[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN114861154B - Collaborative login method - Google Patents

Collaborative login method Download PDF

Info

Publication number
CN114861154B
CN114861154B CN202210778039.0A CN202210778039A CN114861154B CN 114861154 B CN114861154 B CN 114861154B CN 202210778039 A CN202210778039 A CN 202210778039A CN 114861154 B CN114861154 B CN 114861154B
Authority
CN
China
Prior art keywords
login
dimensional code
application
information
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210778039.0A
Other languages
Chinese (zh)
Other versions
CN114861154A (en
Inventor
徐健杰
刘文浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202210778039.0A priority Critical patent/CN114861154B/en
Publication of CN114861154A publication Critical patent/CN114861154A/en
Application granted granted Critical
Publication of CN114861154B publication Critical patent/CN114861154B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application discloses a collaborative login method, and relates to the field of electronic equipment, so that a user can conveniently complete the effect of code scanning login through a small amount of operation on a computer. The specific scheme is as follows: and displaying a login two-dimensional code, wherein the login two-dimensional code is used for logging in the first application program or the first website. And sending a first message to the second electronic equipment, wherein the first message comprises the image information of the login two-dimensional code. And receiving display information of the authorized login interface from the second electronic equipment, wherein the display information of the authorized login interface is automatically acquired by the second electronic equipment. And displaying an authorized login interface in the first collaboration window according to the display information of the authorized login interface, wherein the authorized login interface comprises a first option, and the first option corresponds to an authorized login function. And receiving a first operation of a user in the first collaboration window, wherein the first operation is an operation on a first option. And responding to the first operation, and logging in the first application program or the first website through the first account information.

