Movatterモバイル変換


[0]ホーム

URL:


CN105429943B - Information processing method and terminal thereof - Google Patents

Information processing method and terminal thereof
Download PDF

Info

Publication number
CN105429943B
CN105429943BCN201510714273.7ACN201510714273ACN105429943BCN 105429943 BCN105429943 BCN 105429943BCN 201510714273 ACN201510714273 ACN 201510714273ACN 105429943 BCN105429943 BCN 105429943B
Authority
CN
China
Prior art keywords
terminal
information
account
application
account information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510714273.7A
Other languages
Chinese (zh)
Other versions
CN105429943A (en
Inventor
彭丹丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co LtdfiledCriticalTencent Technology Shenzhen Co Ltd
Priority to CN201510714273.7ApriorityCriticalpatent/CN105429943B/en
Publication of CN105429943ApublicationCriticalpatent/CN105429943A/en
Application grantedgrantedCritical
Publication of CN105429943BpublicationCriticalpatent/CN105429943B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The embodiment of the invention discloses an information processing method and a terminal thereof; wherein the method comprises the following steps: when a first terminal runs a first application, login request information sent by a second terminal is obtained; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application; detecting an account protection mode corresponding to the first account information; generating an account protection strategy corresponding to the account protection mode according to the account protection mode; and processing the login request information based on the account protection strategy to determine whether the second terminal is allowed to login the second application with the first account information.

Description

Information processing method and terminal thereof
Technical Field
The present invention relates to information processing technologies, and in particular, to an information processing method and a terminal thereof.
Background
With the richness and perfection of internet products and internet platforms, social accounts are increasingly common as identity marks on networks, namely, accounts are common. By account number public, it is meant that the account number owner shares the use of the account number with others during certain periods of time. Such a demand is common among game players, for example, game players borrow game accounts of different levels or different roles to enrich game experience and accelerate upgrading. Meanwhile, the common account is also commonly shared by members, such as network disk resource sharing. However, an account number public mode has an obvious security problem, specifically, under various applications, account number login requires a user to input an account number and a password, and at this time, account number sharing inevitably causes password leakage, so that potential safety hazards are brought to users sharing the account number, and even the account number is stolen and privacy is leaked.
Disclosure of Invention
In order to solve the existing technical problem, embodiments of the present invention provide an information processing method and a terminal thereof.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides an information processing method, which is applied to a first terminal and comprises the following steps:
when a first terminal runs a first application, login request information sent by a second terminal is obtained; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
detecting an account protection mode corresponding to the first account information;
generating an account protection strategy corresponding to the account protection mode according to the account protection mode;
and processing the login request information based on the account protection strategy to determine whether the second terminal is allowed to login the second application with the first account information.
Based on the above scheme, the account protection mode includes: an account locking mode;
the generating of the account protection policy corresponding to the account protection mode according to the account protection mode includes: generating a first account protection strategy when detecting that the account locking mode corresponding to the first account information is detected;
the processing the login request information based on the account protection policy to determine whether to allow the second terminal to login the second application with the first account information includes:
generating first response information corresponding to the login request information according to the first account protection strategy;
and sending the first response information to limit the authority of the second terminal for logging in the second application by the first account information.
Based on the above scheme, the account protection mode includes: an account unlocking mode;
the generating of the account protection policy corresponding to the account protection mode according to the account protection mode includes: generating a second account protection strategy when the account unlocking mode corresponding to the first account information is detected;
the processing the login request information based on the account protection policy to determine whether to allow the second terminal to login the second application with the first account information includes:
generating second prompt information according to the second account protection strategy;
receiving user operation based on the second prompt message;
generating second response information according to the user operation; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information.
Based on the above scheme, the account protection mode includes: an account locking mode;
the method further comprises the following steps:
when the second terminal logs in the second application through the first account information, the first terminal detects operation parameter information corresponding to the second application logged in by the second terminal;
judging whether the operation parameter information meets a preset condition or not;
when the operation parameter information does not meet the preset condition, the first terminal starts an account locking mode through the first application;
and generating a control instruction according to the account locking mode, and sending the control instruction to the second terminal so as to limit the right of the second terminal to log in the second application by using the first account information, so that the first account information corresponding to the second application is offline in the second terminal.
Based on the scheme, the login request information can represent identification information corresponding to the second terminal;
the method further comprises the following steps:
analyzing the login request information to obtain identification information corresponding to the second terminal;
and storing the identification information in an authentication list so that a second terminal corresponding to the stored identification information has the authority of logging in a second application by using the first account information.
Based on the above scheme, the method further comprises:
after the first terminal acquires the login request information sent by the second terminal again, analyzing the acquired login request information again to obtain target identification information;
judging whether the target identification information is stored in the verification list or not;
when the first account information is stored in the verification list, generating third response information, and sending the third response information to the second terminal so as to grant the second terminal the right to log in the second application by using the first account information;
and when the second application is not stored in the verification list, generating fourth response information, and sending the fourth response information to the second terminal so as to limit the authority of the second terminal to log in the second application by using the first account information.
The embodiment of the invention also provides an information processing method which is applied to a second terminal and comprises the following steps:
the second terminal sends login request information to the first terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound by the first terminal when running a first application;
receiving authorization information whether the first terminal allows the second terminal to log in the second application by the first account information or not;
and determining whether the second application can be successfully logged in by the first account information according to the authorization information.
Based on the above scheme, the receiving authorization information whether the first terminal allows the second terminal to log in the second application with the first account information includes:
receiving first response information, wherein the first response information is used for representing response information obtained by processing the login request information when the first terminal is in an account locking mode;
the determining whether the second application can be successfully logged in with the first account information according to the authorization information includes: and limiting the second terminal to log in the second application by the first account information according to the first response information.
Based on the above scheme, the receiving authorization information whether the first terminal allows the second terminal to log in the second application with the first account information includes:
receiving second response information sent by the second terminal, wherein the second response information is obtained according to user operation when the first terminal is in an account unlocking mode; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information;
the determining whether the second application can be successfully logged in with the first account information according to the authorization information includes: and determining whether the second application can be successfully logged in by the first account information according to the second response information.
Based on the above scheme, the method further comprises:
receiving a control instruction sent by the first terminal;
and limiting the right of the second terminal to log in the second application by the first account information according to the control instruction, so that the first account information corresponding to the second application is offline in the second terminal.
An embodiment of the present invention further provides a first terminal, where the first terminal includes:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring login request information sent by a second terminal when a first terminal runs a first application; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
the detection unit is used for detecting an account protection mode corresponding to the first account information;
the strategy generating unit is used for generating an account protection strategy corresponding to the account protection mode according to the account protection mode;
and the processing unit is used for processing the login request information based on the account protection strategy so as to determine whether the second terminal is allowed to login the second application by the first account information.
Based on the above scheme, the account protection mode includes: an account locking mode;
the policy generation unit is further configured to generate a first account protection policy when detecting that the account locking mode corresponds to the first account information;
the processing unit is further configured to generate first response information corresponding to the login request information according to the first account protection policy; and the second terminal is further used for sending the first response information so as to limit the authority of the second terminal for logging in the second application by the first account information.
Based on the above scheme, the account protection mode includes: an account unlocking mode;
the policy generation unit is further configured to generate a second account protection policy when detecting that the account unlocking mode corresponds to the first account information;
the processing unit is further configured to generate second prompt information according to the second account protection policy; receiving user operation based on the second prompt message; generating second response information according to the user operation; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information.
Based on the above scheme, the account protection mode includes: an account locking mode; the first terminal further comprises: the device comprises a first judging unit, a starting unit and an instruction generating unit; wherein,
