空,所述网络设备向所述第二用户设备返回允许登录指令;The network device receives the login request, and in response to the login request, performs a query on the network device according to the identification information of the target application, the account identification information, and the authorization identification information, wherein the The corresponding relationship between application identification information, account identification information and authorization identification information is stored in the network device, and if the query result is not empty, the network device returns a login permission instruction to the second user device;
所述第二用户设备接收所述允许登录指令,并基于所述允许登录指令对所述目标应用执行登录操作,其中,所述目标应用以所述授权登录信息中的账号标识信息在所述第二用户设备中进行登录。The second user equipment receives the login permission instruction, and performs a login operation on the target application based on the login permission instruction, wherein the target application uses the account identification information in the authorized login information in the second Log in to the user's device.
本申请还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机代码,当所述计算机代码被执行时,如前任一项所述的方法被执行。The present application also provides a computer-readable storage medium, the computer-readable storage medium stores computer codes, and when the computer codes are executed, the method described in any one of the preceding items is executed.
本申请还提供了一种计算机程序产品,当所述计算机程序产品被计算机设备执行时,如前任一项所述的方法被执行。The present application also provides a computer program product, when the computer program product is executed by a computer device, the method described in any one of the preceding items is executed.
本申请还提供了一种计算机设备,所述计算机设备包括:The present application also provides a kind of computer equipment, and described computer equipment comprises:
一个或多个处理器;one or more processors;
存储器,用于存储一个或多个计算机程序;memory for storing one or more computer programs;
当所述一个或多个计算机程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如前任一项所述的方法。When the one or more computer programs are executed by the one or more processors, the one or more processors are made to implement the method as described in any one of the preceding items.
图12示出了可被用于实施本申请中所述的各个实施例的示例性系统;FIG. 12 illustrates an exemplary system that may be used to implement various embodiments described in this application;
如图12所示在一些实施例中,系统300能够作为各所述实施例中的任意一个设备。在一些实施例中,系统300可包括具有指令的一个或多个计算机可读介质(例如,系统存储器或NVM/存储设备320)以及与该一个或多个计算机可读介质耦合并被配置为执行指令以实现模块从而执行本申请中所述的动作的一个或多个处理器(例如,(一个或多个)处理器305)。As shown in FIG. 12 , in some embodiments, the
对于一个实施例,系统控制模块310可包括任意适当的接口控制器,以向(一个或多个)处理器305中的至少一个和/或与系统控制模块310通信的任意适当的设备或组件提供任意适当的接口。For one embodiment,
系统控制模块310可包括存储器控制器模块330,以向系统存储器315提供接口。存储器控制器模块330可以是硬件模块、软件模块和/或固件模块。The
系统存储器315可被用于例如为系统300加载和存储数据和/或指令。对于一个实施例,系统存储器315可包括任意适当的易失性存储器,例如,适当的DRAM。在一些实施例中,系统存储器315可包括双倍数据速率类型四同步动态随机存取存储器(DDR4SDRAM)。
对于一个实施例,系统控制模块310可包括一个或多个输入/输出(I/O)控制器,以向NVM/存储设备320及(一个或多个)通信接口325提供接口。For one embodiment,
例如,NVM/存储设备320可被用于存储数据和/或指令。NVM/存储设备320可包括任意适当的非易失性存储器(例如,闪存)和/或可包括任意适当的(一个或多个)非易失性存储设备(例如,一个或多个硬盘驱动器(HDD)、一个或多个光盘(CD)驱动器和/或一个或多个数字通用光盘(DVD)驱动器)。For example, NVM/
NVM/存储设备320可包括在物理上作为系统300被安装在其上的设备的一部分的存储资源,或者其可被该设备访问而不必作为该设备的一部分。例如,NVM/存储设备320可通过网络经由(一个或多个)通信接口325进行访问。NVM/
(一个或多个)通信接口325可为系统300提供接口以通过一个或多个网络和/或与任意其他适当的设备通信。系统300可根据一个或多个无线网络标准和/或协议中的任意标准和/或协议来与无线网络的一个或多个组件进行无线通信。Communication interface(s) 325 may provide an interface for
对于一个实施例,(一个或多个)处理器305中的至少一个可与系统控制模块310的一个或多个控制器(例如,存储器控制器模块330)的逻辑封装在一起。对于一个实施例,(一个或多个)处理器305中的至少一个可与系统控制模块310的一个或多个控制器的逻辑封装在一起以形成系统级封装(SiP)。对于一个实施例,(一个或多个)处理器305中的至少一个可与系统控制模块310的一个或多个控制器的逻辑集成在同一模具上。对于一个实施例,(一个或多个)处理器305中的至少一个可与系统控制模块310的一个或多个控制器的逻辑集成在同一模具上以形成片上系统(SoC)。For one embodiment, at least one of processor(s) 305 may be packaged with logic of one or more controllers of system control module 310 (eg, memory controller module 330 ). For one embodiment, at least one of the processor(s) 305 may be packaged with the logic of one or more controllers of the
在各个实施例中,系统300可以但不限于是:服务器、工作站、台式计算设备或移动计算设备(例如,膝上型计算设备、手持计算设备、平板电脑、上网本等)。在各个实施例中,系统300可具有更多或更少的组件和/或不同的架构。例如,在一些实施例中,系统300包括一个或多个摄像机、键盘、液晶显示器(LCD)屏幕(包括触屏显示器)、非易失性存储器端口、多个天线、图形芯片、专用集成电路(ASIC)和扬声器。In various embodiments,
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。It should be noted that the present application can be implemented in software and/or a combination of software and hardware, for example, it can be implemented by using an application specific integrated circuit (ASIC), a general-purpose computer or any other similar hardware devices. In one embodiment, the software program of the present application can be executed by a processor to realize the steps or functions described above. Likewise, the software program (including associated data structures) of the present application can be stored in a computer-readable recording medium such as RAM memory, magnetic or optical drive or floppy disk and the like. In addition, some steps or functions of the present application may be implemented by hardware, for example, as a circuit that cooperates with a processor to execute each step or function.
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。In addition, a part of the present application can be applied as a computer program product, such as a computer program instruction. When it is executed by a computer, the method and/or technical solution according to the present application can be invoked or provided through the operation of the computer. Those skilled in the art should understand that computer program instructions exist in computer-readable media in forms including but not limited to source files, executable files, installation package files, etc. Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding post-installation program program. Here, a computer readable medium may be any available computer readable storage medium or communication medium that can be accessed by a computer.
通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。Communication media includes the media whereby communication signals embodying, for example, computer readable instructions, data structures, program modules or other data are transmitted from one system to another. Communication media can include guided transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (unguided transmission) media capable of propagating waves of energy, such as acoustic, electromagnetic, RF, microwave, and infrared . Computer readable instructions, data structures, program modules or other data may be embodied, for example, as a modulated data signal in a wireless medium such as a carrier wave or similar mechanism such as embodied as part of spread spectrum technology. The term "modulated data signal" means a signal that has one or more of its characteristics changed or set in such a manner as to encode information in the signal. Modulation can be analog, digital or mixed modulation techniques.
作为示例而非限制,计算机可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM,SRAM);以及非易失性存储器,诸如闪存、各种只读存储器(ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM);以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, volatile, volatile, or Removable and non-removable media. For example, computer-readable storage media include, but are not limited to, volatile memories such as random access memories (RAM, DRAM, SRAM); and nonvolatile memories such as flash memory, various read-only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other media known now or developed in the future capable of storing data for computer systems Computer readable information/data used.
在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。Here, an embodiment according to the present application includes an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein when the computer program instructions are executed by the processor, triggering The operation of the device is based on the foregoing methods and/or technical solutions according to multiple embodiments of the present application.
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。It will be apparent to those skilled in the art that the present application is not limited to the details of the exemplary embodiments described above, but that the present application can be implemented in other specific forms without departing from the spirit or essential characteristics of the present application. Therefore, the embodiments should be regarded as exemplary and not restrictive in all points of view, and the scope of the application is defined by the appended claims rather than the foregoing description, and it is intended that the scope of the present application be defined by the appended claims rather than by the foregoing description. All changes within the meaning and range of equivalents of the elements are embraced in this application. Any reference sign in a claim should not be construed as limiting the claim concerned. In addition, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means stated in the device claims may also be realized by one unit or device through software or hardware. The words first, second, etc. are used to denote names and do not imply any particular order.
Claims (19)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110224570.9A CN113010858B (en) | 2021-03-01 | 2021-03-01 | A method and device for logging in an application in user equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110224570.9A CN113010858B (en) | 2021-03-01 | 2021-03-01 | A method and device for logging in an application in user equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113010858A CN113010858A (en) | 2021-06-22 |
CN113010858B true CN113010858B (en) | 2023-01-31 |
Family
ID=76386879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110224570.9A Active CN113010858B (en) | 2021-03-01 | 2021-03-01 | A method and device for logging in an application in user equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113010858B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115174161B (en) * | 2022-06-15 | 2023-06-13 | 平安银行股份有限公司 | Account login method and device, electronic equipment and storage medium |
CN116599764B (en) * | 2023-06-28 | 2023-09-19 | 央广云听文化传媒有限公司 | Application login method, application login device, storage medium and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105099985A (en) * | 2014-04-21 | 2015-11-25 | 百度在线网络技术(北京)有限公司 | Login method and device of multiple applications |
CN106909827A (en) * | 2017-03-02 | 2017-06-30 | 北京小米移动软件有限公司 | Using account management method and device |
CN106921650A (en) * | 2016-12-21 | 2017-07-04 | 阿里巴巴集团控股有限公司 | The login method of striding equipment, system and device |
CN109587162A (en) * | 2018-12-26 | 2019-04-05 | 闻泰通讯股份有限公司 | Login validation method, device, terminal, cipher server and storage medium |
CN111597540A (en) * | 2020-04-28 | 2020-08-28 | 维沃移动通信有限公司 | Login method of application program, electronic device and readable storage medium |
CN111741033A (en) * | 2020-08-27 | 2020-10-02 | 腾讯科技(深圳)有限公司 | Method, device, equipment and medium for account number cross-equipment login management |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882868A (en) * | 2012-09-21 | 2013-01-16 | 北京十分科技有限公司 | Audio-based user login method and device |
CN104735021B (en) * | 2013-12-18 | 2018-12-11 | 腾讯科技(深圳)有限公司 | A kind of account number login method, device and system |
CN103873593B (en) * | 2014-04-02 | 2018-04-20 | 北京奇艺世纪科技有限公司 | A kind of Website logging method and system |
CN107483503A (en) * | 2017-09-28 | 2017-12-15 | 深圳市口袋网络科技有限公司 | A kind of application program login method, apparatus and system |
-
2021
- 2021-03-01 CN CN202110224570.9A patent/CN113010858B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105099985A (en) * | 2014-04-21 | 2015-11-25 | 百度在线网络技术(北京)有限公司 | Login method and device of multiple applications |
CN106921650A (en) * | 2016-12-21 | 2017-07-04 | 阿里巴巴集团控股有限公司 | The login method of striding equipment, system and device |
CN106909827A (en) * | 2017-03-02 | 2017-06-30 | 北京小米移动软件有限公司 | Using account management method and device |
CN109587162A (en) * | 2018-12-26 | 2019-04-05 | 闻泰通讯股份有限公司 | Login validation method, device, terminal, cipher server and storage medium |
CN111597540A (en) * | 2020-04-28 | 2020-08-28 | 维沃移动通信有限公司 | Login method of application program, electronic device and readable storage medium |
CN111741033A (en) * | 2020-08-27 | 2020-10-02 | 腾讯科技(深圳)有限公司 | Method, device, equipment and medium for account number cross-equipment login management |
Also Published As
Publication number | Publication date |
---|---|
CN113010858A (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107743133B (en) | Mobile terminal and access control method and system based on trusted security environment | |
US11336635B2 (en) | Systems and methods for authenticating device through IoT cloud using hardware security module | |
CN103685267B (en) | Data access method and device | |
WO2018205997A1 (en) | Method and device for connecting wireless access point | |
CN113557703B (en) | Authentication method and device of network camera | |
TW202101165A (en) | Secure smart unlocking | |
CN107104484B (en) | A method and device for charging user equipment through a charging device | |
CN113010858B (en) | A method and device for logging in an application in user equipment | |
CN110113747B (en) | A method and device for connecting a hidden wireless access point | |
WO2019184740A1 (en) | Data encryption, decryption method and device | |
US20210105627A1 (en) | Method and a device for authorizing a user equipment to connect to a wireless access point | |
CN110245518A (en) | A kind of date storage method, device and equipment | |
CN112073578B (en) | A method and device for using or restricting application functions in social applications | |
CN107231019A (en) | A kind of method and apparatus charged by charging device to user equipment | |
CN107396364B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
TW201516910A (en) | Method and system for authenticating service | |
US20230092264A1 (en) | Authorization verification system, method and apparatus for application, and storage medium | |
WO2019037603A1 (en) | Method and device for carrying out wireless connection pre-authorization for user equipment | |
CN112968899B (en) | A method and device for encrypted communication | |
CN113099025B (en) | Method and device for adding friends in social application | |
KR20210060282A (en) | SYSTEMS AND METHODS FOR AUTHENTICATING IoT DEVICE THROUGH CLOUD USING HARDWARE SECURITY MODULE | |
CN111182050B (en) | Method and equipment for realizing communication between application and server | |
CN114513370B (en) | Universal identification data conversion method and device, storage medium, electronic device | |
CN114817957B (en) | Encrypted partition access control method, system and computing device based on domain management platform | |
WO2022028391A1 (en) | Data cloud service method and communication apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: Room 80536, Shanghai Patentee after: Shanghai Zongzhang Technology Group Co.,Ltd. Country or region after: China Address before: Room 80536, Shanghai Patentee before: SHANGHAI ZHANGMEN SCIENCE AND TECHNOLOGY Co.,Ltd. Country or region before: China |