Description

Collaborative login method
Technical Field
The application relates to the technical field of electronic equipment, in particular to a collaborative login method.
Background
Currently, a user often encounters a scenario of a login account when viewing a network resource using a first electronic device (e.g., a computer). By logging in the account on the computer, the computer can provide resources matched with the login account for the user.
Code scanning login is an account login mode frequently provided by a computer. When the account needs to be logged in, the computer can display the login two-dimensional code for the user. The user can use second electronic equipment such as a mobile phone and the like which has logged in the account to scan the login two-dimensional code, so that login operation on the computer is authorized, and login on the computer is realized.
However, this process requires the user to operate two electronic devices at the same time or the user has many operation steps, which is inconvenient to implement.
Disclosure of Invention
The embodiment of the application provides a collaborative login method to improve human-computer interaction efficiency.
In order to achieve the above purpose, the embodiments of the present application adopt the following technical solutions:
in a first aspect, a collaborative login method is provided, which is applied to a first electronic device, where the first electronic device displays a first collaborative window, and interface elements displayed in the first collaborative window are the same as interface elements of a second electronic device. The second electronic device has the capability of authorizing login of the first application program or a first website through the first account information on the first electronic device, wherein the first website is a website corresponding to the first application program. The method comprises the following steps: and displaying a login two-dimensional code, wherein the login two-dimensional code is used for logging in the first application program or the first website. And sending a first message to the second electronic equipment, wherein the first message comprises the image information of the login two-dimensional code. And receiving display information of an authorized login interface from the second electronic equipment, wherein the display information of the authorized login interface is acquired after the second electronic equipment automatically analyzes the image information of the login two-dimensional code by using the first application program after acquiring the first message. And displaying the authorized login interface in the first collaboration window according to the display information of the authorized login interface, wherein the authorized login interface comprises a first option, and the first option corresponds to an authorized login function. And receiving a first operation of a user in the first collaboration window, wherein the first operation is an operation on the first option. And responding to the first operation, and logging in the first application program or the first website through the first account information. The operation performed by the second electronic device automatically using the first application may be an operation performed by the second electronic device itself without receiving any instruction from the user.
Thus, the first electronic device is taken as a computer as an example. Under the two-dimension code login scene, the code scanning login of the current website or application can be realized only by inputting a first operation on a computer by a user. And the user does not need to use the mobile phone for operation. Therefore, the operation complexity of the user in the code scanning login scene can be obviously reduced, and the code scanning login convenience is improved.
In one example, the method further comprises: determining that the current interface comprises a login two-dimensional code, and acquiring first image information, wherein the first image information comprises the image information of the login two-dimensional code. The scheme provides a trigger mechanism for acquiring the image information of the two-dimensional code, and if the current interface is determined to comprise the login two-dimensional code, the computer can acquire the image information of the two-dimensional code by itself.
In one example, the determining the current interface includes logging in a two-dimensional code, including: and determining that the current interface comprises a login two-dimensional code according to the first identifier included in the website information. Therefore, the computer can accurately determine that the current interface comprises the login two-dimensional code according to the characteristics of the website information, and the acquisition of the image information of the two-dimensional code can be triggered.
In one example, the first identification comprises: login is registered. For example, the characteristics of the website information may include a login character, and it may be determined whether the current website includes the character. In other implementations, the first identification may also include: a specific character or character string related to a scan of a two-dimensional code registration scene, such as "scan" or "QR code".
In one example, before obtaining the image information of the login two-dimensional code, the method further includes: a screenshot button is displayed on the first collaboration window. The acquiring of the first image information includes: and receiving a second operation of the user, wherein the second operation is the operation of the screenshot button. And acquiring the first image information in response to the second operation. Therefore, the user can know that the two-dimensional code can be intercepted and operated by showing the newly added button to the user on the cooperative display interface, and the user can conveniently control the computer to acquire the login two-dimensional code. For example, the second operation may include an operation of clicking a screenshot button, so that the computer may obtain the information of the two-dimensional code in the current focus interface by itself after receiving the second operation. As another example, the second operation may include a series of instruction operations, such as clicking a screenshot button, selecting a screenshot area, and the like.
In one example, the obtaining the first image information in response to the second operation includes: and receiving a third operation of the user, wherein the third operation indicates that a first area is selected on the current interface, and the login two-dimensional code is displayed in the first area. And intercepting the image of the first area, acquiring the image information of the first area, and determining the image information of the first area as the first image information. Thus, the computer can accurately acquire the image information of the first area including the two-dimensional code under the control of the user. For example, the third operation may include an operation of selecting the first region on the current interface by the user input.
In one example, the obtaining the first image information in response to the second operation includes: and intercepting the currently displayed complete image, acquiring the image information of the currently displayed complete image, and determining the image information of the complete image as the first image information. The second operation may be equivalent to an authorized instruction for the computer to acquire the currently displayed interface, and then the computer may acquire the image information of the currently displayed complete image by itself after receiving the second operation. The image information of the full image may be image information of a full-screen image.
In one example, the obtaining the first image information in response to the second operation includes: and intercepting an image displayed by the current focus window, acquiring image information of the focus window, and determining the image information of the focus window as the first image information. Thus, the computer can obtain the image information of the image displayed on the current focus window (or focus interface) by itself. The image may include a login two-dimensional code.
In one example, the first message further includes application information of the first application, the application information including at least one of: the package name of the first application program, the special field corresponding to the first application program, the keyword corresponding to the first application program and the identification of the first application program. Therefore, the computer can send the application information to the mobile phone together, and the step that the mobile phone obtains the application information through analysis according to the two-dimensional code is avoided.
In one example, a first corresponding relationship is set in the first electronic device, and the first corresponding relationship includes a corresponding relationship between at least one piece of website information and application information. The method further comprises the following steps: and determining the application information of the first application according to the website information accessed by the current focus window and the first corresponding relation. The first electronic device may determine application information of the application to be currently logged in according to a preset corresponding relationship, so as to send the application information to a second electronic device (e.g., a mobile phone).
In one example, the method further comprises: and determining the application information of the first application according to the image information of the login two-dimensional code. Therefore, the computer can analyze the acquired information of the two-dimensional code to determine corresponding application information and send the application information to the mobile phone.
In one example, the focus window is a browser window that accesses the first web address or the focus window is a display window of the first application.
In a second aspect, a collaborative login method is provided, which is applied to a second electronic device, where the second electronic device establishes multi-screen collaborative communication with a first electronic device, and the second electronic device has a capability of authorizing to login a first application or a first website on the first electronic device through first account information, where the first website is a website corresponding to the first application. The method comprises the following steps: when the first electronic device needs to log in the first application program or the first website, the second electronic device acquires a first message from the first electronic device, wherein the first message comprises image information of a log-in two-dimensional code. The second electronic equipment analyzes the image information of the login two-dimensional code by using the first application program to obtain an authorized login interface, and the first option corresponds to an authorized login function. And the second electronic equipment sends the authorization login interface to the first electronic equipment. When the first electronic device receives a first operation of the first option in the authorized login interface by a user, the second electronic device instructs the first electronic device to login the first application program or the first website through the first account information.
Exemplarily, the second electronic device is taken as a mobile phone. The mobile phone can acquire image information of the login two-dimensional code displayed on the computer, and open the corresponding application according to the scheme provided by the example to scan the two-dimensional code so as to acquire the corresponding authorization interface. The process does not require any operation on the handset by the user. Based on multi-screen cooperation, the authorization interface acquired on the mobile phone can be synchronously displayed on the computer, so that a user can complete login scanning of the two-dimensional code only by operating on the computer.
In one example, before the first electronic device uses the first application program to parse the image information of the login two-dimensional code, the method further includes: and analyzing the image information of the login two-dimensional code, and determining the application information of the first application program. The application information includes at least one of: the package name of the first application program, the special field corresponding to the first application program, the keyword corresponding to the first application program and the identification of the first application program. And running the first application program according to the application information of the first application program. Therefore, the mobile phone can determine and run the corresponding application program according to the image information of the two-dimensional code. This example provides a scheme for determining an application program by a mobile phone, that is, application information of the application is obtained by analyzing a two-dimensional code.
In one example, the parsing the image information of the login two-dimensional code to determine the application information of the first application includes: and operating a second application program in the second electronic equipment, wherein the second application program has a function of identifying the two-dimensional code. And analyzing the image information of the login two-dimensional code by using the second application program to acquire a corresponding first link. And determining the application information of the first application program according to the first link. In this example, the mobile phone may determine the application information by a two-dimensional code scanning function set therein to acquire the corresponding link.
In one example, a two-dimensional code parsing module is disposed in the second electronic device, and the parsing the image information of the login two-dimensional code to determine the application information of the first application program includes: and analyzing the image information of the login two-dimensional code by using the two-dimensional code analysis module to obtain a corresponding first link. And determining the application information of the first application program according to the first link.
In one example, a second corresponding relationship is set in the second electronic device, and the second corresponding relationship comprises a corresponding relationship between at least one special field and application information. The determining the application information of the first application program according to the first link includes: and the second electronic equipment determines the application information corresponding to the first special field as the application information of the first application program according to the second corresponding relation, wherein the first special field is included in the first link. Thus, the mobile phone can determine the application program needing to be opened by itself.
In one example, the method further comprises: the second electronic device generates at least one simulated click event, the at least one simulated click event is used for carrying out simulated click on the interface of the first application program, and the first application program is controlled to execute the two-dimensional code scanning function through the simulated click. The second electronic device analyzes the image information of the login two-dimensional code by using the first application program, and the method comprises the following steps: and the second electronic equipment controls the two-dimensional code scanning function of the first application program and analyzes the image information of the login two-dimensional code. Therefore, by simulating the click event, the manual operation of a user is avoided, and the mobile phone automatically scans the two-dimensional code.
In an example, the first application program obtains image information acquired by a camera of the second electronic device, and analyzes the image information acquired by the camera to implement a two-dimensional code scanning function of the first application program. The second electronic device controls the two-dimensional code scanning function of the first application program, analyzes the image information of the login two-dimensional code, and comprises: the second electronic equipment replaces the image information collected by the camera with the image information of the login two-dimensional code, so that the first application program analyzes the image information of the login two-dimensional code. In this way, by replacing the data collected in real time, the login two-dimensional code can be transmitted to the application program for scanning.
In one example, the first application program obtains image information stored in a gallery of the second electronic device, and analyzes the image information stored in the gallery to implement a two-dimensional code scanning function of the first application program. The second electronic device controls the two-dimensional code scanning function of the first application program, analyzes the image information of the login two-dimensional code, and comprises: the second electronic equipment controls the first application program, and the image information of the login two-dimensional code is obtained from the gallery, so that the first application program analyzes the image information of the login two-dimensional code. In this way, the stored two-dimensional code can be extracted from the gallery, so that the application program can conveniently scan and enter the authorized login interface.
In one example, the method further comprises: the second electronic device monitors display information of the current interface. The second electronic device sends the authorized login interface to the first electronic device, including: and when the display information of the current interface comprises a second identifier, sending the current interface to the first electronic equipment, wherein the current interface is an authorized login interface, and the second identifier is included in the display information of the authorized login interface. Therefore, the current interface is determined to comprise the authorized login interface through the second identifier, so that the mobile phone can send the interface information to the computer for synchronous display through a multi-screen cooperation mechanism.
In a third aspect, an electronic device is provided that includes one or more processors and one or more memories. The one or more memories coupled with the one or more processors, the one or more memories storing computer instructions. The computer instructions, when executed by the one or more processors, cause the electronic device to perform the collaborative login method as provided by the first aspect and any example thereof. The scheme can be applied to first electronic equipment (such as a computer).
In a fourth aspect, an electronic device includes one or more processors and one or more memories. The one or more memories coupled with the one or more processors, the one or more memories storing computer instructions. The computer instructions, when executed by the one or more processors, cause the electronic device to perform a collaborative login method as provided by the second aspect and any of its examples. For example, the electronic device may be a mobile phone.
In a fifth aspect, a communication system is provided, the communication system comprising the electronic device as provided in the third aspect, and the electronic device as provided in the fourth aspect.
A sixth aspect provides a computer readable storage medium comprising computer instructions which, when run on an electronic device, cause the electronic device to perform a collaborative login method as provided by the first aspect and any of its examples, or to perform a collaborative login method as provided by the second aspect and any of its examples.
In a seventh aspect, a system-on-chip is provided that includes an interface circuit and a processor. The interface circuit and the processor are interconnected by a line. The interface circuit is configured to receive signals from the memory and to send signals to the processor, the signals including computer instructions stored in the memory. When the processor executes the computer instructions, the system-on-chip performs the collaborative login method as provided by the first aspect and any example thereof, or performs the collaborative login method as provided by the second aspect and any example thereof.
In an eighth aspect, a collaborative login method is provided. This scheme may correspond to the example of the scheme shown in fig. 24 of the present application. The method can comprise the following steps: the first electronic equipment displays a login two-dimensional code, and the login two-dimensional code is used for logging in the first application program or the first website. And the first electronic equipment sends a first message to the second electronic equipment, wherein the first message comprises the image information of the login two-dimensional code. The second electronic device receives the first message. And responding to the first message, the second electronic equipment displays an authorized login interface, and the authorized login interface is obtained and displayed by the second electronic equipment through the first application program automatically scanning and logging in the two-dimensional code. And the first electronic equipment logs in the first application program or the first website after the second electronic equipment receives the authorization operation of the user on the authorization login interface.
Therefore, the first electronic device (such as a computer) and the second electronic device (such as a mobile phone) do not need to be based on multi-screen cooperation, and most operations in the two-dimensional code scanning process can be saved for a user. In this example, after the login two-dimensional code is displayed on the computer, the mobile phone can automatically display a corresponding authorized login interface to the user without the operation of the user. Therefore, the user can directly perform related authorization operation on the authorization login interface of the mobile phone, and the effect of scanning and logging in the two-dimensional code can be achieved.
It should be understood that, technical features of the solutions provided in the third to seventh aspects may all correspond to the collaborative login method provided in the first and/or second aspect and the examples thereof, so that beneficial effects that can be achieved are similar and are not described herein again.
Drawings
FIG. 1 is a schematic diagram of a control computer for code scanning registration;
FIG. 2 is a schematic diagram of two-dimensional code scanning authorization using a mobile phone;
FIG. 3 is a schematic diagram of an account login on a computer after authorization using a mobile phone;
fig. 4 is a schematic diagram of a collaborative login scheme provided in an embodiment of the present application;
fig. 5 is a schematic diagram illustrating a communication system according to an embodiment of the present application;
fig. 6 is a schematic diagram of multi-screen coordination according to an embodiment of the present disclosure;
fig. 7 is a schematic composition diagram of a first electronic device according to an embodiment of the present disclosure;
fig. 8 is a schematic composition diagram of a second electronic device according to an embodiment of the present application;
fig. 9 is a specific schematic diagram of a scheme for implementing collaborative login by acquiring application information through a manual screenshot and analyzing by a second electronic device according to an embodiment of the present application;
fig. 10 is a schematic diagram of acquiring a login two-dimensional code by a manual screenshot provided in an embodiment of the present application;
fig. 11 is a schematic diagram illustrating an implementation of obtaining application information by a second electronic device according to an embodiment of the present application;
fig. 12 is a schematic view of an implementation scheme of performing two-dimensional code parsing for login by a second electronic device according to an embodiment of the present application;
fig. 13 is a schematic view of another implementation scheme for performing login two-dimensional code analysis by second electronic equipment according to an embodiment of the present application;
fig. 14 is a schematic diagram of a scheme for prompting installation of the application 1 according to an embodiment of the present application;
fig. 15 is a schematic diagram illustrating a module interaction flow of a collaborative login scheme according to an embodiment of the present application;
fig. 16 is a specific schematic diagram of a scheme for implementing collaborative login by acquiring application information through a manual screenshot and analyzing by a first electronic device according to an embodiment of the present application;
FIG. 17 is a schematic diagram illustrating a module interaction flow of another collaborative login scheme according to an embodiment of the present application;
fig. 18 is a specific schematic diagram illustrating a scheme for implementing collaborative login by analyzing and acquiring application information through an automatic screenshot and a first electronic device according to an embodiment of the present application;
FIG. 19 is a schematic diagram illustrating a module interaction flow of another collaborative login scheme according to an embodiment of the present application;
FIG. 20 is a flowchart illustrating an interaction between electronic devices according to an embodiment of the present application;
fig. 21 is a schematic diagram of a system account fast login provided in an embodiment of the present application;
FIG. 22 is a schematic flow chart illustrating interaction between electronic devices according to an embodiment of the present application;
fig. 23 is a schematic diagram illustrating implementation in a two-dimensional code payment scenario according to an embodiment of the present application;
FIG. 24 is a schematic diagram of yet another collaborative login scheme provided by an embodiment of the present application;
fig. 25 is a schematic composition diagram of an electronic device according to an embodiment of the present application;
fig. 26 is a schematic composition diagram of yet another electronic device provided in the embodiment of the present application;
fig. 27 is a schematic composition diagram of a chip system according to an embodiment of the present application.
Detailed Description
At present, among the rich functions provided by the electronic device to the user, a function of playing a network video may be included. For example, an electronic device is taken as a computer. The computer can provide a network video playing function for a user by running an installed video Application (APP) or accessing a video website through a webpage. Among them, the video-type program may be referred to as a video application for short. The user can input an instruction for playing a certain video on an interface corresponding to the video application or the video website. In response to the indication, the computer may retrieve the corresponding video from the server and play it, or the computer may read the video from the pre-cached video data and play it.
Generally, a plurality of corresponding examples of the network videos can be provided for the user to select on an interface corresponding to the video application or the video website. Then, in order to provide more personalized network video recommendations to the user, the electronic device may guide the user to log in. Therefore, the video application or the video website can provide video recommendation which is more consistent with the user expectation to the user according to the account which the user logs in.
As an example, an electronic device is a computer, and the computer provides a network video playing function to a user through a video website. Referring to fig. 1, an example of guiding a user to log on a video website is shown for a computer. The website address of the video website may be "website 1". The video website may correspond to an application program that can be installed on a mobile terminal (e.g., a mobile terminal, a tablet terminal, etc.), for example, the application program may be "application 1". As shown in fig. 1, after the electronic device accesses website 1 through a browser, interface 101 may be displayed in a browser window. Controls for directing a user to log in may be included in interface 101. For example, the control may be control 102 on interface 101. A user may input a corresponding operation to the control 102 through an input device (e.g., a mouse, a touch screen/pad, etc.) of a computer, where the operation may be a click operation, a touch operation, etc. In response to this operation, the computer may top-display the login window 103 in the browser window. By entering account information in the login window 103, the user can log in to the current video application. For example, the user may enter an account name and password in the login window 103 to log in. In another example, the user may also select a two-dimensional code scanning mode to log in. The user logs in the two-dimensional code scanning mode as an example. The user can click the two-dimensional code mark 104 in the login window 103 so as to instruct the computer to perform two-dimensional code scanning login. In response to this operation, the computer may display the login two-dimensional code 105 in the login window 103. The user can use the application 1 installed on other mobile terminals to perform login two-dimensional code scanning so as to realize login in the website 1 on the computer.
Take the example that the mobile phone end is installed with the application 1 and already logged in. The user can use the mobile phone to realize authorized login based on login two-dimensional code scanning on the website 1 on the computer. Referring to fig. 2, a user may click on an icon 201 of application 1 on the handset, indicating that the handset is running application 1. Correspondingly, the mobile phone may display the interface 202 of application 1. A function expansion button 203 may be included in the interface 202. The user can click the expansion button 203, and the corresponding mobile phone can set up the expansion menu 204 to display. A plurality of tabs for extended functions may be included in the extended menu 204, which may include a "scan" tab 205 that provides a function for scanning a two-dimensional code. The user may click on tab 205 and the corresponding application 1 instructs the handset to display a two-dimensional code scanning interface, such as interface 206. The two-dimensional code scanning area 207 in the interface 206 is aligned with the login two-dimensional code (such as the login two-dimensional code 105 shown in fig. 1) displayed on the computer, so that the mobile phone collects the two-dimensional code information and transmits the two-dimensional code information to the application 1 for analysis processing. Application 1 may then instruct the handset to skip to display the authorized login interface 208. An "authorize login" option 209 may be included in the authorize login interface 208. The user can click the "authorize login" option 209 to instruct authorization, and the computer side site 1 is authorized to be logged in from the mobile phone side. In response to the authorization indication, the computer side website 1 can log in through the account logged in on the mobile phone. For example, as shown in fig. 3, after the mobile phone side confirms the authorization, the same account can be registered in the website 1 of the computer side, and the registered information 301 is displayed on the interface. In the following example, an electronic device (e.g., a computer) that needs to log in through the two-dimensional code may be referred to as a device to be logged in. Correspondingly, a device (such as a mobile phone) which scans the two-dimensional code for authorized login can be called an authorized device.
Fig. 1-3 show examples of schemes for scanning a two-dimensional code displayed on a computer by a mobile phone so as to realize authorized login of a corresponding video website on the computer. It should be understood that, when the computer provides the network video display function through the video application, the login two-dimensional code displayed by the video application may also be scanned by the mobile phone for authorized login, and the specific implementation is similar.
It can be seen that, when a user uses multiple devices to perform two-dimensional code scanning login, more operations need to be input into the two devices respectively. Therefore, the two-dimensional code scanning and login process is complicated. In addition, when one of the devices is not near the user or additional operations cannot be input due to occupation of other functions, the two-dimensional code scanning login function cannot be used.
In order to solve the above problem, an embodiment of the present application provides an electronic device interaction scheme, which implements automatic operation in a two-dimensional code scanning scene through a multi-screen cooperative function of two devices. Therefore, the user only needs to input a small amount of operation on the equipment to be logged in, and the two-dimensional code scanning effect can be achieved. Such as two-dimensional code scanning registration. Therefore, the tedious operations of two-dimensional code scanning login are simplified, and meanwhile when the two devices establish multi-screen cooperative communication, even if the authorization device (such as the mobile phone in the example) is not near the user or cannot directly input additional operations, the user can continue to use the two-dimensional code scanning function provided by the authorization device.
Illustratively, by the scheme provided by the embodiment of the application, the quick two-dimensional code scanning login on a computer can be realized. For example, referring to fig. 4 in conjunction with the scene diagrams of fig. 1 to fig. 3, an example of two-dimensional code scanning and registration in the website 1 on a computer is taken as an example. After the user clicks the login button, the computer may display the login window at the top of its browser window. After the user clicks the two-dimensional code identification in the login window, the computer can display the login two-dimensional code in the login window. By applying the scheme provided by the embodiment of the application, the mobile phone can automatically acquire the login two-dimensional code on the computer based on multi-screen cooperation. The mobile phone can automatically enter a corresponding authorization interface according to the login two-dimensional code, and the authorization interface is delivered to a computer through multi-screen cooperation for display. Therefore, the user can display the authorization interface to the user in the mobile phone collaboration window after the computer displays the login two-dimensional code without operating on the mobile phone. Illustratively, the authorization interface may be as shown in authorization log-in interface 401 in FIG. 4. An option 402 to perform authorization may be included in the authorization login interface 401. After receiving a click or other selection operation of the user on the option 402, the computer may communicate with the mobile phone to complete the login authorization of the current website 1, and display a login interface of the website 1, such as the interface 403. Therefore, after the user selects to log in by scanning the two-dimensional code on the computer, the user can see the authorization interface on the computer without performing any operation on the mobile phone. The two-dimensional code can be registered by inputting an authorization operation (such as a selection operation on the option 402) on the computer.
It should be noted that fig. 4 shows that the scheme provided by the embodiment of the present application is only an example. In some implementations, after the computer displays the login two-dimensional code for the user, the computer automatically executes the relevant action and directly skips to display the authorized login interface. In other implementations, after the computer displays the login two-dimensional code for the user and before the authorized login interface is displayed, other jump interfaces can be displayed, so that the user can more clearly understand the automatic authorization process.
In addition, in order to enable the user to more clearly see the relevant information of the application displayed on the mobile phone collaboration window, information such as the name and/or icon of the current application (e.g., the application 1 corresponding to the website 1) may be displayed on a function bar or an interface on the mobile phone collaboration window.
The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
The scheme provided by the embodiment of the application can be applied to a two-dimensional code scanning scene comprising at least two electronic devices. Wherein the at least two electronic devices may include a device to be authorized and an authorization device. For example, as shown in fig. 5, the device to be authorized may be a first electronic device, and the authorization device may be a second electronic device. In conjunction with the foregoing description, the first electronic device may be the same as or different from the second electronic device. For example, the first electronic device may be a computer, and the second electronic device may be a mobile phone. In other implementations, the first electronic device and/or the second electronic device may also be a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), an Augmented Reality (AR) \ Virtual Reality (VR) device, a media player, or the like. The embodiment of the present application does not specifically limit the specific form of the apparatus.
In the following example, the device to be authorized is a computer, and the authorization device is a mobile phone. In the embodiment of the application, the computer and the mobile phone can perform multi-screen cooperative interaction. Exemplary, in connection with the example of fig. 6. After the multi-screen cooperative communication is established, a window 601 corresponding to the mobile phone may be displayed on the computer. The window 601 may also be referred to as a mobile phone system interface displayed on a computer. The elements displayed in the interface of the window 601 may include all elements currently displayed by the mobile phone. The displayed elements may include icons, identifications, and windows (such as time) corresponding to various applets on the interface. For example, in the example shown in fig. 6, taking a mobile phone as an example to display a desktop, all elements on the interface of the mobile phone interface can be displayed in the interface of the window 601 on the computer.
In some embodiments, the window 601 displayed on the computer may also include other functional options. Illustratively, as shown in fig. 6, in a window 601, a function bar 602 may be displayed on the upper side. More buttons not shown on the handset may be included in the function bar 602. For example, a minimize button, a maximize button, a close button, etc. may be displayed in the ribbon box 602. Thus, the user can instruct the computer to adjust the window 601 to be maximized, minimized, closed, etc. by operating the buttons in the function bar 602. Of course, the function bar 602 may be displayed at any position on the lower side or both sides of the window 601.
The electronic device provided by the embodiment of the application, such as a first electronic device (i.e., a device to be logged in) and a second electronic device (i.e., an authorization device), may have different compositions in different implementations.
Illustratively, from a hardware perspective, taking the authorization device as an example, the electronic device may include a processor, an external memory interface, an internal memory, a Universal Serial Bus (USB) interface, a charging management module, a power management module, a battery, an antenna 1, an antenna 2, a mobile communication module, a wireless communication module, an audio module, a sensor module, a button, a motor, an indicator, a camera, a display screen, a Subscriber Identity Module (SIM) card interface, and the like. The sensor module may include a pressure sensor, a gyroscope sensor, an air pressure sensor, a magnetic sensor, an acceleration sensor, a distance sensor, a proximity light sensor, a fingerprint sensor, a temperature sensor, a touch sensor, an ambient light sensor, a bone conduction sensor, and the like. In some embodiments, the electronic device may further include a speaker, a receiver, a microphone, a headphone jack, and the like for implementing audio-related functions of the electronic device.
It is to be understood that the above examples do not constitute a specific limitation on the electronic device. In other embodiments, electronic devices related to embodiments of the present application may include more or fewer components, or some components may be combined, some components may be separated, or different arrangements of components may be provided.
In other embodiments, from the perspective of software composition, an electronic device (such as the first electronic device and/or the second electronic device) related to the embodiment of the present application may run an operating system, which may be Windows, linux, IOS, android Toshy or other operating systems. The operating system may have a hierarchical architecture. The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface.
For example, the first electronic device is a computer, and the computer runs the Windows operating system. The Windows operating systems in computers can be generally classified into Kernel mode (Kernel Model) and User mode (User Model).
Code running in kernel mode may include core code that is secure and not vulnerable to malicious attacks. Code that runs in user mode (e.g., code for an application) is relatively less secure and vulnerable to attack. In some implementations, code execution permissions in user mode are limited, thereby increasing system security. In addition, if an application performs some action, such as directly accessing physical memory, a request needs to be made to a component in kernel mode. In this example, kernel mode may correspond to the operating environment of the operating system level code and user mode may correspond to the operating environment of the application.
As an implementation, the kernel mode and the user mode may be distributed in different privilege levels of a Central Processing Unit (CPU) in the computer to meet different operation requirements. Wherein, the CPU has a plurality of privilege layers, for example, the Intel 386CPU may comprise 4 privilege layers: from layer 0 to layer 3. Layer 0 is most privileged, i.e., any code can be executed. Layer 3 has the lowest privilege and can only execute limited code. Then, the kernel mode may run at layer 0 of the CPU and the user mode may run at layer 3 of the CPU.
The first electronic device may provide the user with various functions through the running Windows ® operating system. For example, an application may be provided in the user mode. Different applications may be used to provide different functionality. The application program may call the software/hardware of the first electronic device to implement the respective function by calling the respective component in the kernel mode.
Illustratively, fig. 7 shows a software composition diagram of a first electronic device. For example, the first electronic device runs with Windows operating system.
The first electronic device may have a user mode and a kernel mode set therein. The user mode is an upper layer, and a plurality of application programs can be installed and operated. In this example, the set of applications may constitute a first application layer. For example, the first application layer may be provided with a first screen projection module, a first decision module, a screen capture module, a message center, and the like. The first screen projection module is used for establishing multi-screen cooperative communication with other electronic equipment (such as second electronic equipment), and acquiring screen projection information of the second electronic equipment to display on the first electronic equipment. The first decision module is used for commanding acquisition and confirmation of various data information and is used as a processing center for data processing. The screenshot module is used for acquiring all or part of interface information displayed on a display screen of the first electronic device. The message center serves as an upper layer for realizing the limited/wireless communication between the first electronic equipment and the outside by calling other communication modules.
In other implementations, other components may also be included in the user mode. For example, the user mode may be provided with a subsystem corresponding to each application, and the subsystem may include win32, POSIX, OS/2, and the like. When the Application program runs, a Native Application Programming Interface (API) in the corresponding subsystem can be called to implement internal communication with the kernel mode. For example, an application calls an API function of the Win32 subsystem, and the Win32 subsystem converts the API function into a Native API (Native API). The Native API may correspond to a system service function, and the system service function may be transferred to the kernel mode to call a corresponding module to implement a corresponding function.
The kernel mode in the first electronic device may include an execution body component, a first hardware abstraction layer, a first kernel layer, and the like.
The executive component can be used for directly receiving the system service called by the application program through the Native API and carrying out corresponding response. Illustratively, the executive components may include input/output (I/O) managers, object managers, process management, virtual memory managers, configuration managers, and the like.
In this example, a visual system, and a first window manager may also be included in the executive component. Wherein the vision system can be used for image rendering according to instructions sent by the application program. For example, the vision system may receive a first display instruction issued after the first decision module determines that the two-dimensional code login interface is currently scanned. According to the first display instruction, the vision system can call other components to draw the image. For example, according to the first display instruction, the vision system calls a Graphics Processing Unit (GPU) to draw a display button on the mobile phone collaboration window. The vision system can also send the image information obtained by drawing to the first window management for displaying. For example, after establishing the multi-screen collaboration communication, the first window manager may instruct the first electronic device to display a cell phone collaboration window on the display screen. The first window manager may display the button on the mobile phone collaboration window after receiving drawing information of the display button transmitted by the vision system.
The first hardware abstraction layer may be provided with a communication component and a storage component. For example, the communication module may include a first WLAN module, a first bluetooth module, a first NFC module, and the like. Through the communication module, the first electronic device can realize wireless communication with other devices. For example, local area network communication via the first WLAN module, bluetooth communication via the first bluetooth module, near field communication via the first NFC module, etc. In this application, based on the communication function provided by the communication module, the first electronic device may perform data interaction with the second electronic device, such as transmitting two-dimensional code login information. The memory component may be used to provide memory functionality, for example, the memory assembly may include a first memory module.
Communication drivers between different software modules and hardware modules can be arranged in the first kernel layer. When the first kernel layer receives an instruction needing to call the hardware component, the corresponding driving module can be pulled up, information indicated by the instruction is transmitted to the hardware component, and corresponding correspondence is executed. In this example, the first core layer may include a first bluetooth driver, a first WLAN driver, a first NFC driver, and the like. In other examples, a first database driver may be further included in the first kernel layer, and is configured to implement communication between the software module and a storage component (e.g., a first storage module) during the process integration of the data. An Inter-Process Communication (IPC) Communication module may also be included in the first core layer. The IPC module can realize communication interaction among various software/hardware components in the first electronic equipment.
A hardware layer (not shown in fig. 7) may also be disposed in the first electronic device, and the hardware layer may include a plurality of hardware components, such as a camera, a memory, a processor, and the like. Through the calling of the software components, each component in the hardware layer can carry out corresponding correspondence, and corresponding functions are realized.
As shown in fig. 5, when the solution provided in the embodiment of the present application is applied, a second electronic device may also be involved. In some embodiments, the second electronic device may be similar in composition to the first electronic device, for example having a composition as shown in fig. 7. In other embodiments, the second electronic device may also be different from the first electronic device. For example, the second electronic device may be a portable electronic device, such as a cell phone or the like.
As an example, fig. 8 shows a software partitioning schematic of yet another electronic device. In different implementations, the composition of fig. 8 may be applied to the first electronic device and/or the second electronic device according to the embodiments of the present application.
In this example, the method is applied to the second electronic device, and the second electronic device runs on the Android operating system. The second electronic device may also have a layered architecture. The application layer (referred to as the application layer), the application framework layer (referred to as the framework layer), the kernel layer and the hardware layer are respectively arranged from top to bottom.
Wherein the application layer may comprise a series of application packages. The application package may include camera, gallery, calendar, call, map, navigation, bluetooth, music, video, short message, etc. applications. Illustratively, an application 1 may be installed in the application layer, and the application 1 may correspond to a website 1 for providing the network video resource to the user. In different implementations, the application 1 may be a piece of love odd, excellent and cool, mango video, a plurality of types of video applications such as a plurality of types of laid down.
In this example, a second screen projection module, a second decision module, a gallery module, and the like may be disposed in the application layer. With reference to the illustration of fig. 7, the second screen projecting module may be configured to establish multi-screen cooperative communication with the first screen projecting module, so as to implement multi-screen cooperation between the second electronic device and the first electronic device. The second decision module is similar to the first decision module and is used for commanding the acquisition and confirmation of various data information in the second electronic equipment to be used as a processing center for data processing. The gallery module may be for managing a gallery of pictures of the second electronic device. Through the gallery module, operations such as storage and reading of pictures can be realized.
It should be noted that, in order to support the wireless communication function of the second electronic device, in some embodiments, a communication component may also be disposed in the application layer. The communication assembly may include at least one communication module that may provide at least one communication capability in a communication mode of WLAN, bluetooth, NFC, etc.
The framework layer provides an application programming interface and a programming framework for the application programs of the application layer. The framework layer includes some predefined functions. The framework layer may include a window manager (e.g., a second window manager), a content provider, a view system, a resource manager, a notification manager, an activity manager, an input manager, and the like. The Window Manager provides a Window Management Service (WMS), which may be used for Window management, window animation management, a surface Manager, and a relay station as an input system. The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and answered, browsing history and bookmarks, phone books, etc. The view system includes visual controls, and the view system can be used to build applications. The display interface may be composed of one or more views. The resource manager provides various resources for the application. The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system. The campaign Manager may provide a campaign Manager Service (AMS), which may be used for the start-up, switching, scheduling of system components (e.g., campaigns, services, content providers, broadcast receivers), and the management and scheduling of application processes. The Input Manager may provide an Input Manager Service (IMS), which may be used to manage inputs to the system, such as touch screen inputs, key inputs, sensor inputs, and the like. The IMS takes the event from the input device node and assigns the event to the appropriate window by interacting with the WMS.
In an embodiment of the present application, the window managed by the second window manager may comprise a currently displayed window of the second electronic device (e.g., a mobile phone). The activity manager may instruct the second window manager to perform a corresponding interface display by sending an instruction to the second window manager. The input manager may be configured to receive a real input from a user, and may also perform a simulated click operation under the control of the second decision module. Thereby triggering an effect on an automated click of a control on the interface.
As shown in fig. 8, in this example, the framework layer may further include a camera manager. The camera manager may be for managing a camera disposed on the second electronic device. For example, instructing the camera to operate/stop operating, obtaining image information collected by the camera, and the like. In the application, the camera manager can also be used for replacing image information collected by the camera. For example, when the mobile phone uses the two-dimensional code scanning function, the camera manager may replace the image information currently captured by the camera with the already stored image information (e.g., the two-dimensional code login information from the first electronic device), so that the application performing the two-dimensional code scanning performs scanning recognition on the two-dimensional code login information from the first electronic device.
The kernel layer may include drivers for multiple applications. Such as a second bluetooth driver, a second WLAN driver, a second database driver, a camera driver, a second NFC driver, etc. Different drivers correspond to different applications. In this example, a Binder communication module may also be included in the kernel layer. The method is used for achieving inter-process communication in the Android operating system. It will be appreciated that different application runs may correspond to different processes, with different processes invoking different resources. The data transmission among different processes can be realized through the Binder communication module.
A hardware layer may also be provided in the second electronic device. Various hardware components for implementing the functions of the second electronic device may be included in the hardware layer. Illustratively, the hardware layer may include a GPU for performing rendering processing, a CPU for performing data processing, a memory for performing data storage, and the like. The hardware layer can also comprise at least one camera. The camera can be used for collecting images during operation, and transmitting collected image information to the second electronic equipment.
Note that the description of fig. 7 and 8 is merely an example. And does not constitute any limitation to the first electronic device and/or the second electronic device. In other implementations, the electronic device related to the embodiments of the present application may also run other operating systems, and more or fewer components may be used. The embodiment of the present application does not limit the specific composition of the electronic device.
In the following example, the technical solution provided by the embodiment of the present application is described in detail by taking as an example that the first electronic device is a portable computer having a composition shown in fig. 7, and the second electronic device is a mobile phone having a composition shown in fig. 8.
In some embodiments, please refer to fig. 9, which is an example of a two-dimensional code scanning scheme provided in an embodiment of the present application. In this example, the computer may intercept the login two-dimensional code under the control of the user, and send the login two-dimensional code to the mobile phone, so that the mobile phone can analyze the login two-dimensional code, and run a corresponding application (e.g., application 1) to scan the login two-dimensional code, thereby entering the authorized login interface.
In this example, the computer may display the interface 901 in a browser window under the control of the user. A login two-dimensional code 902 may be included in the interface 901. The process of the user controlling the computer to display and log in the two-dimensional code is similar to the previous example, and is not described herein again.
It should be noted that, in different implementations of the present application, the computer may determine that the current display interface includes the login two-dimensional code 902 in different manners.
For example, in some embodiments, the computer may monitor the currently displayed interface in real time. The computer can analyze the image of the current display interface, and when the analysis result includes the two-dimension code information authorized to be logged by the user, the computer determines that the login two-dimension code 902 is displayed on the current interface.
In other embodiments, the computer may determine whether the currently displayed interface includes the login two-dimensional code 902 according to the corresponding address information of the current focus window. In this example, a browser is taken as an example of a focus window. When the login two-dimensional code 902 is displayed in a skipping manner, a preset identifier or suffix may be included in the website url of the corresponding interface information. Illustratively, the preset identifier or suffix may include a specific character or character string such as "-logic" or "scan" or "QR code" related to the login scene of the scanned two-dimensional code. Then, the computer may determine that the login two-dimensional code 902 is displayed on the current interface when it is monitored that the content currently displayed by the browser is from the address including the preset identifier or suffix.
Alternatively, the computer may determine that the login two-dimensional code 902 is displayed on the current interface when the browser sends a data request to the server. Wherein the data request may be for requesting data information including the address of the preset identification or suffix.
As an implementation, the address including the preset identification or suffix may be one or more. The computer may be pre-configured with preset data information stored therein, where the preset data information includes one or more addresses including preset identifiers or suffixes. The preset data information may be configured in the database, and the computer may match the address of the current focus window or the address in the data request with the preset data information, and when the matching is successful (that is, the address of the focus window or the address in the data request is included in the preset data information), it indicates that the login two-dimensional code 902 is displayed on the current interface.
In another implementation, the preset data information may include the preset identification or suffix. Then, the mechanism for matching the address of the focus window, or matching the address in the data request, may be: when the address includes a preset identifier or suffix, it is determined that the login two-dimensional code 902 is displayed on the current interface.
It should be understood that when the computer runs the application program to display the login two-dimensional code 902, the application program may also send the data request to the server to request the data information of the included login two-dimensional code 902. After acquiring the data information, the application program may display the login two-dimensional code 902 in its window. Therefore, in this scenario, the computer may match the address in the data request sent by the currently active application program based on the preset data information to determine whether the login two-dimensional code 902 will be displayed. Or, the computer may match the source address of the interface displayed by the current application program according to the preset data information, and when the matching is successful, it indicates that the login two-dimensional code 902 is displayed on the interface of the current application program.
After the login two-dimensional code 902 is displayed, as shown in an interface 901, the computer may set a mobile phone collaboration window 903 on the interface 901 for display. In addition, a screenshot button 904 may be displayed in the function bar of the mobile phone collaboration window 903. The screenshot button 904 may be displayed in a function bar of the mobile phone collaboration window 903 after the computer determines that the login two-dimensional code 902 is displayed in the current display. That is, in a case where the computer does not display the login two-dimensional code 902, the function bar of the mobile phone collaboration window 903 may not include the screenshot button 904.
The screenshot button 904 may provide a screenshot trigger function to the user. The user may click the screen capture button 904 to instruct the computer to enter the screen capture mode. In response to the user's operation of clicking the screen capture button 904, the computer may capture a portion of the image including the login two-dimensional code 902 under the control of the user.
Illustratively, referring to fig. 10, an example of intercepting and registering a two-dimensional code 902 by a computer under the control of a user is shown. The user may click a screenshot button 904 in the ribbon of the cell phone collaboration window 903 to trigger the screenshot function. In some embodiments, the user may input screenshot 1001 on the interface 901, instructing the computer to perform the corresponding region capture.
As one possible implementation, a user inputs the screenshot 1001 through a left mouse button. The screenshot operation 1001 may include a left click entered via a mouse, a long drag of the left button, a release of the left button (i.e., a left button pop-up), and so on. The click position and the release position may be two vertices of a diagonal line of an area (e.g., area 1002) that the user wants to capture, respectively. The intercepted area may include a login two-dimensional code 902. In response to a user input screenshot 1001, the computer may capture and save image information for this region 1002. In some implementations, after the computer receives the user-entered screenshot 1001, and before saving the image information for region 1002, the user may be presented with an indication that the region has been truncated (i.e., region 1002) so that the user can intuitively determine that the currently selected region is the desired truncated region. For example, a prompt message 1003 may be displayed below the area 1002, and the prompt message 1003 may prompt the user to currently intercept the range of the area, and the information that the interception is completed, and the like.
It should be noted that the computer can determine whether the current screenshot is completed by recognizing the action in the screenshot operation 1001 input by the user. For example, the computer may determine that the screenshot 1001 input by the user has been completed when a left key up operation input by the user is received (e.g., an input event of "left key up" is monitored). After determining that the current screenshot is complete, the computer may display a prompt 1003 and save the image information of the region 1002.
In this example, it is described by taking an example that the screen capture button 904 is displayed when it is determined that the login two-dimensional code 902 is included on the current interface. In other implementations of the application, the screenshot button 904 may be displayed by a prompt box or a notification message, which is used to prompt the user to enter a screenshot mode to intercept the two-dimensional code 902.
Fig. 10 is a diagram illustrating an example in which a user manually controls a computer to intercept a two-dimensional code 902 registered. In other embodiments of the present application, the computer can also intercept the two-dimensional code 902 by itself.
For example, in some implementations, when it is determined that the current interface includes the login two-dimensional code, the computer may perform image analysis on the current display interface, and capture and retain an image corresponding to the two-dimensional code, thereby obtaining the login two-dimensional code 902.
In other implementations, the computer may intercept the current interface (e.g., a full screen interface or a focus interface) and save, obtaining the login two-dimensional code 902. It should be appreciated that since the computer has determined that the login two-dimensional code 902 is included in the current interface, the intercepted image of the current interface must include the login two-dimensional code 902.
With continued reference to fig. 9, after acquiring the login two-dimensional code 902, the computer may send image information including the login two-dimensional code 902 to the mobile phone.
For example, in some embodiments, in a case where the user manually controls the computer to intercept the login two-dimensional code 902, the computer may send the intercepted image information of the area 1002 to the mobile phone.
In other embodiments, in the case that the computer automatically intercepts the login two-dimensional code 902, the computer may send image information including the login two-dimensional code 902 to the mobile phone. In different implementations, the image information sent by the computer may only include the information for registering the two-dimensional code 902. In other implementations, the image information sent by the computer may include the login two-dimensional code 902 along with other page information. It can be understood that, when the computer automatically intercepts the current full screen interface or the interface of the current focus window (i.e. the focus interface), the computer can directly send all intercepted image information to the mobile phone for processing. Of course, even if the acquired image information includes page information other than the login two-dimensional code 902, the computer may filter the image information and send only the information of the login two-dimensional code 902 to the mobile phone.
In the example shown in fig. 9, the mobile phone may parse the login two-dimensional code 902 after receiving it, so as to obtain the corresponding information.
It should be understood that by accessing the web address 1, the user can obtain the corresponding network video information from the browser. The user can also obtain network video information by accessing the corresponding application 1. The application 1 can be installed on a mobile device terminal, such as a mobile phone, so that a user can quickly acquire a network video.
In this example, after receiving the login two-dimensional code 902, the mobile phone may analyze the login two-dimensional code 902 to determine application information corresponding to the login two-dimensional code 902. The application information may be used to indicate an application 1 corresponding to the website 1. In a specific implementation, the application information may include a packet name, a special field, a keyword, and/or an identifier corresponding to the application 1.
For example, in some embodiments, the mobile phone may start a two-dimensional code scanning function in the system, scan the login two-dimensional code 902, and obtain the link indicated by the login two-dimensional code 902. And determining the application information according to the keyword, the application name and other information included in the link.
Referring to fig. 11, the mobile phone may start a "scan" function after receiving the login two-dimensional code 902. The "scan" function may be a function provided by a system level application provided by the handset system. The handset can replace the received login two-dimensional code 902 into a scan box of a "scan" function. By this "scan" function, the registered two-dimensional code 902 can be analyzed. It should be understood that each two-dimensional code may correspond to a respective link. The mobile phone can acquire the link indicated by the login two-dimensional code 902 through a scan function.
After acquiring the link, the mobile phone can determine corresponding application information based on the link. Illustratively, the link of the two-dimensional code may include a special field corresponding to the application program. Through field matching, application information corresponding to the two-dimensional code connection can be determined.
For example, consider application 1 as Aiqi skill. The link indicated by the login two-dimensional code 902 may include special fields related to Aiqi crafts. For example, the Aiqi art related special fields may comprise "iqiyi". The mobile phone logs in the two-dimensional code 902 through analysis, and the obtained corresponding link can comprise http:// www. Then, after acquiring the link indicated by the login two-dimensional code 902, the mobile phone may perform field matching on the link. Obtaining a special field comprising 'iqiyi' so as to determine that the application program corresponding to the link is of the specific mobile APP.
In order to implement the field matching mechanism, a table entry corresponding to a field may be preset in the mobile phone. The table entry may include a correspondence between at least one application and the corresponding special field. For example, the correspondence relationship between the Aiqi art mobile phones APP and the "iqiyii" may be included. Then, after obtaining the link indicated by the login two-dimensional code 902, the mobile phone may use the special field in the entry corresponding to the preset field to perform field matching on the link, and according to the matching result, the application program indicated by the link may be determined.
It should be noted that, in the process of the mobile phone shown in fig. 11, acquiring the link indicated by the login two-dimensional code 902 through the "scan" function, a corresponding interface may be displayed on the mobile phone. Then, based on the multi-screen cooperation mechanism, the interface of the process of opening the "scan" function, scanning and logging in the two-dimensional code 902, and the like may also be displayed on the mobile phone cooperation interface on the computer. In other implementations, the handset may also perform the process in the background, without displaying on its display screen. For example, in the process of acquiring the link indicated by the login two-dimensional code 902 through the "scan" function, the mobile phone may be in a screen-rest state. Correspondingly, the interface corresponding to the process can not be displayed on the computer.
In other embodiments of the present application, the mobile phone may also use other modules with two-dimensional code analysis to analyze the received login two-dimensional code 902, and obtain corresponding application information.
In this example, after acquiring the application information corresponding to the login two-dimensional code 902, the mobile phone may run the application.
For example, the two-dimensional code 902 is registered to correspond to the application 1. The mobile phone can run the application 1 and display an interface corresponding to the application 1 on the interface.
In some embodiments, the handset may achieve the purpose of running application 1 by creating a simulated click event. Referring to fig. 12, the mobile phone may create a simulated click event 1 for performing a click operation on an icon 1202 corresponding to application 1 on the mobile phone's main interface (e.g., interface 1201). In response to the simulated click event 1, the mobile phone may run the application 1 and display an interface 1203 corresponding to the application 1.
After the application 1 is run, the mobile phone may invoke a scanning function of the application 1, so as to enter an authorized login interface corresponding to the application 1 according to the acquired login two-dimensional code 902.
Exemplary, continuing reference is made to FIG. 12. This process may be implemented by creating a simulated click event. For example, the cell phone may create a simulated click event 2 for entering a click operation on an expand button 1204 on the interface 1203. In response to the simulated click event 2, the handset may display an expanded menu 1205 on the interface.
The mobile phone may create a simulated click event 3 for inputting a click operation to a tab 1206 for opening a two-dimensional code scanning function in the extended menu 1205. In response to the simulated click event 3, the interface displayed by the mobile phone may be switched to the two-dimensional code scanning interface 1207 of the application 1.
In different implementations, the authorized login interface may be obtained by scanning the login two-dimensional code 902 through the application 1 in different manners.
In some embodiments, as shown in fig. 12, the handset may replace the image from the camera (i.e., camera) with the received image (e.g., the login two-dimensional code 902) and transmit to the application 1 for scan resolution.
It can be understood that, when switching to the two-dimensional code scanning interface 1207 of the application 1, the application 1 may call the camera to perform two-dimensional code scanning. Correspondingly, the camera can collect images and output image information to the application 1 for analysis. In this example, the mobile phone may replace the image information transmitted from the camera to the application 1 with the login two-dimensional code 902 from the computer. In this way, the application 1 can scan and analyze the registered two-dimensional code 902. In some implementations, as shown in fig. 12, a login two-dimensional code 902 may be displayed in a scan box of the two-dimensional code scan interface 1207.
In other embodiments, referring to fig. 13, the mobile phone may call the login two-dimensional code 902 stored in the gallery by creating a simulated click event, so that the application 1 may scan and parse the login two-dimensional code 902.
In this example, the mobile phone may generate a simulated click to achieve the purpose of retrieving the login two-dimensional code 902 from the gallery for scanning and analyzing. As shown in fig. 13, a button 1301 linked to a gallery may be included on the two-dimensional code scanning interface 1207. The handset may create a simulated click event 4 for clicking on this button 1301. In response to the simulated click event 4, the cell phone may retrieve an image from the cell phone (e.g., the login two-dimensional code 902) from the gallery and set the login two-dimensional code 902 into the two-dimensional code scanning area of the two-dimensional code scanning interface 1207. Therefore, the mobile phone can analyze the login two-dimensional code 902 and display the corresponding authorization login interface 1302.
It should be noted that, similarly to the foregoing example, the mobile phone uses a "scanning" function in the system to parse the two-dimensional code to obtain the description of the application information. In this example, the process of scanning and analyzing the record two-dimensional code 902 by the mobile phone through the simulated click event to obtain the authorized login interface may be to synchronously display each interface on the mobile phone and the computer. In other implementations, the process may also be performed by turning off the screen of the mobile phone, that is, the mobile phone may perform rendering on each interface and transmit the rendering result to the display screen for display, but the display screen of the mobile phone may be in a screen-off state all the time, so that the display screen does not need to display any interface, thereby saving power consumption of the mobile phone end; correspondingly, the mobile phone can transmit the information of each interface to the computer for display through multi-screen cooperation. In other implementations, the process may be executed by the mobile phone in the background, so that the mobile phone does not need to perform real rendering on each interface, and performs rendering of the interface to obtain corresponding interface information only when obtaining the authorized login interface 1302; correspondingly, since the mobile phone does not render each interface in the process, the computer does not need to display the process interface, and only the interface is synchronously displayed after the mobile phone enters the authorized login interface 1302.
The above-mentioned fig. 9-13 describe in detail the technical solutions that the computer provided in the embodiment of the present application intercepts the login two-dimensional code under the instruction of the user and sends the login two-dimensional code to the mobile phone, so that the mobile phone obtains the authorized login interface according to the login two-dimensional code and synchronously displays the authorized login interface on the computer. It should be understood that the mobile phone may install a corresponding application program (e.g., application 1) before receiving the login two-dimensional code. In other cases, if the application 1 is not pre-installed in the mobile phone, after receiving the login two-dimensional code, the mobile phone may prompt the user to download the application 1 according to the determined application information.
Illustratively, in conjunction with fig. 14, after receiving the user operation of the screenshot button 904, the computer may transmit the login two-dimensional code to the mobile phone. The mobile phone can analyze the login two-dimensional code to obtain the application information of the application 1. This process can be referred to the description of fig. 9-11.
After acquiring the application information of the application 1, the mobile phone may try to pull up the application 1. For example, the mobile phone may query the application 1 in an installed application list, and when the application 1 is queried, pull up the corresponding process to implement running of the application 1. In this example, if the installed application list does not include application 1, the corresponding application 1 is not installed in the mobile phone. Then the handset may display an interface 1401 prompting the user to install application 1. Illustratively, in this interface 1401, a prompt 1402, such as a text reminder, may be included to remind the user to install the application 1. A button 1403 to jump to the application market installation application 1 can also be displayed on the interface 1401. Thus, after the user inputs an operation of clicking the button 1403, the mobile phone can jump to the application market, and query the application 1 in the application market to display a corresponding installation interface. Thereby, the user can install the application 1 directly in the application market.
Thus, when a user needs to log in the website 1 through a computer, based on the schemes of fig. 9-14, the user can see the authorized login interface in the mobile phone collaboration window on the computer without performing any operation on the mobile phone. The mobile phone can be controlled to authorize the login of the website 1 through the application 1 by operating the authorized login interface.
In order to be able to explain this solution more clearly, the internal implementation of the solution as shown in fig. 9-14 will be exemplified below with reference to the electronic device software configuration of fig. 7 and 8.
Exemplarily, referring to fig. 15, an interaction diagram provided in an embodiment of the present application is shown.
In this example, the first electronic device may be a device to be authorized, such as a computer. The second electronic device may be an authorized device, such as a cell phone.
It should be noted that, in this example, the computer and the mobile phone may establish multi-screen cooperative communication. Therefore, with reference to the schematic diagram of fig. 6, a mobile phone collaboration window can be synchronously displayed on a computer, and the window can be consistent with an interface displayed on a mobile phone. In different implementations, the multi-screen cooperative communication may be implemented based on WLAN, bluetooth, NFC, or other communication protocols.
As shown in fig. 15, the scheme may include:
s1501, a first decision module of the computer determines to enter a two-dimensional code scanning login interface. With reference to the foregoing example, the user may access the website 1 through a browser of the computer, and enter the scan login interface through an operation in the website 1. Or, the user can enter the scanning login interface by operating the client software corresponding to the website 1 on the computer and by operating in the client software. Correspondingly, the computer can determine to enter the two-dimensional code scanning login interface through a preset identifier or suffix included in the address information corresponding to the current display interface. For example, when the address information corresponding to the current display interface includes an identifier of "-logic", the computer may determine to enter a login interface for scanning the two-dimensional code.
S1502, a first decision module of the computer sends a first display instruction to a first window manager. The first display instruction is used for instructing the first window manager to display a screenshot button on the mobile phone collaboration window. Illustratively, the first display instruction may be drawn through a view system of the computer and then mentally displayed in a function bar of a system window of the mobile phone through the first window manager.
S1503, the first window manager of the computer displays a screenshot button on the mobile phone collaboration window. The screenshot button serves as a function button, can receive operation input by a user, and achieves corresponding functions. For example, the user may click on a screen capture button, instructing the computer to enter a screen capture mode.
S1504, the screenshot module of the computer responds to the operation of the user on the screenshot button, and the login two-dimensional code is obtained.
For example, in some embodiments, the user's operation on the screenshot button may include clicking the screenshot button, selecting a two-dimensional code area, and the like; in other embodiments, the user's operation of the screenshot button may include clicking the screenshot button, and accordingly, the computer may obtain the image of the included login two-dimensional code by itself.
S1505, the screenshot module of the computer sends the login two-dimensional code to the first decision module. In a specific implementation, the screenshot module may send the acquired information including the image of the login two-dimensional code to the first decision module.
And S1506, the first decision module of the computer sends the login two-dimensional code to the second communication module of the mobile phone through the first communication module.
And S1507, the second communication module of the mobile phone sends the login two-dimensional code to the second decision module.
S1508, a second decision module of the mobile phone analyzes the login two-dimensional code to obtain application information. For example, the mobile phone may analyze the two-dimensional code through its two-dimensional code analysis capability, for example, through a "scanning" function or a two-dimensional code analysis module provided in the system, to determine the corresponding link. And determining the application information according to the information such as the keywords, the application names and the like in the links. For example, the mobile phone may determine that the installed application corresponding to the application information is application 1.
And S1509, the second decision module of the mobile phone determines to install the application according to the application information. For example, the second decision module may determine that the application 1 is installed by querying the application 1 from the installed software list when the login two-dimensional code corresponds to the application 1.
And S1510, the second decision module of the mobile phone transmits the application information to the activity manager.
S1511, the activity manager starts the application 1 according to the application information.
It should be noted that, in the above example, it is taken as an example that the second decision module determines that the application 1 is installed in the mobile phone. In other embodiments of the present application, after the second decision module determines that the application information corresponds to the application 1, the application information may also be directly transmitted to the activity manager, and the activity manager determines that the application 1 is installed in the mobile phone and starts the mobile phone.
S1512, after the application 1 runs, the corresponding second window manager acquires the interface of the application 1.
And S1513, the second decision module sends a simulated click operation instruction to the input manager. For example, the simulated click operation instruction may be a simulated click operation on the interface to the application 1. The specific implementation can refer to the example of simulated click event 1-simulated click event 4 in the foregoing description.
And S1514, the input manager executes simulated click operation on the application interface.
S1515, the second window manager correspondingly displays the two-dimensional code scanning interface.
S1516, the second decision module transmits the login two-dimensional code to the second window manager. The login two-dimensional code can be a login two-dimensional code from a computer.
With reference to the foregoing description, the manner of scanning the login two-dimensional code by the second window manager may include: and replacing the image from the camera for scanning, or acquiring the stored login two-dimensional code through a gallery.
S1517, the second window manager scans the login two-dimensional code and enters the authorized login interface. Therefore, based on a multi-screen cooperation mechanism, the authorized login interface of the application 1 can be displayed on the computer.
And S1518, the second decision module monitors the information of the current active page in real time and determines to enter an authorized login interface.
For example, the second decision module may determine to enter the authorized login interface according to a fixed identifier associated with the authorized login in the current active page.
In other embodiments, the second window manager may monitor the information on the currently top-displayed active page (e.g., there is a button linked to the authorization process, etc. on the current interface) by itself to determine the current interface is an authorized login interface.
In this embodiment of the present application, the fixed identifier related to authorized login or the identifier corresponding to the button linked to the authorized procedure on the current interface may also be referred to as a second identifier.
S1519, the second decision module sends a screen projection instruction to the second window manager. The screen-casting instruction can be used for instructing the second window manager to cast the current interface to the computer side for display.
S1520, the second window manager sends the current interface information to the first screen projection module of the computer through the second screen projection module of the mobile phone. The current interface information may be information of an authorized login interface.
S1521, a first screen projection module of the computer sends current interface information to a first window manager.
S1522, the first window manager displays an authorized login interface on the mobile phone collaboration window.
It should be appreciated that the internal interactions of S1501-S1522 provided in this example, the slave interface, may appear as information as shown in FIGS. 9-14. The specific execution of each step may be referred to each other, and will not be described herein again.
Therefore, after the multi-screen cooperative communication is established between the two devices, a user does not need to input any operation to the mobile phone (for example, the user does not need to directly input the operation to the mobile phone, and does not need to control the mobile phone through a mobile phone cooperative window on the computer, and the like), and when the two-dimension code needs to be scanned and logged in at the computer end, the authorized login interface on the mobile phone can be quickly and conveniently obtained, so that the quick login of the two-dimension code scanning can be realized.
In the above examples of fig. 9 to 15, the computer may perform screenshot of the login two-dimensional code under the instruction of the user, and send the login two-dimensional code to the mobile phone, so that the mobile phone can analyze the login two-dimensional code, and run the corresponding application 1 to scan the login two-dimensional code to obtain the authorized login interface, so that the computer can display the authorized login interface in the mobile phone collaboration window based on the multi-screen collaboration mechanism. That is, the effect shown in fig. 4 can be achieved by manually acquiring the two-dimensional code and analyzing the two-dimensional code by using a mobile phone.
In other embodiments of the present application, the two-dimensional code parsing process may also be performed in a computer.
For example, please refer to fig. 16 in conjunction with fig. 9. After the computer acquires the login two-dimensional code, the login two-dimensional code and the corresponding application information are sent to the mobile phone. Therefore, the mobile phone does not need to analyze the login two-dimensional code, and can directly start the application 1 according to the received application information and scan the login two-dimensional code. Of course, after the mobile phone receives the application information, when it is determined that the corresponding application 1 is not installed, the application installation guiding process shown in fig. 14 may be skipped.
The application information sent by the computer to the mobile phone may include at least one of the following: the packet name, special field, keyword, and/or identification, etc. corresponding to application 1.
Take the example that the application information of the application sent by the computer to the mobile phone includes the package name and/or the identifier of the application 1. In some embodiments, a correspondence list of at least one website and a package name and/or an identifier of a corresponding mobile phone application may be set in the computer. Therefore, when the computer recognizes that the login two-dimensional code is displayed on the current interface, the package name and/or the identification of the corresponding mobile phone application can be inquired according to the address of the website 1. In other embodiments, when the computer recognizes that the login two-dimensional code is displayed on the current interface, the computer may send an inquiry message to the corresponding application server to inquire the application information corresponding to the web address 1. In other embodiments, the computer may further perform image recognition on the obtained login two-dimensional code according to the obtained login two-dimensional code, and obtain corresponding application information. In the foregoing example, the mobile phone scans and logs in the two-dimensional code to obtain an example of the scheme of the application information.
In other embodiments, the computer may send the address of the current website 1 to the cell phone. Thus, after the mobile phone acquires the website 1, the application 1 can be determined according to the website 1. The specific process may refer to the process of determining the application information of the application 1 by the computer in the above example.
Therefore, after the mobile phone receives the login two-dimensional code, the application 1 can be directly started to scan the two-dimensional code to obtain the authorized login interface without analyzing the login two-dimensional code.
FIG. 17 is an example of interaction for one implementation of the scheme shown in FIG. 16. As shown in fig. 17, the scheme may include:
s1701, a first decision module of the computer determines to enter a two-dimensional code scanning login interface.
S1702, a first decision module of a computer sends a first display instruction to a first window manager.
S1703, the first window manager of the computer displays a screenshot button on the mobile phone cooperative window.
S1704, responding to the operation of a user on a screenshot button by a screenshot module of the computer, and acquiring the login two-dimensional code.
S1705, the screenshot module of the computer sends the login two-dimensional code to the first decision module.
And S1706, the first decision module of the computer sends the login two-dimensional code and the application information to a second communication module of the mobile phone through the first communication module. Wherein the application information may correspond to the application 1.
In this example, the computer may determine application information before executing the S1706. The specific implementation can refer to the description in fig. 16.
And S1707, the second communication module of the mobile phone sends the login two-dimensional code and the application information to the second decision module.
And S1708, the second decision module of the mobile phone determines to install the application according to the application information.
S1709, the second decision module of the mobile phone transmits the application information to the activity manager.
And S1710, the activity manager starts the application 1 according to the application information.
And S1711, after the application 1 runs, the corresponding second window manager acquires the interface of the application 1.
And S1712, the second decision module sends a simulated click operation instruction to the input manager.
And S1713, the input manager executes the simulated click operation on the application interface.
And S1714, the second window manager correspondingly displays the two-dimensional code scanning interface.
And S1715, the second decision module transmits the login two-dimensional code to the second window manager.
And S1716, scanning the login two-dimensional code by the second window manager and entering an authorized login interface.
And S1717, the second decision module monitors the information of the current active page in real time and determines to enter an authorized login interface.
And S1718, the second decision module sends a screen projection instruction to the second window manager. The screen-casting instruction can be used for instructing the second window manager to cast the current interface to the computer terminal for display.
And S1719, the second window manager sends the current interface information to the first screen projection module of the computer through the second screen projection module of the mobile phone. The current interface information may be information of an authorized login interface.
S1720, the first screen projection module of the computer sends the current interface information to the first window manager.
S1721, the first window manager displays an authorized login interface on the mobile phone collaboration window.
It should be noted that the execution of S1701-S1705 may correspond to S1501-S1505 shown in fig. 15, and the execution of S1708-S1721 may correspond to S1509-S1522 shown in fig. 15, and the execution of each step may be referred to separately, and the specific implementation is similar, and is not described again here.
In the foregoing example, the computer may obtain the login two-dimensional code under the instruction of the user. In other embodiments of the application, the computer can also acquire the login two-dimensional code and send the login two-dimensional code to the mobile phone. That is, in this example, the computer can implement a function of automatically intercepting and transmitting the two-dimensional code. Therefore, the operation of the user can be further saved, and the convenience is improved.
For example, in some embodiments, the computer may automatically intercept the image in the focus window of the current top-display upon determining entry into the two-dimensional code entry interface. The image may include a login two-dimensional code. That is, the computer can automatically acquire the login two-dimensional code, and the two-dimensional code can be analyzed by the mobile phone based on the scheme shown in fig. 15. For example, the computer may transmit image information including the login two-dimensional code to the mobile phone, so that the mobile phone performs operations such as two-dimensional code analysis, opening the application 1, and scanning the login two-dimensional code. Therefore, when the mobile phone enters the authorized login interface, the authorized login interface is delivered to the computer to be displayed for the user.
In other embodiments, the computer may automatically capture the image in the focus window currently being displayed on top when determining to enter the two-dimensional code entry interface. The image may include a login two-dimensional code. The computer can also determine the application information (i.e. the application information of the application 1) corresponding to the currently logged two-dimensional code. In this way, the computer can automatically acquire the login two-dimensional code, and realize the login two-dimensional code and the application information based on the scheme shown in fig. 18, and simultaneously send the login two-dimensional code and the application information to the mobile phone, so that the mobile phone can execute subsequent operations. For example, the computer may transmit image information including the login two-dimensional code and application information to the mobile phone, so that the mobile phone opens the application 1, scans the login two-dimensional code, and the like. Therefore, when the mobile phone enters the authorized login interface, the authorized login interface is delivered to the computer to be displayed to the user.
The following takes the example that the computer automatically intercepts the login two-dimensional code and sends the login two-dimensional code and the application information to the mobile phone, and the internal interaction of the scheme is exemplified. For example, referring to fig. 19, the scheme may include:
s1901, a first decision module of the computer determines to enter a two-dimensional code scanning login interface.
For example, the execution of S1901 may correspond to S1501 shown in fig. 15 and S1701 shown in fig. 17, and specific implementations thereof may be referred to each other and will not be described herein again.
S1902, a first decision module of the computer sends an interception instruction to a screenshot module. The intercepting instruction can be used for instructing the screenshot module to intercept the interface image displayed by the current focus window.
And S1903, responding to the intercepting instruction by the screenshot module of the computer, and acquiring the login two-dimensional code.
In some embodiments, the screenshot module of the computer may intercept all image information in the current focus window after receiving the interception instruction. Then, the image information may include a login two-dimensional code.
In other embodiments, the screenshot module of the computer may capture image information of all windows currently displayed by the computer after receiving the capture instruction. It is understood that all windows of the computer display may include a focus window of the top display. Therefore, the intercepted image information may include the login two-dimensional code in the focus window.
And S1904, the screenshot module of the computer sends the intercepted image to the first decision module.
S1905, the first decision module of the computer sends the login two-dimensional code and the application information to the second communication module of the mobile phone through the first communication module. Wherein the application information may correspond to the application 1.
In some implementations of the application, the first decision module may directly transmit the image information sent by the screenshot module to the second communication module as image information for logging in the two-dimensional code.
In other implementations of the application, the first decision module may further analyze the image information from the screenshot module, and only retain the image information corresponding to the login two-dimensional code therein and transmit the image information to the second communication module, thereby reducing the data transmission amount.
And S1906, the second communication module of the mobile phone sends the login two-dimensional code and the application information to the second decision module.
And S1907, the second decision module of the mobile phone determines that the application is installed according to the application information.
And S1908, the second decision module of the mobile phone transmits the application information to the activity manager.
S1909, the activity manager starts the application 1 according to the application information.
And S1910, after the application 1 runs, the corresponding second window manager obtains the interface of the application 1.
S1911, the second decision module sends a simulated click operation instruction to the input manager.
S1912, the input manager executes simulated click operation on the application interface.
S1913, the second window manager correspondingly displays the two-dimensional code scanning interface.
S1914, the second decision module transmits the login two-dimensional code to the second window manager.
S1915, the second window manager scans the login two-dimensional code and enters an authorized login interface.
S1916, the second decision module monitors information of the current active page in real time and determines to enter an authorized login interface.
S1917, the second decision module sends a screen projection instruction to the second window manager. The screen-casting instruction can be used for instructing the second window manager to cast the current interface to the computer terminal for display.
S1918, the second window manager sends current interface information to the first screen projection module of the computer through the second screen projection module of the mobile phone. The current interface information may be information of an authorized login interface.
S1919, the first screen projection module of the computer sends the current interface information to the first window manager.
And S1920, displaying an authorized login interface on the mobile phone cooperative window by the first window manager.
It should be noted that the execution of the above S1905-S1920 may correspond to S1706-S1721 shown in fig. 17, and the execution of each step may refer to respectively, and the specific implementation is similar, and is not described herein again.
In the above example, the scheme provided by the embodiment of the present application is illustrated through interface switching and interaction of internal modules. The scheme provided by the embodiment of the present application is illustrated from the perspective of interaction of different electronic devices in conjunction with the example of fig. 20. For example, the first electronic device is a device to be authorized (e.g., a computer), the second electronic device is an authorized device (e.g., a mobile phone), and the first electronic device confirms that the application information is sent to the second electronic device. As shown in fig. 20, the scheme may include:
s2001, the first electronic device determines to enter a two-dimensional code scanning login interface.
This step may correspond to S1701 or S1901 in the above description, and specific implementations thereof may be referred to each other. For example, the computer may determine to enter the two-dimensional code scanning login interface according to a preset suffix or identifier included in the website corresponding to the current focus window. For example, the preset suffix or identifier may include "-logic", or the like.
And S2002, the first electronic equipment acquires the login two-dimensional code and the application information corresponding to the website 1.
For example, the computer may automatically obtain image information including the login two-dimensional code. For example, the computer may intercept the image information displayed in the current focus window or the current full screen interface by itself, and the image information may include the login two-dimensional code.
In addition, the computer can also determine the application information corresponding to the website 1 by matching the special fields according to the current website 1. For example, a field correspondence table entry may be preset in the computer, and the field correspondence table entry may include a correspondence between at least one special field and the application information. For example, the special field 1 corresponds to the application information 1 of the application 1. When the special field 1 is included in the website 1, the application information corresponding to the website 1 may be the application information 1.
And S2003, the first electronic equipment sends the login two-dimensional code and the application information to the second electronic equipment.
And S2004, the second electronic equipment starts the application 1 according to the application information.
And S2005, the second electronic device scans the login two-dimensional code by using the application 1 to obtain an authorized login interface.
Illustratively, the second electronic device may perform a simulated click on the interface of the application 1 by creating a simulated click event, and then scan the login two-dimensional code to enter the authorized login interface. The scanning of the login two-dimensional code can be realized by replacing image information acquired by the camera, and can also be realized by acquiring the login two-dimensional code from a gallery.
And S2006, the second electronic device sends an authorized login interface to the first electronic device.
S2007, the first electronic device displays an authorized login interface in a coordinated mode.
It should be noted that the execution process of S2001-S2007 described above may correspond to each step in the foregoing example of fig. 19, and specific execution mechanisms thereof may be referred to each other.
Therefore, a user can input a small amount of operation on the computer, namely, the authorized login interface can be obtained, and the purpose of scanning and logging in the two-dimensional code is achieved. In the above examples, when the website 1 is logged in, authorized login is performed through the corresponding application 1. In other embodiments of the present application, based on the automatic interaction processing of the first electronic device and the second electronic device, other manners of intelligent authorized login can also be implemented. For example, when the second electronic device logs in to the system account, the first electronic device and the second electronic device automatically interact, so that the website 1 can be logged in through the system account on the first electronic device. Illustratively, the system account is a glory account, i.e. the website 1 is logged in through the glory account.
It is understood that, when the website 1 logs in the user account, the user may log in through an account registered by the user at the website 1. For example, as in the previous example, login is by scanning a two-dimensional code; and logging in by inputting an account password, etc. In other cases, web site 1 may also be used for logging in through other associated accounts. For example, when the application server corresponding to the website 1 signs a contract with a glory account, the website 1 may be logged in by associating with the glory account.
Referring to fig. 21, a computer is taken as a first electronic device corresponding to a device to be authorized, and a mobile phone is taken as a second electronic device corresponding to an authorization device. When a user wants to log in the website 1, the user can input an operation instruction to set up and display the login window 2101 on the top of the computer. A button 2102 may be included in the login window 2101 for linking to a glory account login. When the user clicks on the button 2102, the computer may generate a glory account login instruction in response to the operation. The computer can send the login indication of the glory account number to the mobile phone so as to trigger the mobile phone to enter the associated login process of the glory account number. As shown in fig. 21, after receiving the instruction to register the glory account, the mobile phone may enter a flow of associating and registering the glory account, and perform the associating and registering of the glory account. Illustratively, the cell phone may jump to display interface 2103. On this interface 2103, a button 2104 for glory account login may be included. Note that, in this example, the mobile phone may have a glory account registered in advance. Therefore, after the earphone receives the login instruction of the glory account, the mobile phone can enter the associated login process of the glory account. As an example, the associated login procedure of the glory account number may include: and after receiving the authorized login operation of the user, performing authentication according to the login request. And after confirming that the requirement of the login of the glory account is met, namely the authentication is successful, executing the login of the website 1 based on the glory account. The login request can be sent from the computer to the mobile phone, and the login request can include at least one of the following: a timestamp, an application signature, a user unique identity (e.g., uid), etc. The timestamp may be the time of sending the login request, the application signature may correspond to the application server corresponding to the website 1, and the uid may be used to indicate the device information of the computer.
Illustratively, after the mobile phone jumps to the display interface 2103, the interface 2103 can be synchronously displayed in a mobile phone collaboration window on the computer based on multi-screen collaboration communication. The user can input a click operation to a button 2104 on the system window of the mobile phone to instruct to perform authorized login of the glory account. In response to the operation, the computer may generate a login request to send to the mobile phone, so that the mobile phone performs authentication according to the login request to determine whether the website 1 can be authorized to be logged in using the glory account.
In some embodiments, the mobile phone may communicate with the cloud server to implement an authentication process according to the login request. For example, as shown in fig. 21, the mobile phone may send a verification request to the cloud server, where the verification request may carry information such as a timestamp, an application signature, and/or a uid in the login request. And responding to the verification request, and the cloud server can perform authentication verification according to the information in the login request.
In some embodiments, the cloud server determines whether the login request is expired according to whether the time indicated by the timestamp is within a preset range around the current time. And when the time indicated by the timestamp is within a preset range before and after the current moment, the login request is not expired, and the time check is passed.
In other embodiments, the cloud server determines whether the application logged in by the current login request is a legal application according to the application signature. For example, the cloud server may communicate with the corresponding application server according to the application signature, and determine whether the application corresponding to the application signature is legal. For another example, the cloud server may match the application signature with a legal application signature list preset in the cloud server according to the application signature, and when the matching is successful, it indicates that the application corresponding to the application signature is legal. It is understood that, when the application signature corresponds to the legal application, the application signature is verified to be passed.
Therefore, after the time check and/or the application signature check are passed, the cloud server can determine that the authentication is successful (namely, the check is successful), and issue the authorization information to the mobile phone. The authorization information may indicate that the mobile phone may use the currently glory account to log in website 1 on the device corresponding to the uid carried in the login request.
In response to the authorization information, the handset may jump to the display interface 2105. Prompt messages 2106 may be included in the interface 2105 for prompting the user that authorization is successful. For example, the presentation information may be character presentation information as shown in fig. 21.
Correspondingly, in the mobile phone collaboration window on the computer, the interface 2105 may also be displayed.
In some embodiments, after the verification is successful, the cloud server may send authorization information to an application server corresponding to the application signature (i.e., an application server corresponding to the website 1), and indicate that the application server may log in the website 1 using a honor account on a device corresponding to the uid carried in the login request. As a possible implementation, the authorization information may include uid, glory account information, and the like. Then, the application server can determine the computer according to the uid in the authorization message, and instruct the computer to log in website 1 through a glory account. Accordingly, a login success prompt window 2107 may be displayed on the computer. In the prompt window 2107, information of the logged-in account may be included. For example, a user name, a head portrait, etc. registered by the glory account.
In other embodiments, the cloud server may send the authorization message to the mobile phone after the verification is successful. The mobile phone can send the authorization information to the computer, so that the computer can send an authorization login message to the application server according to the authorization information. Correspondingly, the application server may instruct the computer corresponding to the uid to log in the website 1 according to the uid and the information of the honor account carried in the authorized login message. The login may be a login based on the glory account information.
Thus, after the user selects a glory account login on the computer (e.g., by entering a click operation on button 2102), the user can view an authorized login interface (e.g., interface 2103) in the collaboration window of the handset on the computer. After the user can input a click operation to the button 2104 in the authorization login interface, the user can see a prompt window 2107 for displaying successful authorization in the computer jump, and the authorization login through the glory account is completed.
Fig. 21 briefly explains the switching display of each interface from the viewpoint of device interaction. The following describes an example of the device-to-device interaction in conjunction with fig. 22, where the authorization login is performed through a system account (e.g., a glory account) in the present application.
Illustratively, as shown in fig. 22, the process may include:
s2201, the first electronic device determines to enter a glory account login interface.
For example, the first electronic device may determine to enter the glory account login interface after receiving an operation of the user on the glory account login related space. For example, the computer may determine to enter the glory account login interface after receiving a user click operation on the button 2102.
S2202, the first electronic device generates a glory account login instruction. The glory account login indication may be used to trigger the second electronic device to enter an associated login procedure for the glory account.
S2203, the first electronic device sends a glory account login instruction to the second electronic device.
And S2204, the second electronic equipment acquires a glory account login interface according to the glory account login instruction. Illustratively, the handset may jump to the display 2103 in response to receiving a glory account login indication.
And S2205, the second electronic equipment sends a glory account login interface to the first electronic equipment.
S2206, the first electronic device cooperatively displays a glory account login interface.
In this example, the processes of S2205-S2206 may be implemented based on cooperative display communication between the first electronic device and the second electronic device.
S2207, the first electronic device receives an authorized login instruction of the user. For example, the authorized login indication may include a click operation of the button 2104 by the user.
S2208, the first electronic device generates a login request. Illustratively, the login request may include at least one of: a timestamp, an application signature, a user unique identity (e.g., uid), etc.
S2209, the first electronic device sends a login request to the second electronic device.
S2210, the second electronic device sends a verification request to the cloud server.
And S2211, after the cloud server determines that the verification is successful, the cloud server sends authorization information to the second electronic device.
For example, the verification process of the cloud server according to the login request may refer to the description in fig. 21, such as performing time verification and/or applying signature verification. Taking time verification and application signature verification as examples, when both the time verification and the application signature verification are successful, the cloud server determines that the verification is successful. In some embodiments, the authorization information may include uid, glory account information, and the like.
And S2212, the second electronic device sends authorization information to the first electronic device.
And S2213, the first electronic device logs in the user account according to the authorization information.
As shown in fig. 22, the example is that the first electronic device interacts with the corresponding application server by itself according to the authorization information to register the glory account of the website 1. In other embodiments, with reference to the description in fig. 21, after the verification is successful, the cloud server and/or the second electronic device may interact with the application server according to the authorization information, so that the application server finds the corresponding computer according to the uid, and instructs the computer to log in to website 1 using the information of the glory account number in the authorization information.
Thus, as described in fig. 21 and fig. 22, the user can perform the associated login operation to the website 1 with a small number of operations and only by using the first electronic device.
It should be understood that, in the description of the above embodiments, the implementation of login based on two-dimensional code scanning and the implementation of login based on system account are set forth in detail. In each embodiment, the user can perform only a small amount of operations on the first electronic device (e.g., a computer), so as to achieve the effect of fast login on the computer. The effect can be achieved based on the self-interaction processing between the first electronic device and the second electronic device provided by the embodiment of the application.
Based on the automatic interaction processing between the first electronic device and the second electronic device, the operation simplification effect under other multi-device use scenes can be realized.
For example, in a scenario where a user uses a computer to pay, at present, a payment two-dimensional code on the computer may be scanned by a mobile phone to perform a payment operation. By applying the technical idea provided by the embodiment of the application, a user can only perform a small amount of operations on the mobile phone, and the payment operation of the payment two-dimensional code can be realized.
Exemplarily, refer to fig. 23. In this example, a VIP member corresponding to the website 1 is purchased on a computer.
The user can perform related operations on the website 1 to instruct the computer to display the VIP member purchasing interface. For example, the user Ethan is logged in to the web address 1 as an example. The user may click on the identity 2301 of the logged-in user, for example, the identity 2301 may be displayed as a user name (Ethan) and/or a head portrait, etc. Correspondingly, the computer may jump to the display interface 2302 in the browser window. In this interface 2302, an entry to purchase a VIP member may be included. For example, textual prompt information 2303 may be included in interface 2302. The user may click on the text prompt 2303 instructing the computer to proceed to the VIP purchase process. It is understood that the text prompt 2303 may be linked to a payment window. Then, in response to user manipulation of the text prompt 2303, the computer may display a payment window 2304. A payment two-dimensional code 2305 may be included in payment window 2304.
In a general flow, a user may scan the payment two-dimensional code 2305 using a device such as a mobile phone to perform a payment operation. In this example, the computer may interact with the mobile phone to obtain the payment interface. The specific process may refer to the process of fig. 9 to fig. 20 for interacting with the login two-dimensional code and acquiring the authorized login interface. For example, the computer can obtain the payment two-dimensional code and transmit the payment two-dimensional code to the mobile phone. The mobile phone can start corresponding payment software to scan the payment two-dimensional code so as to obtain a payment interface. And correspondingly, a payment interface can be displayed in a mobile phone collaboration window on the computer. For example, as shown in FIG. 23, a bounded surface 2306 may be displayed in a cell phone collaboration window of a computer. Prompt information 2307 may be included in the interface 2306 for prompting the user that a payment request is currently automatically detected to facilitate the user's associated authorization operations. In this example, a confirmation button 2308 may also be included in interface 2306. The user can confirm and authorize the current payment information by clicking on the button 2308. Correspondingly, the computer can communicate with the mobile phone for payment authorization and instruct the payment application on the mobile phone to pay.
It should be understood that the payment process is exemplified as the secret-free payment in this example. Then, in the process, after the user inputs a click operation on the button 2308, the electronic device can complete the payment action by itself. In other embodiments, the payment process may also be performed after the user enters payment information. For example, the payment information may include a payment password, a payment authorization fingerprint, a payment authorization mask, and the like. Take payment authorization fingerprints as an example. After receiving the user's click operation on the button 2308, the computer may display a payment authorization fingerprint collection prompt message so that the user can input a fingerprint through a fingerprint collector on the computer. Correspondingly, the computer can receive the fingerprint information and transmit the fingerprint information to the mobile phone for confirmation. The confirmation process may be performed in a payment application in accordance with the fingerprint information. And after the fingerprint information is confirmed to be correct, the mobile phone interface completes payment action through the payment application.
After the payment is completed, the browser on the computer can jump to display the VIP account information that the user has purchased. For example, the computer jumps to the display interface 2309 in the browser window, and the VIP purchased prompt and the VIP interest expiration time may be included in the interface 2309.
Therefore, the user can complete payment only by a small amount of operation on the computer without using a plurality of devices for simultaneous operation.
In the above example, based on a multi-screen cooperation mechanism, the transfer of the login two-dimensional code can be realized between the computer and the mobile phone through the autonomous interaction based on the scheme of the application. Therefore, the user can obtain the authorized login interface in the mobile phone collaboration window on the computer without performing any operation on the mobile phone.
In other embodiments of the present application, under the condition that the computer and the mobile phone do not need to establish multi-screen cooperation, the computer and the mobile phone may also transmit the login two-dimensional code, so that the mobile phone automatically displays the scanning result to the user according to the login two-dimensional code, such as an authorized login interface. Therefore, the user can realize the authorized login of the corresponding website (such as the website 1) or the application (such as the application 1) on the computer only by inputting the authorized operation on the mobile phone.
Fig. 24 is a schematic diagram of another collaborative login scheme according to an embodiment of the present application.
As shown in fig. 24, the user can input related operations on the computer to instruct the computer to enter the two-dimensional code scanning login interface. The process can refer to the description in the foregoing example (the description shown in fig. 1), and is not described herein again.
In this example, the computer may automatically obtain the login two-dimensional code when the login two-dimensional code is displayed on the current interface, and send the login two-dimensional code to the mobile phone. For example, the scheme for automatically acquiring and logging in the two-dimensional code by the computer can be realized by referring to S1901-S1904 shown in fig. 19, and specific implementations can be referred to each other. In some embodiments, the mechanism for automatically obtaining the login two-dimensional code by the computer may be implemented by intercepting an image displayed in full screen under the condition that the login two-dimensional code is determined to be currently displayed. In other embodiments, the mechanism for automatically acquiring the login two-dimensional code by the computer may be implemented by capturing an image of the current focus interface (i.e., the interface displayed by the focus window) when it is determined that the login two-dimensional code is currently displayed. The focus window may be a browser window for opening the website 1, or the focus window may be a top-placed window for displaying the login two-dimensional code, or the like.
In some implementations of this embodiment, the computer may only send the login two-dimensional code to the mobile phone, as described above with reference to fig. 9-23. Correspondingly, the mobile phone can analyze the login two-dimensional code to determine corresponding application information, and operate the application 1 according to the application information. And then the application 1 scans the login two-dimensional code to obtain an authorized login interface. The process may refer to the description of fig. 9-15, and the implementations may refer to each other. For example, the mobile phone may scan the two-dimensional code through a system-level application set therein to obtain the corresponding link, or the mobile phone may analyze the login two-dimensional code through a module with two-dimensional code analysis capability set therein to obtain the corresponding link. The mobile phone can also analyze the link to obtain application information of the application 1 corresponding to the login two-dimensional code. The mobile phone can run the application 1 by executing the simulated click event, and enter the two-dimensional code scanning interface of the application 1. Then, the mobile phone can scan the login two-dimensional code through the application 1 by replacing the image from the camera or acquiring the login two-dimensional code from the gallery. Therefore, the mobile phone can display the corresponding scanning result, such as an authorized login interface, to the user by automatically scanning the login two-dimensional code. Therefore, the user can directly operate on the authorized login interface. As with fig. 24, the user may enter a click operation 2401 on the authorized login button. In response to the click operation 2401, the computer can log in an authorized account on the mobile phone, for example, by displaying an interface 2402, so as to log in the account. It can be seen that the user can directly see the authorized login interface on the mobile phone without actively using the mobile phone to open some series of operations such as scanning the two-dimensional code by the application 1. Therefore, the complex operation of the two-dimension code scanning process is saved, and the two-dimension code scanning process is more convenient and faster.
In other implementations of this embodiment, the computer can obtain the application information by itself and send the application information to the mobile phone. Correspondingly, the mobile phone can directly run the application 1 after acquiring the application information. The mobile phone can also automatically use the application 1 to scan the received login two-dimensional code, so as to obtain and display an authorized login interface on a display screen of the mobile phone. The specific implementation process may be implemented by referring to the schemes in fig. 16 to fig. 20, and details are not described here.
Thus, based on the scheme shown in fig. 24, a multi-screen cooperative communication does not need to be established in advance between the mobile phone and the computer, or the mobile phone and/or the computer may not have a multi-screen cooperative capability, and the quick scanning authorization of the two-dimensional code may also be implemented.
Please refer to fig. 25, which is a schematic diagram illustrating a composition of another electronic apparatus according to an embodiment of the present application. The electronic device may be the first electronic device (e.g., a computer) described in the above embodiments. As shown in fig. 25, the electronic device 2500 may include: a processor 2501 and a memory 2502. The memory 2502 is used to store computer-executable instructions. For example, in some embodiments, the processor 2501, when executing the instructions stored by the memory 2502, can enable the electronic device 2500 to perform any of the aspects illustrated in the first electronic device described in the embodiments above.
It should be noted that all relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Please refer to fig. 26, which is a schematic diagram illustrating a composition of another electronic device according to an embodiment of the present application. The electronic device may be the second electronic device (e.g. a mobile phone) referred to in the above embodiments. As shown in fig. 26, the electronic device 2600 may comprise: a processor 2601 and memory 2602. The memory 2602 is used to store computer-executable instructions. For example, in some embodiments, the processor 2601, when executing the instructions stored by the memory 2602, may cause the electronic device 2600 to perform any of the aspects illustrated in the second electronic device described in the above embodiments.
It should be noted that all relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Fig. 27 shows a schematic block diagram of a chip system 2700. The chip system 2700 may include: the processor 2701 and the communication interface 2702 are configured to support an associated device (e.g., a first electronic device or a second electronic device) to implement the functions involved in the above embodiments. In one example, the system-on-chip further includes a memory for storing necessary program instructions and data for the terminal. The chip system may be formed by a chip, or may include a chip and other discrete devices. It is noted that in some implementations of the present application, the communication interface 2702 can also be referred to as an interface circuit.
It should be noted that all relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
The functions or actions or operations or steps, etc., in the above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using a software program, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are all or partially generated upon loading and execution of computer program instructions on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or can comprise one or more data storage devices, such as servers, data centers, etc., that can be integrated with the medium. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
Although the present application has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations may be made thereto without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary of the present application as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the present application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include such modifications and variations.

Claims (14)

1. The collaborative login method is applied to first electronic equipment, wherein the first electronic equipment displays a first collaborative window, and interface elements displayed in the first collaborative window are the same as interface elements of second electronic equipment; the second electronic equipment has the capability of authorizing to log in a first application program or a first website through first account information on the first electronic equipment, wherein the first website is a website corresponding to the first application program; the method comprises the following steps:
displaying a login two-dimensional code, wherein the login two-dimensional code is used for logging in the first application program or the first website;
displaying a screenshot button on the first collaboration window under the condition that the current interface is determined to include a login two-dimensional code;
automatically acquiring first image information, wherein the first image information comprises image information of the login two-dimensional code;
sending a first message to the second electronic device, wherein the first message comprises image information of the login two-dimensional code; the second electronic equipment replaces the first scanned image with the login two-dimensional code according to the first message, and display information of an authorized login interface corresponding to the login two-dimensional code is obtained; the first scanned image is an image acquired from a camera module of the second electronic device when the second electronic device performs two-dimensional code scanning by using the two-dimensional code scanning function of the first application program;
receiving display information of an authorized login interface from the second electronic equipment;
displaying the authorized login interface in the first collaboration window according to the display information of the authorized login interface, wherein the authorized login interface comprises a first option, and the first option corresponds to an authorized login function;
receiving a first operation of a user in the first collaboration window, wherein the first operation is an operation on the first option;
and responding to the first operation, and logging in the first application program or the first website through the first account information.
2. The method of claim 1, wherein determining the current interface comprises logging in a two-dimensional code, comprising: and determining that the current interface comprises a login two-dimensional code according to the first identifier included in the website information.
3. The method of claim 2, wherein the first identification comprises: log in (login).
4. The method of claim 1, wherein automatically acquiring first image information comprises:
intercepting the currently displayed complete image, acquiring the image information of the currently displayed complete image,
determining image information of the full image as the first image information.
5. The method of claim 1, wherein automatically acquiring the first image information comprises:
intercepting an image displayed by a current focus window, acquiring image information of the focus window,
determining image information of a focus window as the first image information;
wherein the focus window is a browser window accessing the first website, or the focus window is a display window of the first application.
6. The method of claim 1, wherein the first message further comprises application information of the first application, so that the second electronic device runs the first application according to the application information of the first application;
the application information includes at least one of: the package name of the first application program, the special field corresponding to the first application program, the keyword corresponding to the first application program and the identification of the first application program.
7. The method of claim 6, further comprising:
and determining the application information of the first application according to the image information of the login two-dimensional code.
8. The collaborative login method is applied to second electronic equipment, and interface elements of the second electronic equipment are displayed in a first collaborative window of first electronic equipment; the second electronic equipment has the capability of authorizing to log in a first application program or a first website through first account information on the first electronic equipment, wherein the first website is a website corresponding to the first application program; the method comprises the following steps:
when first electronic equipment needs to log in the first application program or the first website, the second electronic equipment acquires a first message from the first electronic equipment, wherein the first message comprises image information of a log-in two-dimensional code; the image information of the login two-dimensional code is automatically acquired by the first electronic equipment under the condition that the current interface is determined to comprise the login two-dimensional code;
replacing the first scanning image by the login two-dimensional code by the second electronic equipment according to the first message, and acquiring display information of an authorized login interface corresponding to the login two-dimensional code; the first scanned image is an image acquired from a camera module of the second electronic device when the second electronic device scans by using the two-dimensional code scanning function of the first application program;
the second electronic equipment sends display information of the authorized login interface to the first electronic equipment; the first electronic device displays the authorization login interface in the first collaboration window conveniently, wherein the authorization login interface comprises a first option, and the first option corresponds to an authorization login function;
when the first electronic device receives a first operation of a user on the first option displayed on the first electronic device, the second electronic device instructs the first electronic device to log in the first application program or the first website through the first account information.
9. The method according to claim 8, wherein before replacing the first scanned image with the login two-dimensional code and acquiring display information of an authorized login interface corresponding to the login two-dimensional code, the method further comprises:
analyzing the image information of the login two-dimensional code, and determining the application information of the first application program; the application information includes at least one of: the package name of the first application program, the special field corresponding to the first application program, the keyword corresponding to the first application program and the identification of the first application program;
and running the first application program according to the application information of the first application program.
10. The method of claim 9, wherein the analyzing the image information of the login two-dimensional code to determine the application information of the first application comprises:
the second electronic equipment runs a second application program, and the second application program has a function of identifying the two-dimensional code;
analyzing the image information of the login two-dimensional code by using the second application program to acquire a corresponding first link;
and determining the application information of the first application program according to the first link.
11. The method according to claim 9, wherein a two-dimensional code parsing module is disposed in the second electronic device, and the parsing the image information of the login two-dimensional code to determine the application information of the first application program includes:
analyzing the image information of the login two-dimensional code by using the two-dimensional code analysis module to obtain a corresponding first link;
and determining the application information of the first application program according to the first link.
12. The method of claim 8, further comprising:
the second electronic equipment generates at least one simulated click event, the at least one simulated click event is used for carrying out simulated click on the interface of the first application program, and the first application program is controlled to execute a two-dimensional code scanning function through the simulated click;
replacing the first scanned image with the login two-dimensional code according to the first message, and acquiring display information of an authorized login interface corresponding to the login two-dimensional code, wherein the display information comprises:
and the second electronic equipment controls the first application program to operate a two-dimensional code scanning function through the at least one simulated click event so as to analyze the replaced login two-dimensional code and acquire display information of an authorized login interface corresponding to the login two-dimensional code.
13. The method of claim 8, further comprising: the second electronic equipment monitors display information of a current interface;
the second electronic device sends the display information of the authorized login interface to the first electronic device, and the display information comprises:
when the display information of the current interface comprises a second identifier, sending the current interface to the first electronic equipment, wherein the current interface is an authorized login interface, and the second identifier is included in the display information of the authorized login interface; the second identification comprises: a fixed identifier associated with the authorized login, or an identifier corresponding to a button linked to the authorization process.
14. An electronic device, comprising one or more processors and one or more memories; the one or more memories coupled with the one or more processors, the one or more memories storing computer instructions;
the computer instructions, when executed by the one or more processors, cause the electronic device to perform the collaborative login method of any of claims 1-7 or 8-13.
CN202210778039.0A 2022-07-04 2022-07-04 Collaborative login method Active CN114861154B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210778039.0A CN114861154B (en) 2022-07-04 2022-07-04 Collaborative login method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210778039.0A CN114861154B (en) 2022-07-04 2022-07-04 Collaborative login method

