Method, device and terminal for account authorization
A terminal and account technology, applied in the computer field, can solve problems such as low security, cumbersome operation, and password leakage, and achieve the effects of ensuring security, simple operation, and improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1 Embodiment 2
[0034] Embodiment one
[0035] combine figure 1 Referring to the schematic structural diagram of the implementation environment and the above content, the embodiment of the present invention provides a method for account authorization. see figure 2 , the method flow provided by the embodiment of the present invention includes:
[0036] 201: Detect whether the first terminal is connected to the second terminal, where the first terminal is the current terminal.
[0037] 202: If the first terminal is connected to the second terminal, detect whether the bound account of the first application is bound with the second application currently running on the second terminal.
[0038] 203: If the account of the first application is bound to the second application currently running on the second terminal, authorize the account of the first application to the second application currently running on the second terminal.
[0039] Preferably, after detecting whether the first terminal is...
Embodiment 3
[0080] An embodiment of the present invention provides an account authorization device, see Figure 4 , the device consists of:
[0081] The first detection module 401 is configured to detect whether the first terminal is connected to the second terminal, where the first terminal is the current terminal;
[0082] The second detection module 402 is configured to detect whether the bound account of the first application is bound to the second application currently running on the second terminal when the first terminal is connected to the second terminal;
[0083] The authorization module 403 is configured to authorize the account of the first application to the second application currently running on the second terminal when the account of the first application is bound to the second application currently running on the second terminal.
[0084] Preferably, see Figure 5 , means, also include:
[0085] A determining module 404, configured to determine whether the first termin...
Embodiment 4
[0097] Please refer to Figure 9 , which shows a schematic structural diagram of a terminal involved in an embodiment of the present invention, and the terminal can be used to implement the account authorization method provided in the above embodiment. Specifically:
[0098] The terminal 900 may include an RF (Radio Frequency, radio frequency) circuit 110, a memory 120 including one or more computer-readable storage media, an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, a WiFi (Wireless Fidelity, wireless fidelity) module 170, a processor 180 including one or more processing cores, and a power supply 190 and other components. Those skilled in the art can understand that, Figure 9 The terminal structure shown in the terminal does not constitute a limitation to the terminal, and may include more or less components than those shown in the figure, or combine some components, or arrange different components. in:
[0099] The RF circuit 110 can be use...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