the detection unit is further configured to detect, by the first terminal, operation parameter information corresponding to the second application logged in by the second terminal when the second terminal logs in the second application with the first account information;
the judging unit is used for judging whether the operation parameter information meets a preset condition or not;
the starting unit is used for starting an account locking mode by the first terminal through the first application when the operation parameter information does not meet the preset condition;
the instruction generating unit is used for generating a control instruction according to the account locking mode and sending the control instruction to the second terminal so as to limit the right of the second terminal to log in the second application by using the first account information and enable the first account information corresponding to the second application to be offline in the second terminal.
Based on the scheme, the login request information can represent identification information corresponding to the second terminal;
the first terminal further comprises:
the analysis unit is used for analyzing the login request information to obtain identification information corresponding to the second terminal;
and the storage unit is used for storing the identification information in an authentication list so that a second terminal corresponding to the stored identification information has the authority of logging in a second application by using the first account information.
Based on the above scheme, the first terminal further includes: a second judgment unit and a response information generation unit; wherein,
the analysis unit is further configured to, after the first terminal acquires the login request information sent by the second terminal again, analyze the login request information acquired again to obtain target identification information;
the second judging unit is further configured to judge whether the target identification information is stored in the verification list;
the response information generating unit is further configured to generate third response information when the third response information is stored in the verification list, and send the third response information to the second terminal, so as to grant the second terminal the right to log in the second application with the first account information;
and the authentication server is further used for generating fourth response information when the fourth response information is not stored in the authentication list, and sending the fourth response information to the second terminal so as to limit the authority of the second terminal to log in the second application by using the first account information.
An embodiment of the present invention further provides a second terminal, where the second terminal includes:
the second terminal sends login request information to the first terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound by the first terminal when running a first application;
a receiving unit, configured to receive authorization information whether the first terminal allows the second terminal to log in the second application with the first account information;
and the determining unit is used for determining whether the second application can be successfully logged in by the first account information according to the authorization information.
Based on the above scheme, the receiving unit is further configured to receive first response information, where the first response information is used to represent response information obtained by processing the login request information when the first terminal is in an account locking mode;
the determining unit is further configured to limit the second terminal to log in the second application with the first account information according to the first response information.
Based on the above scheme, the receiving unit is further configured to receive second response information sent by the second terminal, where the second response information is obtained according to a user operation when the first terminal is in an account unlocking mode; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information;
the determining unit is further configured to determine whether the second application can be successfully logged in with the first account information according to the second response information.
Based on the above scheme, the second terminal further includes: an instruction execution unit; wherein,
the receiving unit is further configured to receive a control instruction sent by the first terminal;
the instruction execution unit is configured to limit, according to the control instruction, the right of the second terminal to log in the second application with the first account information, so that the first account information corresponding to the second application is offline in the second terminal.
According to the information processing method and the terminal thereof, an account protection strategy can be generated by detecting an account protection mode corresponding to the first account information of the first terminal, and then login request information sent by other acquired terminals, such as a second terminal, is processed according to the account protection strategy so as to determine whether the second terminal is allowed to login the second application with the first account information; therefore, the purpose of providing security protection for sharing the first account information is achieved by utilizing the first application.
Drawings
FIG. 1 is a first schematic flow chart illustrating an implementation of an information processing method according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a first terminal logging in the first application for identity authentication according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating login protection when the first terminal runs the first application according to the embodiment of the present invention;
fig. 4 is a schematic diagram of prompt information corresponding to login request information in a first terminal according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an implementation flow of a first application scenario according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a verification list interface in a first application according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of a second implementation flow of the information processing method according to the embodiment of the present invention;
fig. 8 is a schematic view of an account locking interface in a first application according to an embodiment of the present invention;
fig. 9 is a schematic view of an account unlocking interface in the first application according to the embodiment of the present invention;
FIG. 10 is a diagram illustrating a password interface modification process in a first application according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a first terminal according to an embodiment of the present invention;
FIG. 12 is a third schematic flow chart illustrating an implementation of the information processing method according to the embodiment of the present invention;
fig. 13 is a schematic structural diagram of a second terminal according to an embodiment of the present invention.
Detailed Description
The basic idea of the embodiment of the invention is as follows:
so that the manner in which the features and aspects of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings.
Method embodiment one
FIG. 1 is a first schematic flow chart illustrating an implementation of an information processing method according to an embodiment of the present invention; the method is applied to a first terminal, and as shown in fig. 1, the method includes:
step 101: when a first terminal runs a first application, login request information sent by a second terminal is obtained; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
in this embodiment, the first application may specifically be a software application capable of providing security protection for account information; in a specific embodiment, the first account information is a user name and a password for logging in a second application, such as social software; the user can successfully log in the social software by using the first account information; meanwhile, the first application can be successfully logged in by using the first account information, wherein when the first terminal successfully logs in the first application by using the first account information and successfully runs the first application, the first account information is account information bound with the first application; therefore, a foundation is laid for providing security protection for account sharing of the first account information through the first application.
In another specific embodiment, the second application is successfully logged in by using the first account information, and if the social software is successfully logged in, in order to improve the security level of the first account information, password protection may be performed on the first account information in the social software, for example, the first account information is bound to a target communication identifier (such as a target phone number) so as to set the target communication identifier as a secret identifier of the first account information; further, fig. 2 is a schematic diagram illustrating that a first terminal logs in the first application to perform identity authentication according to the embodiment of the present invention; as shown in fig. 2, when the first terminal logs in the first application by using the first account information, it needs to perform identity authentication through a set privacy protection identifier, and the first application can be successfully logged in after passing authentication, so that the first terminal successfully runs the first application, specifically, as shown in fig. 3, after passing authentication, the first terminal runs the first application, for example, runs login protection in the first application, and selects to perform security protection on the first account information corresponding to the second application through login protection; here, when the first terminal successfully logs in the first application by using the first account information and successfully runs the first application, the first account information is account information bound with the first application; therefore, a foundation is laid for providing security protection for account sharing of the first account information through the first application.
In this embodiment, the second application may specifically be a corresponding application such as office software, entertainment software, and learning software; the second application may also be specifically an application corresponding to a web page, for example, an application provided by a mailbox application social network site in the web page.
In practical applications, the first account information may specifically be account information required for acquiring a website service, or account information required for logging in various types of application software. Specifically, the first account information is a user name and a password required for acquiring a website service or logging in application software.
In this way, when the first terminal logs in the first application by using the first account information and successfully runs the first application, the first terminal can obtain account sharing requests sent by other terminals through the first application, as shown in fig. 4, the first terminal receives a login request message sent by a second terminal and logs in the second application in the second terminal by using the first account information, and specifically, the login request message can be presented in the first terminal in a prompt message manner shown in fig. 4, so that a user can select whether to grant the right of the second terminal to log in the second application by using the first account information according to the user's own needs, and thus, a foundation is laid for realizing that security protection is provided for account sharing by using the first application.
Step 102: detecting an account protection mode corresponding to the first account information;
step 103: generating an account protection strategy corresponding to the account protection mode according to the account protection mode;
step 104: and processing the login request information based on the account protection strategy to determine whether the second terminal is allowed to login the second application with the first account information.
According to the information processing method, the account protection strategy can be generated by detecting the account protection mode corresponding to the first account information of the first terminal, and then login request information sent by other acquired terminals, such as a second terminal, is processed according to the account protection strategy so as to determine whether the second terminal is allowed to login the second application with the first account information; therefore, the purpose of providing security protection for sharing the first account information is achieved by utilizing the first application.
In addition, the account protection mode can be set at will according to the requirements of the user, so that the embodiment of the invention can also meet the requirements of different users and provide protection of different requirements for different account information.
Method embodiment two
In this embodiment, a verification list is set in the first application, and identification information corresponding to a terminal that has undergone identity verification and passes verification is stored in the verification list; specifically, after the first terminal performs identity authentication and passes the authentication, the authentication list stores identification information corresponding to the first terminal, so that when the first terminal logs in the second application again with the first account information, the second application can be successfully logged in without performing identity authentication; that is to say, as long as the first account information can successfully log in the second application in any other terminal, the first application can acquire the terminal device information of the terminal that successfully logs in the second application by using the first account information, for example, acquire the identification information of the terminal device information, and store the identification information represented by the acquired terminal device information in the verification list of the first application, so that when the terminal corresponding to the identification information in the verification list again logs in the second application by using the first account information, identity verification is not required, password protection is provided for the first account information, the purpose of simplifying user operation is achieved, and user experience is improved.
In a specific embodiment, the authentication list not only stores identification information of a terminal that has undergone authentication and can successfully log in the second application by using the first account information after passing the authentication, but also stores identification information of a terminal that has undergone authentication and can successfully log in the first application by using the first account information after passing the authentication. In other words, the identification information of the terminal capable of successfully logging in the first application or the second application by using the first account information is stored in the verification list, so that the user operation is further simplified, and the user experience is improved.
In practical application, the process of storing the identification information corresponding to the terminal in the verification list may be automatic or non-automatic; that is, when a first application detects that there is identification information of a terminal that needs to be stored in the authentication list, the first application automatically stores the identification information of the terminal that needs to be stored in the authentication list; the user can also be prompted in a message prompting mode, and whether the identification information of the terminal needing to be stored is stored in the verification list or not is determined according to user operation. Here, the identification information of the terminal that needs to be stored is identification information corresponding to a terminal that has passed authentication and has successfully logged in the first application or the second application using the first account information, and that does not exist in the authentication list.
The above process of the embodiment of the present invention is further described in detail by specific application scenarios;
the application scene one:
as shown in fig. 5, the information processing method includes:
step 501: when a first terminal runs a first application, login request information sent by a second terminal is obtained; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
step 502: detecting an account protection mode corresponding to the first account information;
step 503: generating a second account protection strategy when the account unlocking mode corresponding to the first account information is detected;
step 504: generating second prompt information according to the second account protection strategy;
step 505: receiving user operation based on the second prompt message;
in practical applications, the user operation may specifically be a click operation, for example, a user performs a click operation according to the interface display shown in fig. 4; wherein, the "is my operation" means that the second terminal is granted the right to log in the second application with the first account information; the "refusal" means that the second terminal is restricted from logging in the second application with the first account information. This embodiment takes the user clicking "yes me operation" as an example.
Step 506: generating second response information according to the user operation; the second response information is used for representing information of the authority granted to the second terminal for logging in the second application by the first account information, so that the second terminal can successfully log in the second application by using the first account information;
step 507: analyzing the login request information to obtain identification information corresponding to the second terminal;
in practical applications, the execution ofstep 507 may be performed in any step afterstep 501 and beforestep 507, and the execution order ofstep 507 is not limited in this embodiment.
Step 508: and storing the identification information in an authentication list so that a second terminal corresponding to the stored identification information has the authority of logging in a second application by using the first account information.
FIG. 6 is a schematic diagram of a verification list interface in a first application according to an embodiment of the present invention; as shown in fig. 6, the identification information in the verification list is presented in the first application, so as to facilitate the user identification; furthermore, when the user does not want to grant the right to the terminal corresponding to the identification information in the verification list, only the identification information in the verification list needs to be deleted; that is, after a certain identification information is deleted from the authentication list, when the terminal corresponding to the deleted identification information uses the first account information to log in the first application or the second application again in advance, the identity authentication is required. Here, the verified device shown in fig. 6 is the verification list according to the embodiment of the present invention, and the three mobile phone models below the verified device are the identification information of the terminal according to the embodiment of the present invention.
In a specific embodiment, after the second terminal successfully logs in the second application by using the first account information and goes offline, the second terminal logs in the second application by using the first account information again, and at this time, the specific steps are as follows:
after the first terminal acquires the login request information sent by the second terminal again, analyzing the acquired login request information again to obtain target identification information;
judging whether the target identification information is stored in the verification list or not;
when the first account information is stored in the verification list, generating third response information, and sending the third response information to the second terminal so as to grant the second terminal the right to log in the second application by using the first account information;
and when the second application is not stored in the verification list, generating fourth response information, and sending the fourth response information to the second terminal so as to limit the authority of the second terminal to log in the second application by using the first account information.
Therefore, when the target identification information is stored in the verification list, the second terminal can log in the second application by reusing the first account information without identity verification, so that the user operation is simplified, and the user experience is improved.
Application scenario two:
when a target terminal pre-utilizes the first account information to log in the second application, the target terminal sends login request information to the first terminal, at the moment, the first terminal detects an account protection mode corresponding to the first account information, when the account protection mode is detected to be an account unlocking mode, the first terminal analyzes identification information corresponding to the login request information sent by the target terminal through the first application and judges whether the analyzed identification information corresponding to the target terminal is stored in the verification list, and when the analyzed identification information is stored in the verification list, the first terminal directly generates third response information and sends the third response information to the target terminal so as to grant the target terminal the right of logging in the second application with the first account information;
when the account number is not stored in the verification list, the first terminal generates a second account number protection corresponding to the account number unlocking mode, and generates second prompt information according to the second account number protection strategy; receiving user operation based on the second prompt message; and generating second response information according to the user operation, so as to grant the target terminal the right to log in the second application with the first account information through the second response information, or limit the right to log in the second application with the first account information through the second response information.
Application scenario three
When a target terminal pre-utilizes the first account information to log in the second application, the target terminal sends login request information to the first terminal, at the moment, the first terminal detects an account protection mode corresponding to the first account information, and when the account protection mode is detected to be an account locking mode, a first account protection strategy corresponding to the account locking mode is generated; generating first response information corresponding to login request information sent by the target terminal according to the first account protection strategy; and sending the first response information to limit the authority of the target terminal for logging in the second application by the first account information.
Method embodiment three
FIG. 7 is a schematic diagram of a second implementation flow of the information processing method according to the embodiment of the present invention; the method is applied to a first terminal; in this embodiment, the account protection mode in the first method embodiment includes: an account locking mode and an account unlocking mode; as shown in fig. 7, the method includes:
step 701: when a first terminal runs a first application, login request information sent by a second terminal is obtained; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
step 702: detecting an account protection mode corresponding to the first account information;
step 703: generating a first account protection strategy when detecting that the account locking mode corresponding to the first account information is detected; subsequently, steps 704 to 705 are performed;
in this embodiment, when the first terminal detects that the account locking mode corresponding to the first account information is executed, the first account information is locked for all services, that is, any device cannot log in the second application by using the first account information, so that the risk that other users steal the first account information is reduced to the maximum extent. Fig. 8 is a schematic view of an account locking interface in a first application according to an embodiment of the present invention, and as shown in fig. 8, all locking services for a second application corresponding to first account information are implemented through an "account lock" in the first application, so that a risk that other users maliciously utilize the first account information is reduced. After the risk is relieved, or when the user needs to log in a second application by using the first account information, account unlocking processing is performed on the first account information by using the schematic diagram shown in fig. 9.
Step 704: generating first response information corresponding to the login request information according to the first account protection strategy;
step 705: and sending the first response information to limit the authority of the second terminal for logging in the second application by the first account information.
Step 706: generating a second account protection strategy when the account unlocking mode corresponding to the first account information is detected;
in this embodiment, the account unlocking mode is that an "account lock" in the first application is in a state shown in fig. 9, and at this time, the first account information is in an account unlocking state.
Step 707: generating second prompt information according to the second account protection strategy;
step 708: receiving user operation based on the second prompt message;
step 709: generating second response information according to the user operation; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information.
In practical applications, the user operation may specifically be a click operation, for example, a user performs a click operation according to the interface display shown in fig. 4; wherein, the "is my operation" means that the second terminal is granted the right to log in the second application with the first account information; the "refusal" means that the second terminal is restricted from logging in the second application with the first account information.
In a specific embodiment, when the user operation is an operation of "yes operation", at this time, the second response information is information that grants the second terminal the right to log in the second application with the first account information, so that the second terminal can successfully log in the second application with the first account information through the second response information; further, after the second terminal successfully logs in the second application with the first account information, the method further includes:
the first terminal detects the operation parameter information corresponding to the second application login of the second terminal;
judging whether the operation parameter information meets a preset condition or not;
when the operation parameter information does not meet the preset condition, the first terminal starts an account locking mode through the first application;
and generating a control instruction according to the account locking mode, and sending the control instruction to the second terminal so as to limit the right of the second terminal to log in the second application by using the first account information, so that the first account information corresponding to the second application is offline in the second terminal.
Here, the operation parameter information may be specifically an operation time, and correspondingly, the preset condition may be that the operation time is less than a first time; when the operation parameter information does not meet the preset condition, that is, when the operation time is greater than the first time, the first terminal starts an account locking mode through the first application, that is, locks all services of the first account information, so that the first account information corresponding to the second terminal is forced to be offline, and thus, the access time of the second terminal is limited. At this time, in order to further protect the security of the first account information, the user may modify the password in the first account information through a "modify password" service in the first application as shown in fig. 10, so as to prevent the first account information from being leaked.
In a specific embodiment, when the second terminal successfully logs in the second application by using the first account information, and the first application stores the identification information of the second terminal in the authentication list according to the manner described in the second embodiment of the method, at this time, the user may further delete the identification information corresponding to the second terminal from the authentication list, so that the second terminal is prevented from maliciously logging in the second application. That is, when the second terminal logs in the second application with the first account information again in advance, the second terminal needs not only the user name and the password represented by the first account information, but also needs to initiate login request information to the first application of the first terminal, and can log in the second application with the first account information again after authorization, so that the purpose of security protection of the first account information is achieved.
Apparatus embodiment one
Fig. 11 is a schematic structural diagram of a first terminal according to an embodiment of the present invention; as shown in fig. 11, the first terminal includes:
the obtaining unit 11 is configured to obtain login request information sent by a second terminal when a first application is run by a first terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
the detection unit 12 is configured to detect an account protection mode corresponding to the first account information;
a policy generating unit 13, configured to generate an account protection policy corresponding to the account protection mode according to the account protection mode;
and the processing unit 14 is configured to process the login request information based on the account protection policy to determine whether to allow the second terminal to login to the second application with the first account information.
In this embodiment, the account protection mode includes: an account locking mode;
the policy generation unit is further configured to generate a first account protection policy when detecting that the account locking mode corresponds to the first account information;
the processing unit is further configured to generate first response information corresponding to the login request information according to the first account protection policy; and the second terminal is further used for sending the first response information so as to limit the authority of the second terminal for logging in the second application by the first account information.
In this embodiment, the account protection mode includes: an account unlocking mode;
the policy generation unit is further configured to generate a second account protection policy when detecting that the account unlocking mode corresponds to the first account information;
the processing unit is further configured to generate second prompt information according to the second account protection policy; receiving user operation based on the second prompt message; generating second response information according to the user operation; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information.
In this embodiment, the account protection mode includes: an account locking mode; the first terminal further comprises: the device comprises a first judging unit, a starting unit and an instruction generating unit; wherein,
the detection unit is further configured to detect, by the first terminal, operation parameter information corresponding to the second application logged in by the second terminal when the second terminal logs in the second application with the first account information;
the judging unit is used for judging whether the operation parameter information meets a preset condition or not;
the starting unit is used for starting an account locking mode by the first terminal through the first application when the operation parameter information does not meet the preset condition;
the instruction generating unit is used for generating a control instruction according to the account locking mode and sending the control instruction to the second terminal so as to limit the right of the second terminal to log in the second application by using the first account information and enable the first account information corresponding to the second application to be offline in the second terminal.
In this embodiment, the login request information may represent identification information corresponding to the second terminal;
the first terminal further comprises:
the analysis unit is used for analyzing the login request information to obtain identification information corresponding to the second terminal;
and the storage unit is used for storing the identification information in an authentication list so that a second terminal corresponding to the stored identification information has the authority of logging in a second application by using the first account information.
In this embodiment, the first terminal further includes: a second judgment unit and a response information generation unit; wherein,
the analysis unit is further configured to, after the first terminal acquires the login request information sent by the second terminal again, analyze the login request information acquired again to obtain target identification information;
the second judging unit is further configured to judge whether the target identification information is stored in the verification list;
the response information generating unit is further configured to generate third response information when the third response information is stored in the verification list, and send the third response information to the second terminal, so as to grant the second terminal the right to log in the second application with the first account information;
and the authentication server is further used for generating fourth response information when the fourth response information is not stored in the authentication list, and sending the fourth response information to the second terminal so as to limit the authority of the second terminal to log in the second application by using the first account information.
It should be understood by those skilled in the art that the functions of each processing unit in the first terminal according to the embodiment of the present invention may be understood by referring to the description of the information processing method, and each processing unit in the first terminal according to the embodiment of the present invention may be implemented by an analog circuit that implements the functions described in the embodiment of the present invention, or may be implemented by running software that performs the functions described in the embodiment of the present invention on an intelligent terminal.
Method example four
FIG. 12 is a third schematic flow chart illustrating an implementation of the information processing method according to the embodiment of the present invention; the method is applied to a second terminal, and as shown in fig. 12, the method includes:
step 1201: the second terminal sends login request information to the first terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound by the first terminal when running a first application;
step 1202: receiving authorization information whether the first terminal allows the second terminal to log in the second application by the first account information or not;
step 1203: and determining whether the second application can be successfully logged in by the first account information according to the authorization information.
In this embodiment, the receiving authorization information whether the first terminal allows the second terminal to log in the second application with the first account information includes:
receiving first response information, wherein the first response information is used for representing response information obtained by processing the login request information when the first terminal is in an account locking mode;
the determining whether the second application can be successfully logged in with the first account information according to the authorization information includes: and limiting the second terminal to log in the second application by the first account information according to the first response information.
In this embodiment, the receiving authorization information whether the first terminal allows the second terminal to log in the second application with the first account information includes:
receiving second response information sent by the second terminal, wherein the second response information is obtained according to user operation when the first terminal is in an account unlocking mode; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information;
the determining whether the second application can be successfully logged in with the first account information according to the authorization information includes: and determining whether the second application can be successfully logged in by the first account information according to the second response information.
In this embodiment, the method further includes:
receiving a control instruction sent by the first terminal;
and limiting the right of the second terminal to log in the second application by the first account information according to the control instruction, so that the first account information corresponding to the second application is offline in the second terminal.
In this embodiment, the second terminal is a terminal that performs information interaction with the first terminal, and a specific implementation process of the second terminal may refer to the description related to the first to third method embodiments.
Device embodiment II
Fig. 13 is a schematic structural diagram of a second terminal according to an embodiment of the present invention; as shown in fig. 13, the second terminal includes:
a sending unit 21, configured to send login request information to the first terminal by the second terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound by the first terminal when running a first application;
a receiving unit 22, configured to receive authorization information whether the first terminal allows the second terminal to log in the second application with the first account information;
a determining unit 23, configured to determine whether the second application can be successfully logged in with the first account information according to the authorization information.
In this embodiment, the receiving unit is further configured to receive first response information, where the first response information is used to represent response information obtained by processing the login request information when the first terminal is in an account locking mode;
the determining unit is further configured to limit the second terminal to log in the second application with the first account information according to the first response information.
In this embodiment, the receiving unit is further configured to receive second response information sent by the second terminal, where the second response information is obtained according to a user operation when the first terminal is in an account unlocking mode; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information;
the determining unit is further configured to determine whether the second application can be successfully logged in with the first account information according to the second response information.
In this embodiment, the second terminal further includes: an instruction execution unit; wherein,
the receiving unit is further configured to receive a control instruction sent by the first terminal;
the instruction execution unit is configured to limit, according to the control instruction, the right of the second terminal to log in the second application with the first account information, so that the first account information corresponding to the second application is offline in the second terminal.
It should be understood by those skilled in the art that the functions of the processing units in the second terminal according to the embodiment of the present invention may be understood by referring to the description of the information processing method, and the processing units in the second terminal according to the embodiment of the present invention may be implemented by analog circuits that implement the functions described in the embodiment of the present invention, or by running software that performs the functions described in the embodiment of the present invention on an intelligent terminal.
According to the information processing method and the terminal thereof, an account protection strategy can be generated by detecting an account protection mode corresponding to the first account information of the first terminal, and then login request information sent by other acquired terminals, such as a second terminal, is processed according to the account protection strategy so as to determine whether the second terminal is allowed to login the second application with the first account information; therefore, the purpose of providing security protection for sharing the first account information is achieved by utilizing the first application.
Moreover, the account protection mode can be set at will according to the requirements of the user, so that the embodiment of the invention can also meet the requirements of different users and provide protection of different requirements for different account information.
In addition, in the embodiment of the present invention, when the second terminal logs in the second application by using the first account information, not only the user name and the password represented by the first account information are required, but also login request information needs to be sent to the first application, and then it is determined whether to grant the second terminal the right to log in the second application by using the first account information according to the account protection mode of the first account information through the first application, so that on the premise of account sharing, the protection of the first account information is achieved, and the user experience is improved.
In summary, the information processing method and the terminal according to the embodiments of the present invention can select the account protection mode corresponding to the account information according to the user requirement, so as to achieve the purpose of differential protection for different accounts of different users; and on the premise of account sharing, the first account information can be protected to the maximum extent, so that the protection requirement of a user on the account information is met, the user experience is enriched, and the user experience is also improved.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (21)

when the target identification information corresponding to the second terminal is stored in the verification list of the first application, the authorization information is used for representing the authority granted to the second terminal to log in the second application by the first account information; when the target identification information is not stored in the verification list of the first application, the authorization information is used for granting the second terminal the right to log in the second application with the first account information according to the user operation representation, or limiting the right to log in the second application with the first account information; the verification list of the first application stores identification information corresponding to the terminal which has been subjected to identity verification and passes the verification;
the processing unit is used for determining the authority granted to the second terminal to log in the second application by the first account information according to the second account protection strategy when the target identification information is stored in the verification list of the first application; and when the target identification information is not stored in the verification list of the first application, determining to receive user operation according to the second account protection policy, and determining to grant the second terminal the right to log in the second application with the first account information or limit the right to log in the second application with the first account information according to the user operation; the authentication list of the first application stores identification information corresponding to terminals which have been authenticated and pass authentication.
a receiving unit, configured to receive authorization information whether the first terminal allows the second terminal to log in the second application with the first account information; when the target identification information corresponding to the second terminal is stored in the verification list of the first application, the authorization information is used for representing the authority granted to the second terminal to log in the second application by the first account information; when the target identification information is not stored in the verification list of the first application, the authorization information is used for granting the second terminal the right to log in the second application with the first account information according to the user operation representation, or limiting the right to log in the second application with the first account information; the verification list of the first application stores identification information corresponding to the terminal which has been subjected to identity verification and passes the verification;
CN201510714273.7A2015-10-282015-10-28Information processing method and terminal thereofActiveCN105429943B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510714273.7ACN105429943B (en)2015-10-282015-10-28Information processing method and terminal thereof

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510714273.7ACN105429943B (en)2015-10-282015-10-28Information processing method and terminal thereof

Publications (2)

Publication NumberPublication Date
CN105429943A CN105429943A (en)2016-03-23
CN105429943Btrue CN105429943B (en)2020-07-14

Family

ID=55507885

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510714273.7AActiveCN105429943B (en)2015-10-282015-10-28Information processing method and terminal thereof

Country Status (1)

CountryLink
CN (1)CN105429943B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105956430A (en)*2016-04-252016-09-21乐视控股(北京)有限公司Method and apparatus for automatically logging in VR platform
CN105920840B (en)*2016-06-242019-08-30深圳淘乐网络科技有限公司A kind of game generation white silk method based on appointed task
CN106878250B (en)*2016-08-192020-05-05阿里巴巴集团控股有限公司Cross-application single-state login method and device
CN111538596B (en)*2020-04-232023-06-27北京字节跳动网络技术有限公司Resource processing method, device, computer equipment and storage medium
CN112948814A (en)*2021-03-192021-06-11合肥京东方光电科技有限公司Account password management method and device and storage medium
CN114760448B (en)*2022-06-152022-09-02深圳市鼎山科技有限公司Intelligent 5G video monitoring system and method based on short message remote activation

Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102622270A (en)*2011-01-262012-08-01腾讯科技(深圳)有限公司Switching management method and terminal for application programs
CN102801656A (en)*2012-08-292012-11-28腾讯科技(深圳)有限公司State control and modification method, equipment and system for implementing instant messaging application
CN103281327A (en)*2013-06-062013-09-04百度在线网络技术(北京)有限公司Method, system and cloud server for multi-device safe logging
CN103427990A (en)*2012-05-182013-12-04华为终端有限公司Authority authentication method and terminal device
CN103634109A (en)*2013-10-312014-03-12小米科技有限责任公司Operation right authentication method and device
CN103701873A (en)*2013-12-112014-04-02深圳海联讯科技股份有限公司Method for performing one-click login among multiple applications
CN104113534A (en)*2014-07-022014-10-22百度在线网络技术(北京)有限公司System and method for logging in applications (APPs)
CN104348612A (en)*2013-07-232015-02-11腾讯科技(深圳)有限公司Third-party website login method based on mobile terminal and mobile terminal
CN104883342A (en)*2014-02-282015-09-02腾讯科技(深圳)有限公司 An account authority management system, method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9130929B2 (en)*2013-03-152015-09-08Aol Inc.Systems and methods for using imaging to authenticate online users
CN104486747A (en)*2014-12-192015-04-01北京奇艺世纪科技有限公司Method and device for cross-terminal account login

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102622270A (en)*2011-01-262012-08-01腾讯科技(深圳)有限公司Switching management method and terminal for application programs
CN103427990A (en)*2012-05-182013-12-04华为终端有限公司Authority authentication method and terminal device
CN102801656A (en)*2012-08-292012-11-28腾讯科技(深圳)有限公司State control and modification method, equipment and system for implementing instant messaging application
CN103281327A (en)*2013-06-062013-09-04百度在线网络技术(北京)有限公司Method, system and cloud server for multi-device safe logging
CN104348612A (en)*2013-07-232015-02-11腾讯科技(深圳)有限公司Third-party website login method based on mobile terminal and mobile terminal
CN103634109A (en)*2013-10-312014-03-12小米科技有限责任公司Operation right authentication method and device
CN103701873A (en)*2013-12-112014-04-02深圳海联讯科技股份有限公司Method for performing one-click login among multiple applications
CN104883342A (en)*2014-02-282015-09-02腾讯科技(深圳)有限公司 An account authority management system, method and device
CN104113534A (en)*2014-07-022014-10-22百度在线网络技术(北京)有限公司System and method for logging in applications (APPs)

Also Published As

Publication numberPublication date
CN105429943A (en)2016-03-23

Similar Documents

PublicationPublication DateTitle
CN106096343B (en)Message access control method and equipment
US10445487B2 (en)Methods and apparatus for authentication of joint account login
CN105429943B (en)Information processing method and terminal thereof
US9794228B2 (en)Security challenge assisted password proxy
US10880306B2 (en)Verification information update
CN104092542B (en)A kind of account login method, Apparatus and system
CN108111473B (en)Unified management method, device and system for hybrid cloud
US20180295137A1 (en)Techniques for dynamic authentication in connection within applications and sessions
CN104917727B (en)A kind of method, system and device of account's authentication
CN110149328B (en)Interface authentication method, device, equipment and computer readable storage medium
US10212151B2 (en)Method for operating a designated service, service unlocking method, and terminal
KR101451359B1 (en)User account recovery
CN107241329B (en)Account login processing method and device
CN109257391A (en)A kind of access authority opening method, device, server and storage medium
CN105991709A (en)Cloud desktop account number management method and apparatus thereof
CN105827406A (en)Identity verification method, identity verification device, and identity verification system
CN108965335B (en)Method for preventing malicious access to login interface, electronic device and computer medium
CN103902880A (en)Windows system two-factor authentication method based on challenge responding type dynamic passwords
CN109743338A (en) Verification method, system, server and readable storage medium for automatic login
CN101854357B (en)Method and system for monitoring network authentication
CN103428698A (en)Identity strong authentication method of mobile interconnection participants
CN109981611A (en)A kind of safety defense method and device of multi-platform account
KR102016976B1 (en)Unified login method and system based on single sign on service
CN109450953B (en)Authorization method and device, electronic equipment and computer readable storage medium
CN108574657B (en)Server access method, device and system, computing equipment and server

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp