Disclosure of Invention
In order to solve the existing technical problem, embodiments of the present invention provide an information processing method and a terminal thereof.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides an information processing method, which is applied to a first terminal and comprises the following steps:
when a first terminal runs a first application, login request information sent by a second terminal is obtained; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
detecting an account protection mode corresponding to the first account information;
generating an account protection strategy corresponding to the account protection mode according to the account protection mode;
and processing the login request information based on the account protection strategy to determine whether the second terminal is allowed to login the second application with the first account information.
Based on the above scheme, the account protection mode includes: an account locking mode;
the generating of the account protection policy corresponding to the account protection mode according to the account protection mode includes: generating a first account protection strategy when detecting that the account locking mode corresponding to the first account information is detected;
the processing the login request information based on the account protection policy to determine whether to allow the second terminal to login the second application with the first account information includes:
generating first response information corresponding to the login request information according to the first account protection strategy;
and sending the first response information to limit the authority of the second terminal for logging in the second application by the first account information.
Based on the above scheme, the account protection mode includes: an account unlocking mode;
the generating of the account protection policy corresponding to the account protection mode according to the account protection mode includes: generating a second account protection strategy when the account unlocking mode corresponding to the first account information is detected;
the processing the login request information based on the account protection policy to determine whether to allow the second terminal to login the second application with the first account information includes:
generating second prompt information according to the second account protection strategy;
receiving user operation based on the second prompt message;
generating second response information according to the user operation; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information.
Based on the above scheme, the account protection mode includes: an account locking mode;
the method further comprises the following steps:
when the second terminal logs in the second application through the first account information, the first terminal detects operation parameter information corresponding to the second application logged in by the second terminal;
judging whether the operation parameter information meets a preset condition or not;
when the operation parameter information does not meet the preset condition, the first terminal starts an account locking mode through the first application;
and generating a control instruction according to the account locking mode, and sending the control instruction to the second terminal so as to limit the right of the second terminal to log in the second application by using the first account information, so that the first account information corresponding to the second application is offline in the second terminal.
Based on the scheme, the login request information can represent identification information corresponding to the second terminal;
the method further comprises the following steps:
analyzing the login request information to obtain identification information corresponding to the second terminal;
and storing the identification information in an authentication list so that a second terminal corresponding to the stored identification information has the authority of logging in a second application by using the first account information.
Based on the above scheme, the method further comprises:
after the first terminal acquires the login request information sent by the second terminal again, analyzing the acquired login request information again to obtain target identification information;
judging whether the target identification information is stored in the verification list or not;
when the first account information is stored in the verification list, generating third response information, and sending the third response information to the second terminal so as to grant the second terminal the right to log in the second application by using the first account information;
and when the second application is not stored in the verification list, generating fourth response information, and sending the fourth response information to the second terminal so as to limit the authority of the second terminal to log in the second application by using the first account information.
The embodiment of the invention also provides an information processing method which is applied to a second terminal and comprises the following steps:
the second terminal sends login request information to the first terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound by the first terminal when running a first application;
receiving authorization information whether the first terminal allows the second terminal to log in the second application by the first account information or not;
and determining whether the second application can be successfully logged in by the first account information according to the authorization information.
Based on the above scheme, the receiving authorization information whether the first terminal allows the second terminal to log in the second application with the first account information includes:
receiving first response information, wherein the first response information is used for representing response information obtained by processing the login request information when the first terminal is in an account locking mode;
the determining whether the second application can be successfully logged in with the first account information according to the authorization information includes: and limiting the second terminal to log in the second application by the first account information according to the first response information.
Based on the above scheme, the receiving authorization information whether the first terminal allows the second terminal to log in the second application with the first account information includes:
receiving second response information sent by the second terminal, wherein the second response information is obtained according to user operation when the first terminal is in an account unlocking mode; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information;
the determining whether the second application can be successfully logged in with the first account information according to the authorization information includes: and determining whether the second application can be successfully logged in by the first account information according to the second response information.
Based on the above scheme, the method further comprises:
receiving a control instruction sent by the first terminal;
and limiting the right of the second terminal to log in the second application by the first account information according to the control instruction, so that the first account information corresponding to the second application is offline in the second terminal.
An embodiment of the present invention further provides a first terminal, where the first terminal includes:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring login request information sent by a second terminal when a first terminal runs a first application; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
the detection unit is used for detecting an account protection mode corresponding to the first account information;
the strategy generating unit is used for generating an account protection strategy corresponding to the account protection mode according to the account protection mode;
and the processing unit is used for processing the login request information based on the account protection strategy so as to determine whether the second terminal is allowed to login the second application by the first account information.
Based on the above scheme, the account protection mode includes: an account locking mode;
the policy generation unit is further configured to generate a first account protection policy when detecting that the account locking mode corresponds to the first account information;
the processing unit is further configured to generate first response information corresponding to the login request information according to the first account protection policy; and the second terminal is further used for sending the first response information so as to limit the authority of the second terminal for logging in the second application by the first account information.
Based on the above scheme, the account protection mode includes: an account unlocking mode;
the policy generation unit is further configured to generate a second account protection policy when detecting that the account unlocking mode corresponds to the first account information;
the processing unit is further configured to generate second prompt information according to the second account protection policy; receiving user operation based on the second prompt message; generating second response information according to the user operation; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information.
Based on the above scheme, the account protection mode includes: an account locking mode; the first terminal further comprises: the device comprises a first judging unit, a starting unit and an instruction generating unit; wherein,
the detection unit is further configured to detect, by the first terminal, operation parameter information corresponding to the second application logged in by the second terminal when the second terminal logs in the second application with the first account information;
the judging unit is used for judging whether the operation parameter information meets a preset condition or not;
the starting unit is used for starting an account locking mode by the first terminal through the first application when the operation parameter information does not meet the preset condition;
the instruction generating unit is used for generating a control instruction according to the account locking mode and sending the control instruction to the second terminal so as to limit the right of the second terminal to log in the second application by using the first account information and enable the first account information corresponding to the second application to be offline in the second terminal.
Based on the scheme, the login request information can represent identification information corresponding to the second terminal;
the first terminal further comprises:
the analysis unit is used for analyzing the login request information to obtain identification information corresponding to the second terminal;
and the storage unit is used for storing the identification information in an authentication list so that a second terminal corresponding to the stored identification information has the authority of logging in a second application by using the first account information.
Based on the above scheme, the first terminal further includes: a second judgment unit and a response information generation unit; wherein,
the analysis unit is further configured to, after the first terminal acquires the login request information sent by the second terminal again, analyze the login request information acquired again to obtain target identification information;
the second judging unit is further configured to judge whether the target identification information is stored in the verification list;
the response information generating unit is further configured to generate third response information when the third response information is stored in the verification list, and send the third response information to the second terminal, so as to grant the second terminal the right to log in the second application with the first account information;
and the authentication server is further used for generating fourth response information when the fourth response information is not stored in the authentication list, and sending the fourth response information to the second terminal so as to limit the authority of the second terminal to log in the second application by using the first account information.
An embodiment of the present invention further provides a second terminal, where the second terminal includes:
the second terminal sends login request information to the first terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound by the first terminal when running a first application;
a receiving unit, configured to receive authorization information whether the first terminal allows the second terminal to log in the second application with the first account information;
and the determining unit is used for determining whether the second application can be successfully logged in by the first account information according to the authorization information.
Based on the above scheme, the receiving unit is further configured to receive first response information, where the first response information is used to represent response information obtained by processing the login request information when the first terminal is in an account locking mode;
the determining unit is further configured to limit the second terminal to log in the second application with the first account information according to the first response information.
Based on the above scheme, the receiving unit is further configured to receive second response information sent by the second terminal, where the second response information is obtained according to a user operation when the first terminal is in an account unlocking mode; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information;
the determining unit is further configured to determine whether the second application can be successfully logged in with the first account information according to the second response information.
Based on the above scheme, the second terminal further includes: an instruction execution unit; wherein,
the receiving unit is further configured to receive a control instruction sent by the first terminal;
the instruction execution unit is configured to limit, according to the control instruction, the right of the second terminal to log in the second application with the first account information, so that the first account information corresponding to the second application is offline in the second terminal.
According to the information processing method and the terminal thereof, an account protection strategy can be generated by detecting an account protection mode corresponding to the first account information of the first terminal, and then login request information sent by other acquired terminals, such as a second terminal, is processed according to the account protection strategy so as to determine whether the second terminal is allowed to login the second application with the first account information; therefore, the purpose of providing security protection for sharing the first account information is achieved by utilizing the first application.
Detailed Description
The basic idea of the embodiment of the invention is as follows:
so that the manner in which the features and aspects of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings.
Method embodiment one
FIG. 1 is a first schematic flow chart illustrating an implementation of an information processing method according to an embodiment of the present invention; the method is applied to a first terminal, and as shown in fig. 1, the method includes:
step 101: when a first terminal runs a first application, login request information sent by a second terminal is obtained; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
in this embodiment, the first application may specifically be a software application capable of providing security protection for account information; in a specific embodiment, the first account information is a user name and a password for logging in a second application, such as social software; the user can successfully log in the social software by using the first account information; meanwhile, the first application can be successfully logged in by using the first account information, wherein when the first terminal successfully logs in the first application by using the first account information and successfully runs the first application, the first account information is account information bound with the first application; therefore, a foundation is laid for providing security protection for account sharing of the first account information through the first application.
In another specific embodiment, the second application is successfully logged in by using the first account information, and if the social software is successfully logged in, in order to improve the security level of the first account information, password protection may be performed on the first account information in the social software, for example, the first account information is bound to a target communication identifier (such as a target phone number) so as to set the target communication identifier as a secret identifier of the first account information; further, fig. 2 is a schematic diagram illustrating that a first terminal logs in the first application to perform identity authentication according to the embodiment of the present invention; as shown in fig. 2, when the first terminal logs in the first application by using the first account information, it needs to perform identity authentication through a set privacy protection identifier, and the first application can be successfully logged in after passing authentication, so that the first terminal successfully runs the first application, specifically, as shown in fig. 3, after passing authentication, the first terminal runs the first application, for example, runs login protection in the first application, and selects to perform security protection on the first account information corresponding to the second application through login protection; here, when the first terminal successfully logs in the first application by using the first account information and successfully runs the first application, the first account information is account information bound with the first application; therefore, a foundation is laid for providing security protection for account sharing of the first account information through the first application.
In this embodiment, the second application may specifically be a corresponding application such as office software, entertainment software, and learning software; the second application may also be specifically an application corresponding to a web page, for example, an application provided by a mailbox application social network site in the web page.
In practical applications, the first account information may specifically be account information required for acquiring a website service, or account information required for logging in various types of application software. Specifically, the first account information is a user name and a password required for acquiring a website service or logging in application software.
In this way, when the first terminal logs in the first application by using the first account information and successfully runs the first application, the first terminal can obtain account sharing requests sent by other terminals through the first application, as shown in fig. 4, the first terminal receives a login request message sent by a second terminal and logs in the second application in the second terminal by using the first account information, and specifically, the login request message can be presented in the first terminal in a prompt message manner shown in fig. 4, so that a user can select whether to grant the right of the second terminal to log in the second application by using the first account information according to the user's own needs, and thus, a foundation is laid for realizing that security protection is provided for account sharing by using the first application.
Step 102: detecting an account protection mode corresponding to the first account information;
step 103: generating an account protection strategy corresponding to the account protection mode according to the account protection mode;
step 104: and processing the login request information based on the account protection strategy to determine whether the second terminal is allowed to login the second application with the first account information.
According to the information processing method, the account protection strategy can be generated by detecting the account protection mode corresponding to the first account information of the first terminal, and then login request information sent by other acquired terminals, such as a second terminal, is processed according to the account protection strategy so as to determine whether the second terminal is allowed to login the second application with the first account information; therefore, the purpose of providing security protection for sharing the first account information is achieved by utilizing the first application.
In addition, the account protection mode can be set at will according to the requirements of the user, so that the embodiment of the invention can also meet the requirements of different users and provide protection of different requirements for different account information.
Method embodiment two
In this embodiment, a verification list is set in the first application, and identification information corresponding to a terminal that has undergone identity verification and passes verification is stored in the verification list; specifically, after the first terminal performs identity authentication and passes the authentication, the authentication list stores identification information corresponding to the first terminal, so that when the first terminal logs in the second application again with the first account information, the second application can be successfully logged in without performing identity authentication; that is to say, as long as the first account information can successfully log in the second application in any other terminal, the first application can acquire the terminal device information of the terminal that successfully logs in the second application by using the first account information, for example, acquire the identification information of the terminal device information, and store the identification information represented by the acquired terminal device information in the verification list of the first application, so that when the terminal corresponding to the identification information in the verification list again logs in the second application by using the first account information, identity verification is not required, password protection is provided for the first account information, the purpose of simplifying user operation is achieved, and user experience is improved.
In a specific embodiment, the authentication list not only stores identification information of a terminal that has undergone authentication and can successfully log in the second application by using the first account information after passing the authentication, but also stores identification information of a terminal that has undergone authentication and can successfully log in the first application by using the first account information after passing the authentication. In other words, the identification information of the terminal capable of successfully logging in the first application or the second application by using the first account information is stored in the verification list, so that the user operation is further simplified, and the user experience is improved.
In practical application, the process of storing the identification information corresponding to the terminal in the verification list may be automatic or non-automatic; that is, when a first application detects that there is identification information of a terminal that needs to be stored in the authentication list, the first application automatically stores the identification information of the terminal that needs to be stored in the authentication list; the user can also be prompted in a message prompting mode, and whether the identification information of the terminal needing to be stored is stored in the verification list or not is determined according to user operation. Here, the identification information of the terminal that needs to be stored is identification information corresponding to a terminal that has passed authentication and has successfully logged in the first application or the second application using the first account information, and that does not exist in the authentication list.
The above process of the embodiment of the present invention is further described in detail by specific application scenarios;
the application scene one:
as shown in fig. 5, the information processing method includes:
step 501: when a first terminal runs a first application, login request information sent by a second terminal is obtained; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
step 502: detecting an account protection mode corresponding to the first account information;
step 503: generating a second account protection strategy when the account unlocking mode corresponding to the first account information is detected;
step 504: generating second prompt information according to the second account protection strategy;
step 505: receiving user operation based on the second prompt message;
in practical applications, the user operation may specifically be a click operation, for example, a user performs a click operation according to the interface display shown in fig. 4; wherein, the "is my operation" means that the second terminal is granted the right to log in the second application with the first account information; the "refusal" means that the second terminal is restricted from logging in the second application with the first account information. This embodiment takes the user clicking "yes me operation" as an example.
Step 506: generating second response information according to the user operation; the second response information is used for representing information of the authority granted to the second terminal for logging in the second application by the first account information, so that the second terminal can successfully log in the second application by using the first account information;
step 507: analyzing the login request information to obtain identification information corresponding to the second terminal;
in practical applications, the execution ofstep 507 may be performed in any step afterstep 501 and beforestep 507, and the execution order ofstep 507 is not limited in this embodiment.
Step 508: and storing the identification information in an authentication list so that a second terminal corresponding to the stored identification information has the authority of logging in a second application by using the first account information.
FIG. 6 is a schematic diagram of a verification list interface in a first application according to an embodiment of the present invention; as shown in fig. 6, the identification information in the verification list is presented in the first application, so as to facilitate the user identification; furthermore, when the user does not want to grant the right to the terminal corresponding to the identification information in the verification list, only the identification information in the verification list needs to be deleted; that is, after a certain identification information is deleted from the authentication list, when the terminal corresponding to the deleted identification information uses the first account information to log in the first application or the second application again in advance, the identity authentication is required. Here, the verified device shown in fig. 6 is the verification list according to the embodiment of the present invention, and the three mobile phone models below the verified device are the identification information of the terminal according to the embodiment of the present invention.
In a specific embodiment, after the second terminal successfully logs in the second application by using the first account information and goes offline, the second terminal logs in the second application by using the first account information again, and at this time, the specific steps are as follows:
after the first terminal acquires the login request information sent by the second terminal again, analyzing the acquired login request information again to obtain target identification information;
judging whether the target identification information is stored in the verification list or not;
when the first account information is stored in the verification list, generating third response information, and sending the third response information to the second terminal so as to grant the second terminal the right to log in the second application by using the first account information;
and when the second application is not stored in the verification list, generating fourth response information, and sending the fourth response information to the second terminal so as to limit the authority of the second terminal to log in the second application by using the first account information.
Therefore, when the target identification information is stored in the verification list, the second terminal can log in the second application by reusing the first account information without identity verification, so that the user operation is simplified, and the user experience is improved.
Application scenario two:
when a target terminal pre-utilizes the first account information to log in the second application, the target terminal sends login request information to the first terminal, at the moment, the first terminal detects an account protection mode corresponding to the first account information, when the account protection mode is detected to be an account unlocking mode, the first terminal analyzes identification information corresponding to the login request information sent by the target terminal through the first application and judges whether the analyzed identification information corresponding to the target terminal is stored in the verification list, and when the analyzed identification information is stored in the verification list, the first terminal directly generates third response information and sends the third response information to the target terminal so as to grant the target terminal the right of logging in the second application with the first account information;
when the account number is not stored in the verification list, the first terminal generates a second account number protection corresponding to the account number unlocking mode, and generates second prompt information according to the second account number protection strategy; receiving user operation based on the second prompt message; and generating second response information according to the user operation, so as to grant the target terminal the right to log in the second application with the first account information through the second response information, or limit the right to log in the second application with the first account information through the second response information.
Application scenario three
When a target terminal pre-utilizes the first account information to log in the second application, the target terminal sends login request information to the first terminal, at the moment, the first terminal detects an account protection mode corresponding to the first account information, and when the account protection mode is detected to be an account locking mode, a first account protection strategy corresponding to the account locking mode is generated; generating first response information corresponding to login request information sent by the target terminal according to the first account protection strategy; and sending the first response information to limit the authority of the target terminal for logging in the second application by the first account information.
Method embodiment three
FIG. 7 is a schematic diagram of a second implementation flow of the information processing method according to the embodiment of the present invention; the method is applied to a first terminal; in this embodiment, the account protection mode in the first method embodiment includes: an account locking mode and an account unlocking mode; as shown in fig. 7, the method includes:
step 701: when a first terminal runs a first application, login request information sent by a second terminal is obtained; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
step 702: detecting an account protection mode corresponding to the first account information;
step 703: generating a first account protection strategy when detecting that the account locking mode corresponding to the first account information is detected; subsequently, steps 704 to 705 are performed;
in this embodiment, when the first terminal detects that the account locking mode corresponding to the first account information is executed, the first account information is locked for all services, that is, any device cannot log in the second application by using the first account information, so that the risk that other users steal the first account information is reduced to the maximum extent. Fig. 8 is a schematic view of an account locking interface in a first application according to an embodiment of the present invention, and as shown in fig. 8, all locking services for a second application corresponding to first account information are implemented through an "account lock" in the first application, so that a risk that other users maliciously utilize the first account information is reduced. After the risk is relieved, or when the user needs to log in a second application by using the first account information, account unlocking processing is performed on the first account information by using the schematic diagram shown in fig. 9.
Step 704: generating first response information corresponding to the login request information according to the first account protection strategy;
step 705: and sending the first response information to limit the authority of the second terminal for logging in the second application by the first account information.
Step 706: generating a second account protection strategy when the account unlocking mode corresponding to the first account information is detected;
in this embodiment, the account unlocking mode is that an "account lock" in the first application is in a state shown in fig. 9, and at this time, the first account information is in an account unlocking state.
Step 707: generating second prompt information according to the second account protection strategy;
step 708: receiving user operation based on the second prompt message;
step 709: generating second response information according to the user operation; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information.
In practical applications, the user operation may specifically be a click operation, for example, a user performs a click operation according to the interface display shown in fig. 4; wherein, the "is my operation" means that the second terminal is granted the right to log in the second application with the first account information; the "refusal" means that the second terminal is restricted from logging in the second application with the first account information.
In a specific embodiment, when the user operation is an operation of "yes operation", at this time, the second response information is information that grants the second terminal the right to log in the second application with the first account information, so that the second terminal can successfully log in the second application with the first account information through the second response information; further, after the second terminal successfully logs in the second application with the first account information, the method further includes:
the first terminal detects the operation parameter information corresponding to the second application login of the second terminal;
judging whether the operation parameter information meets a preset condition or not;
when the operation parameter information does not meet the preset condition, the first terminal starts an account locking mode through the first application;
and generating a control instruction according to the account locking mode, and sending the control instruction to the second terminal so as to limit the right of the second terminal to log in the second application by using the first account information, so that the first account information corresponding to the second application is offline in the second terminal.
Here, the operation parameter information may be specifically an operation time, and correspondingly, the preset condition may be that the operation time is less than a first time; when the operation parameter information does not meet the preset condition, that is, when the operation time is greater than the first time, the first terminal starts an account locking mode through the first application, that is, locks all services of the first account information, so that the first account information corresponding to the second terminal is forced to be offline, and thus, the access time of the second terminal is limited. At this time, in order to further protect the security of the first account information, the user may modify the password in the first account information through a "modify password" service in the first application as shown in fig. 10, so as to prevent the first account information from being leaked.
In a specific embodiment, when the second terminal successfully logs in the second application by using the first account information, and the first application stores the identification information of the second terminal in the authentication list according to the manner described in the second embodiment of the method, at this time, the user may further delete the identification information corresponding to the second terminal from the authentication list, so that the second terminal is prevented from maliciously logging in the second application. That is, when the second terminal logs in the second application with the first account information again in advance, the second terminal needs not only the user name and the password represented by the first account information, but also needs to initiate login request information to the first application of the first terminal, and can log in the second application with the first account information again after authorization, so that the purpose of security protection of the first account information is achieved.
Apparatus embodiment one
Fig. 11 is a schematic structural diagram of a first terminal according to an embodiment of the present invention; as shown in fig. 11, the first terminal includes:
the obtaining unit 11 is configured to obtain login request information sent by a second terminal when a first application is run by a first terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound with the first application;
the detection unit 12 is configured to detect an account protection mode corresponding to the first account information;
a policy generating unit 13, configured to generate an account protection policy corresponding to the account protection mode according to the account protection mode;
and the processing unit 14 is configured to process the login request information based on the account protection policy to determine whether to allow the second terminal to login to the second application with the first account information.
In this embodiment, the account protection mode includes: an account locking mode;
the policy generation unit is further configured to generate a first account protection policy when detecting that the account locking mode corresponds to the first account information;
the processing unit is further configured to generate first response information corresponding to the login request information according to the first account protection policy; and the second terminal is further used for sending the first response information so as to limit the authority of the second terminal for logging in the second application by the first account information.
In this embodiment, the account protection mode includes: an account unlocking mode;
the policy generation unit is further configured to generate a second account protection policy when detecting that the account unlocking mode corresponds to the first account information;
the processing unit is further configured to generate second prompt information according to the second account protection policy; receiving user operation based on the second prompt message; generating second response information according to the user operation; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information.
In this embodiment, the account protection mode includes: an account locking mode; the first terminal further comprises: the device comprises a first judging unit, a starting unit and an instruction generating unit; wherein,
the detection unit is further configured to detect, by the first terminal, operation parameter information corresponding to the second application logged in by the second terminal when the second terminal logs in the second application with the first account information;
the judging unit is used for judging whether the operation parameter information meets a preset condition or not;
the starting unit is used for starting an account locking mode by the first terminal through the first application when the operation parameter information does not meet the preset condition;
the instruction generating unit is used for generating a control instruction according to the account locking mode and sending the control instruction to the second terminal so as to limit the right of the second terminal to log in the second application by using the first account information and enable the first account information corresponding to the second application to be offline in the second terminal.
In this embodiment, the login request information may represent identification information corresponding to the second terminal;
the first terminal further comprises:
the analysis unit is used for analyzing the login request information to obtain identification information corresponding to the second terminal;
and the storage unit is used for storing the identification information in an authentication list so that a second terminal corresponding to the stored identification information has the authority of logging in a second application by using the first account information.
In this embodiment, the first terminal further includes: a second judgment unit and a response information generation unit; wherein,
the analysis unit is further configured to, after the first terminal acquires the login request information sent by the second terminal again, analyze the login request information acquired again to obtain target identification information;
the second judging unit is further configured to judge whether the target identification information is stored in the verification list;
the response information generating unit is further configured to generate third response information when the third response information is stored in the verification list, and send the third response information to the second terminal, so as to grant the second terminal the right to log in the second application with the first account information;
and the authentication server is further used for generating fourth response information when the fourth response information is not stored in the authentication list, and sending the fourth response information to the second terminal so as to limit the authority of the second terminal to log in the second application by using the first account information.
It should be understood by those skilled in the art that the functions of each processing unit in the first terminal according to the embodiment of the present invention may be understood by referring to the description of the information processing method, and each processing unit in the first terminal according to the embodiment of the present invention may be implemented by an analog circuit that implements the functions described in the embodiment of the present invention, or may be implemented by running software that performs the functions described in the embodiment of the present invention on an intelligent terminal.
Method example four
FIG. 12 is a third schematic flow chart illustrating an implementation of the information processing method according to the embodiment of the present invention; the method is applied to a second terminal, and as shown in fig. 12, the method includes:
step 1201: the second terminal sends login request information to the first terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound by the first terminal when running a first application;
step 1202: receiving authorization information whether the first terminal allows the second terminal to log in the second application by the first account information or not;
step 1203: and determining whether the second application can be successfully logged in by the first account information according to the authorization information.
In this embodiment, the receiving authorization information whether the first terminal allows the second terminal to log in the second application with the first account information includes:
receiving first response information, wherein the first response information is used for representing response information obtained by processing the login request information when the first terminal is in an account locking mode;
the determining whether the second application can be successfully logged in with the first account information according to the authorization information includes: and limiting the second terminal to log in the second application by the first account information according to the first response information.
In this embodiment, the receiving authorization information whether the first terminal allows the second terminal to log in the second application with the first account information includes:
receiving second response information sent by the second terminal, wherein the second response information is obtained according to user operation when the first terminal is in an account unlocking mode; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information;
the determining whether the second application can be successfully logged in with the first account information according to the authorization information includes: and determining whether the second application can be successfully logged in by the first account information according to the second response information.
In this embodiment, the method further includes:
receiving a control instruction sent by the first terminal;
and limiting the right of the second terminal to log in the second application by the first account information according to the control instruction, so that the first account information corresponding to the second application is offline in the second terminal.
In this embodiment, the second terminal is a terminal that performs information interaction with the first terminal, and a specific implementation process of the second terminal may refer to the description related to the first to third method embodiments.
Device embodiment II
Fig. 13 is a schematic structural diagram of a second terminal according to an embodiment of the present invention; as shown in fig. 13, the second terminal includes:
a sending unit 21, configured to send login request information to the first terminal by the second terminal; the login request information is used for requesting to login a second application in the second terminal by using first account information; the first account information is used for representing account information bound by the first terminal when running a first application;
a receiving unit 22, configured to receive authorization information whether the first terminal allows the second terminal to log in the second application with the first account information;
a determining unit 23, configured to determine whether the second application can be successfully logged in with the first account information according to the authorization information.
In this embodiment, the receiving unit is further configured to receive first response information, where the first response information is used to represent response information obtained by processing the login request information when the first terminal is in an account locking mode;
the determining unit is further configured to limit the second terminal to log in the second application with the first account information according to the first response information.
In this embodiment, the receiving unit is further configured to receive second response information sent by the second terminal, where the second response information is obtained according to a user operation when the first terminal is in an account unlocking mode; the second response information is used for representing information which is granted to the second terminal to log in the second application with the first account information, or representing information which limits the second terminal to log in the second application with the first account information;
the determining unit is further configured to determine whether the second application can be successfully logged in with the first account information according to the second response information.
In this embodiment, the second terminal further includes: an instruction execution unit; wherein,
the receiving unit is further configured to receive a control instruction sent by the first terminal;
the instruction execution unit is configured to limit, according to the control instruction, the right of the second terminal to log in the second application with the first account information, so that the first account information corresponding to the second application is offline in the second terminal.
It should be understood by those skilled in the art that the functions of the processing units in the second terminal according to the embodiment of the present invention may be understood by referring to the description of the information processing method, and the processing units in the second terminal according to the embodiment of the present invention may be implemented by analog circuits that implement the functions described in the embodiment of the present invention, or by running software that performs the functions described in the embodiment of the present invention on an intelligent terminal.
According to the information processing method and the terminal thereof, an account protection strategy can be generated by detecting an account protection mode corresponding to the first account information of the first terminal, and then login request information sent by other acquired terminals, such as a second terminal, is processed according to the account protection strategy so as to determine whether the second terminal is allowed to login the second application with the first account information; therefore, the purpose of providing security protection for sharing the first account information is achieved by utilizing the first application.
Moreover, the account protection mode can be set at will according to the requirements of the user, so that the embodiment of the invention can also meet the requirements of different users and provide protection of different requirements for different account information.
In addition, in the embodiment of the present invention, when the second terminal logs in the second application by using the first account information, not only the user name and the password represented by the first account information are required, but also login request information needs to be sent to the first application, and then it is determined whether to grant the second terminal the right to log in the second application by using the first account information according to the account protection mode of the first account information through the first application, so that on the premise of account sharing, the protection of the first account information is achieved, and the user experience is improved.
In summary, the information processing method and the terminal according to the embodiments of the present invention can select the account protection mode corresponding to the account information according to the user requirement, so as to achieve the purpose of differential protection for different accounts of different users; and on the premise of account sharing, the first account information can be protected to the maximum extent, so that the protection requirement of a user on the account information is met, the user experience is enriched, and the user experience is also improved.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.