Publications (2)

Publication Number Publication Date
CN114861154A CN114861154A (en) 2022-08-05
CN114861154B true CN114861154B (en) 2023-04-11

Family

ID=82626712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210778039.0A Active CN114861154B (en) 2022-07-04 2022-07-04 Collaborative login method

Country Status (1)

Country Link
CN (1) CN114861154B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117592021A (en) * 2022-08-19 2024-02-23 荣耀终端有限公司 Account login method and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016019632A1 (en) * 2014-08-05 2016-02-11 奥盈琦信信息技术(上海)有限公司 System and method for implementing collection, management and authorization of personal big data
CN108023727A (en) * 2017-11-27 2018-05-11 深圳市纳祥科技有限公司 A kind of authorization method and its system
CN111325585A (en) * 2020-01-17 2020-06-23 腾讯科技(深圳)有限公司 Asset transfer method, device and computer readable storage medium
CN112632516A (en) * 2020-12-24 2021-04-09 航天信息股份有限公司 User login method and device, storage medium and electronic equipment
CN113259301A (en) * 2020-02-12 2021-08-13 华为技术有限公司 Account data sharing method and electronic equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107302539B (en) * 2014-09-01 2021-04-13 登录易(深圳)科技有限公司 Electronic identity registration and authentication login method and system
CN111460356B (en) * 2020-04-23 2024-03-12 北京信安世纪科技股份有限公司 Automatic login method, device, medium and equipment
CN111859357A (en) * 2020-07-17 2020-10-30 维沃移动通信有限公司 Login method and device and electronic equipment
CN114386010A (en) * 2020-10-16 2022-04-22 腾讯科技(深圳)有限公司 Application login method and device, electronic equipment and storage medium
CN112417421B (en) * 2020-11-26 2024-07-26 维沃移动通信有限公司 Scanning method, scanning device, electronic equipment and readable storage medium
CN115835409A (en) * 2021-09-17 2023-03-21 荣耀终端有限公司 Collaborative window processing method and system and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016019632A1 (en) * 2014-08-05 2016-02-11 奥盈琦信信息技术(上海)有限公司 System and method for implementing collection, management and authorization of personal big data
CN108023727A (en) * 2017-11-27 2018-05-11 深圳市纳祥科技有限公司 A kind of authorization method and its system
CN111325585A (en) * 2020-01-17 2020-06-23 腾讯科技(深圳)有限公司 Asset transfer method, device and computer readable storage medium
CN113259301A (en) * 2020-02-12 2021-08-13 华为技术有限公司 Account data sharing method and electronic equipment
CN112632516A (en) * 2020-12-24 2021-04-09 航天信息股份有限公司 User login method and device, storage medium and electronic equipment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Online banking authentication system using mobile-OTP with QR-code;Young Sil Lee 等;《5th International Conference on Computer Science and Convergence Information Technology》;644-648 *
应用于自动售货机的管理云平台实训项目的设计与实现;张靖 等;《数码世界》(第6期);382-384 *
微信网页版扫描二维码登录安全性分析;左石城 等;《2016年全国电子认证技术交流大会》;1-7 *

Also Published As

Publication number Publication date
CN114861154A (en) 2022-08-05

Similar Documents

Publication Publication Date Title
EP2129148B1 (en) Content distribution system
US11320968B2 (en) Processing actionable notifications
CN104639721B (en) The method and device of application information is provided in mobile terminal device
EP3100437B1 (en) Actionable notifications
US20140086105A1 (en) Device and method for providing drawing screen sharing service
WO2019227450A1 (en) Application function implementation method and electronic device
CN110519461B (en) File transmission method, device, computer equipment and storage medium
CN104102537A (en) Application calling method and user terminal
CN103888408B (en) Upload the data to method and the device of social platform
CN103729425A (en) Operation response method, client, browser and operation response system
US20220366066A1 (en) Display method, display device, and electronic device
US10579411B2 (en) Loading and running virtual working environments in a mobile device management system
CN114861154B (en) Collaborative login method
CN111857498B (en) Data interaction method and device and electronic equipment
CN102932520B (en) Information interaction method and system for mobile equipment
KR101719593B1 (en) Information processing terminal and control method therefor, system and control method therefor, and computer-readable storage medium
CN107534860A (en) Wi-Fi hotspot portal authentication method and device
US20240031630A1 (en) Platform-agnostic media framework
CN113784186B (en) Terminal device, server, and communication control method
CN117857646B (en) Data network sharing method, electronic equipment and storage medium
WO2023185888A1 (en) Communication method, related apparatus, and related system
CN107111499B (en) Method for providing network service and network service station using the same
CN113938510A (en) Terminal equipment and terminal control method
CN116739574A (en) Display device and payment method for third party application
CN117851703A (en) Page display method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant