Unlock instant, AI-driven research and patent intelligence for your innovation.

Application access method and device, storage medium and computer equipment

A technology for application access and target application, applied in the fields of application access, devices, storage media and computer equipment, it can solve problems such as high operational complexity and information leakage, and achieve the effect of reducing security risks and avoiding repeated submission of real-name information.

Pending Publication Date: 2020-11-20
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, submitting real-name information on multiple different application platforms, on the one hand, there is a security risk of information leakage, and on the other hand, because users need to fill in real-name information repeatedly, the operation complexity is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application access method and device, storage medium and computer equipment
  • Application access method and device, storage medium and computer equipment
  • Application access method and device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0087] It can be understood that the terms "first", "second" and the like used in this application may be used to describe various concepts herein, but unless otherwise specified, these concepts are not limited by these terms. These terms are only used to distinguish one concept from another. Wherein, at least one refers to one or more than one, for example, at least one user may be any integer number of users greater than or equal to one, such as one user, two users, or three users. A plurality refers to two or more, for example, a plurality of users may be any integer number greater than or equal to two such as two users or three users.

[0088] Embodiments of the present application provide an application access method, devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application access method and device, a storage medium and computer equipment, and belongs to the technical field of cloud. The method comprises the steps: displaying a login prompt page of a target application, wherein the login prompt page comprises a target login option; in response to a trigger operation on the target login option, displaying an authorization page, wherein the authorization page comprises a first type of authorization options matched with the target real name level, the first type of authorization options are used for prompting to authorize the user real name information to the target application through the instant messaging application, and the target real-name level corresponds to user real-name information required for accessing the target application; and in response to a trigger operation on the first type of authorization options, obtaining user real name information corresponding to the target real name level from the instant messaging application, and accessing the target application based on the user real name information. Cross-application user real-name information sharing is realized, the security risk of privacy information leakage is reduced, and the operation complexity of the user is greatly reduced.

Description

technical field [0001] The present application relates to the field of cloud technology, and in particular to an application access method, device, storage medium and computer equipment. Background technique [0002] The Internet real-name system is a system that forces Internet users to use Internet services based on real-name information. Its purpose is to reduce bad information on the Internet and promote Internet users (referred to as users) to be responsible for their online behavior. In other words, the Internet real-name system is a network management method based on users' real names. It is not only an important means to protect and guide Internet users, but also prevents young people from being influenced by bad factors on the Internet. [0003] Under the network management mechanism of real-name identity authentication, if a user wants to access multiple applications, the user also needs to submit real-name information on multiple different application platforms. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/0876H04L63/0853H04L51/046
Inventor 程冉
Owner TENCENT TECH (SHENZHEN) CO LTD