Method and apparatus for authorized login
First Claim
1. A computer-implemented method, comprising:
- receiving a first user input to zoom out a first application, wherein the first application is displayed on a first area of a screen of a device before receiving the first user input;
in response to the first user input;
zooming out the first application, wherein the first application is displayed on a second area of the screen after zooming out the first application, and the second area is smaller than the first area; and
displaying at least one icon on a third area of the screen, wherein the third area is outside the second area, the at least one icon includes an icon of a second application, and a user has logged into the second application on the device;
receiving a second user input to drag the displayed icon of the second application from the third area to the second area;
in response to the second user input;
transmitting login authorization information of the second application to the first application; and
submitting, by the first application, the login authorization information to a server of the second application through a server of the first application; and
authorizing logging into the first application on the device in response to receiving a notification from the server of the second application through the server of the first application, wherein the notification indicates that the login authorization information is verified.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for processing user logins are described. One example method includes receiving a first user input to zoom out a first application, wherein the first application is displayed on a first area of a screen of a device; zooming out the first application to be displayed on a second area of the screen; and displaying an icon of a second application on a third area of the screen, wherein a user has logged into the second application on the device; receiving a second user input to drag the displayed icon of the second application from the third area to the second area; transmitting login authorization information of the second application to the first application; and submitting, by the first application, the login authorization information to a server of the second application through a server of the first application; and authorizing logging into the first application on the device.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving a first user input to zoom out a first application, wherein the first application is displayed on a first area of a screen of a device before receiving the first user input; in response to the first user input; zooming out the first application, wherein the first application is displayed on a second area of the screen after zooming out the first application, and the second area is smaller than the first area; and displaying at least one icon on a third area of the screen, wherein the third area is outside the second area, the at least one icon includes an icon of a second application, and a user has logged into the second application on the device; receiving a second user input to drag the displayed icon of the second application from the third area to the second area; in response to the second user input; transmitting login authorization information of the second application to the first application; and submitting, by the first application, the login authorization information to a server of the second application through a server of the first application; and authorizing logging into the first application on the device in response to receiving a notification from the server of the second application through the server of the first application, wherein the notification indicates that the login authorization information is verified. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
receiving a first user input to zoom out a first application, wherein the first application is displayed on a first area of a screen of a device before receiving the first user input; in response to the first user input; zooming out the first application, wherein the first application is displayed on a second area of the screen after zooming out the first application, and the second area is smaller than the first area; and displaying at least one icon on a third area of the screen, wherein the third area is outside the second area, the at least one icon includes an icon of a second application, and a user has logged into the second application on the device; receiving a second user input to drag the displayed icon of the second application from the third area to the second area; in response to the second user input; transmitting login authorization information of the second application to the first application; and submitting, by the first application, the login authorization information to a server of the second application through a server of the first application; and authorizing logging into the first application on the device in response to receiving a notification from the server of the second application through the server of the first application, wherein the notification indicates that the login authorization information is verified. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented system, comprising:
-
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising; receiving a first user input to zoom out a first application, wherein the first application is displayed on a first area of a screen of a device before receiving the first user input; in response to the first user input; zooming out the first application, wherein the first application is displayed on a second area of the screen after zooming out the first application, and the second area is smaller than the first area; and displaying at least one icon on a third area of the screen, wherein the third area is outside the second area, the at least one icon includes an icon of a second application, and a user has logged into the second application on the device; receiving a second user input to drag the displayed icon of the second application from the third area to the second area; in response to the second user input; transmitting login authorization information of the second application to the first application; and submitting, by the first application, the login authorization information to a server of the second application through a server of the first application; and authorizing logging into the first application on the device in response to receiving a notification from the server of the second application through the server of the first application, wherein the notification indicates that the login authorization information is verified. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification