EP-4738796-A1 - SERVICE ACCESS METHOD, TERMINAL, AND SYSTEM
Abstract
This application discloses a service access method, a terminal, and a system. The method includes: The terminal displays a third interface in response to receiving a first operation performed by a user on an icon of a first app. A second operation performed by the user on a first control on the third interface is responded to. The second operation indicates the first app running on a cloud server to send a first request to a third-party proxy service app by using a third-party service SDK embedded in the first app. The terminal receives, by using a third-party proxy service SDK embedded in a first client, the first request sent by the third-party proxy service app. The terminal invokes, based on the first request, the third-party service app to implement a function corresponding to the first control. In this way, an application APP on the cloud server accesses the third-party service application on a local terminal of the user, and account information of the third-party service application does not need to be uploaded to the cloud server. This ensures information security.
Inventors
- XU, XIN
Assignees
- Petal Cloud Technology Co., Ltd.
Dates
- Publication Date
- 20260506
- Application Date
- 20220708
Claims (14)
- A service access method, wherein the method comprises: receiving, by a terminal, a first operation performed by a user on a first icon; displaying, by the terminal, a first interface in response to the first operation, wherein the first interface is an interface of a first application corresponding to the first icon, the first interface comprises a first control, and the first application is an application running on a server; receiving, by the terminal, a second operation performed by the user on the first control; responding to the second operation, receiving, by a first module of the terminal, a first request sent by the server through a first communication channel, wherein the first communication channel is a communication channel between the first module and the server; and invoking, by the terminal based on the first request, a second application to implement a function corresponding to the first control, wherein the second application is an application on the terminal.
- The method according to claim 1, wherein the server is provided with a second module, and the first communication channel is a communication channel between the first module and the second module.
- The method according to claim 2, wherein after the displaying, by the terminal, a first interface in response to the first operation, the method further comprises: establishing, by the first module of the terminal, the first communication channel with the server.
- The method according to claim 3, wherein the establishing, by the terminal, the communication channel comprises: obtaining, by the terminal, information about the first application and information about the second module in response to the first operation; and establishing, by the terminal, the communication channel based on the information about the first application and the information about the second module.
- The method according to any one of claims 1 to 4, wherein the first request comprises a login request, a real-name authentication request, a payment request, an advertisement request, or a push request.
- The method according to claim 5, wherein the first request comprises the login request, and the invoking, by the terminal based on the first request, the second application to implement a function corresponding to the first control comprises: displaying, by the terminal, a second interface based on the login request, wherein the second interface is an interface of the second application, the second interface comprises a second control, and the second control is used to authorize to log in to the first application by using an account of the second application; receiving, by the terminal, a third operation performed by the user on the second control; and obtaining, by the terminal in response to the third operation, a response result fed back by the second application based on the login request.
- The method according to claim 6, wherein after the obtaining, by the terminal in response to the third operation, a response result fed back by the second application based on the login request, the method further comprises: sending, by the first module of the terminal, the response result to the server through the first communication channel, wherein the server is configured to: obtain interface information of logging in to the first application based on the response result, and feed back the interface information to the terminal; receiving, by the terminal, the interface information fed back by the server; and displaying, by the terminal, a sixth interface based on the interface information.
- The method according to claim 5, wherein the first request comprises the payment request, and the invoking, by the terminal based on the first request, the second application to implement a function corresponding to the first control comprises: displaying, by the terminal, a third interface based on the payment request, wherein the third interface is an interface of the second application, the third interface comprises a third control, and the third control is used to authorize payment that is based on order information of the first application; receiving, by the terminal, a fourth operation performed by the user on the third control; and obtaining, by the terminal in response to the fourth operation, a payment result fed back by the second application based on the payment request.
- The method according to claim 8, wherein the obtaining, by the terminal in response to the fourth operation, a payment result fed back by the second application based on the payment request comprises: displaying, by the terminal, a fourth interface of the second application in response to the fourth operation, wherein the fourth interface comprises the payment result of the second application and a fourth control used to return to the first application; receiving, by the terminal, a fifth operation performed by the user on the fourth control; and displaying, by the terminal, a fifth interface of the first application in response to the fifth operation, wherein the payment result is displayed on the fifth interface.
- The method according to any one of claims 1 to 9, wherein before the displaying, by the terminal, a first interface in response to the first operation, the method further comprises: displaying, by the terminal, the fifth interface in response to the first operation, wherein an interface of the first application is displayed on the fifth interface, and video content of the first application is displayed on the interface of the first application.
- A terminal, used in the service access method according to any one of claims 1 to 10.
- A computer-readable storage medium, wherein the computer-readable storage medium comprises computer instructions, and when the computer instructions are run on a terminal, the terminal is enabled to perform the service access method according to any one of claims 1 to 10.
- A computer program, wherein when the program is invoked by a processor, the service access method according to any one of claims 1 to 10 is performed.
- A chip system, comprising one or more processors, wherein when the one or more processors execute instructions, the one or more processors perform the service access method according to any one of claims 1 to 10.
Description
This application claims priority to Chinese Patent Application No. 202110803162.9, filed with the China National Intellectual Property Administration on July 15, 2021 and entitled "SERVICE ACCESS METHOD, TERMINAL, AND SYSTEM", which is incorporated herein by reference in its entirety. TECHNICAL FIELD Embodiments of the present invention relate to the field of communication technologies, and in particular, to a service access method, a terminal, and a system. BACKGROUND With development of cloud computing and full application of 5th generation mobile communication technology (5th generation mobile communication technology, 5G) networks, development of cloud services such as a cloud game (cloud game), cloud monitoring, and cloud security is promoted. The cloud game is used as an example. In a cloud game scenario, a game application (application, APP) runs on a cloud server (namely, a cloud game host, which is alternatively referred to as a cloud phone). The cloud server renders a game scene into video and audio streams, and transmits the video and audio streams to a local device (for example, a mobile phone, a tablet computer, a notebook computer, or a desktop computer) of a user through a network. The local device only needs to have a basic streaming media playing capability and a capability of obtaining a user input instruction and sending the user input instruction to the cloud server. The local device does not need to have powerful graphics operation and data processing capabilities, that is, does not need to be configured with a high-end processor or a high-end graphics card. A current cloud game login method is usually logging in on the cloud server by using a game account, or logging in on the cloud server through authorization of a third-party application account (third-party account for short) on the cloud server. However, in the foregoing methods, the user needs to enter or save account information on the server. However, there is a security risk when an account is entered on the server. For example, when a terminal is disconnected from the cloud server on a network, there is a case in which the third-party account is in a login state, and there is a risk that the third-party account is used by another person. SUMMARY Embodiments of this application provide a service access method, a terminal, and a system, so that an application APP on a cloud server accesses a third-party service application on a local terminal of a user, and account information of the third-party service application does not need to be uploaded to the cloud server, to ensure information security. To achieve the foregoing objectives, the following technical solutions are used in embodiments of this application. According to a first aspect, an embodiment of this application provides a service access method. The method may be performed by a terminal, or may be performed by a component (for example, a chip, a chip system, or a processor) located in a terminal. In the following, an example in which the method is performed by the terminal is used for description. The method includes: The terminal receives a first operation performed by the user on a first icon. The terminal displays a first interface in response to the first operation. The first interface is an interface of a first application corresponding to the first icon. The first interface includes a first control used to invoke a second application. The first application is an application running on a server. The terminal receives a second operation performed by the user on the first control. The second operation is responded to, where the second operation indicates the first application to send a first request to the terminal. A first module of the terminal receives the first request through a first communication channel. The first communication channel is a communication channel between the first module and the server. The terminal invokes, based on the first request, the second application to implement a function corresponding to the first control. The second application is an application on the terminal. In this way, the first application on a cloud server accesses the second application on a local terminal of the user, and account information of the second application does not need to be uploaded to the cloud server. This ensures information security. In some possible implementations, the server is provided with a second module. The first channel is a communication channel between the first module and the second module. In some possible implementations, after that the terminal displays a first interface in response to the first operation, the method further includes: The first module of the terminal establishes the first communication channel with the server. In a specific possible implementation, that the terminal establishes the communication channel is specifically as follows: The terminal obtains information about the first application and information about the second m