Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System login device and system login method

A login verification and unique technology, applied in the computer field, can solve problems such as high cost and influence of existing system structure, and achieve the effect of secure user identity verification

Active Publication Date: 2013-01-09
YONYOU NETWORK TECH
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another method is to separate the user identity information and verification method of the existing system to establish a centralized and unified user identity verification system, but this method is costly and has a great impact on the structure of the existing system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System login device and system login method
  • System login device and system login method
  • System login device and system login method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0023] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, therefore, the present invention is not limited to the specific embodiments disclosed below limit.

[0024] figure 1 is a block diagram of a system login device according to an embodiment of the present invention.

[0025] Such as figure 1 As shown, the present invention provides a system login device 100, including a client 102, a first system 104 and a second system 106, wherein, when the client 102 needs to log in to the first system 104, the client 102 obtains the user identity credential, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system login device and a system login method, wherein the device comprises a client-side, a first system and a second system. By means of the system login device and the method, users only need to input identity authentication information of another system during login of a target system to realize safe login of the target system. Based on safety, the target system is not provided with any user identity authentication information, and data including user identity authentication information and the like of other systems do not go through or are not stored in the target system. Users use temporary identity identification code to login the target system, and the fact of bypassing user identity authentication of other systems and using counterfeit information to directly login the target system is rejected.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a system login device and a system login method. Background technique [0002] Application systems that provide services to users usually use "login" to verify user identity, which requires the system to have user identity information and verification methods. In reality, an enterprise usually already has an application system with complete user identity information and authentication methods. When the enterprise builds another application system, it usually needs to establish another set of user identity information and verification methods for the new system, or separate the user identity information and verification methods of the existing system to establish a centralized and unified user identity verification system for supply. Existing systems and new systems are used. [0003] As the business of an enterprise develops, more and more systems will be established ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 杨黎
Owner YONYOU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products