Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing client login through intelligent terminal, server and intelligent terminal

An intelligent terminal, a technology for controlling intelligent terminals, applied in telephone communication, user identity/authority verification, electrical components, etc., can solve the problems of cumbersome operation and inconvenient user operation, etc.

Active Publication Date: 2013-08-14
刘子腾
View PDF5 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this login method is relatively cumbersome and inconvenient for users to operate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing client login through intelligent terminal, server and intelligent terminal
  • Method for realizing client login through intelligent terminal, server and intelligent terminal
  • Method for realizing client login through intelligent terminal, server and intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0124] The first embodiment aims to describe the login process of the client from the perspective of the server side. see figure 1 , which is a flowchart of a method for implementing client login through an intelligent terminal disclosed in Embodiment 1 of the present invention, and the method includes the following steps:

[0125] Step 101: the server receives a login request message that carries a login account and is sent by the client;

[0126]In order to facilitate the description and understanding of the technical solution of the present invention, all steps in this embodiment are based on a specific application scenario. For example, client A needs to log in to server B that provides a certain application service, such as figure 2 As shown, when the user enters a login account sa******liu1 into client A, and clicks the "Mobile One-Key Login" button, client A will send a login request message carrying sa******liu1 to server B.

[0127] Step 102: From the logged-in sm...

Embodiment 2

[0142] The difference between this embodiment and Embodiment 1 is that after the client successfully logs in, the smart terminal can also log out the logged-in client according to the needs of the user. see Figure 4 , which is a flowchart of a method for realizing client login through a smart terminal disclosed in Embodiment 2 of the present invention, including the following steps:

[0143] Step 401: the server receives the login request message carrying the login account sent by the client;

[0144] Step 402: From the logged-in smart terminals, the server searches for smart terminals logged in with the same login account as the client and / or smart terminals logged in with the client's bound login account, and the found smart terminals are A control smart terminal that allows or denies the client to log in;

[0145] Step 403: the server forwards the login request message to the controlling intelligent terminal of the client;

[0146] Step 404: The server allows or rejects...

Embodiment 3

[0166] The difference between this embodiment and the first embodiment is that the server further randomly generates a verification code, sends the verification code to the client, and also sends a login request message carrying the verification code to the control intelligent terminal of the client. see Figure 5 , which is a flowchart of a method for implementing client login through an intelligent terminal disclosed in Embodiment 3 of the present invention, including the following steps:

[0167] Step 501: the server receives a login request message carrying a login account sent by the client;

[0168] Step 502: The server searches for the smart terminal logged in with the same login account as the client and / or the smart terminal logged in with the bound login account of the client from the logged in smart terminals, and the found smart terminal is: Allowing or denying the control intelligent terminal that the client logs in;

[0169] Step 503: The server randomly genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for realizing client login through an intelligent terminal, a server and the intelligent terminal. The login method comprises the steps: the server receives a login request message, which is sent by a client and carries a login account; the server looks for an intelligent terminal which is logined through the same login account with the client and / or an intelligent terminal which is logined through a bound login account of the client from logined intelligent terminals, and the found intelligent terminal is a control intelligent terminal which allows or rejects the client login; the server forwards the login request message to the control intelligent terminal of the client; the server receives a login response message sent by the control intelligent terminal of the client; and the server allows or rejects the client login according to the indication of the login response message. According to the embodiment of the invention, the login process can be simpler and easier, the operation by a user is facilitated.

Description

technical field [0001] The invention relates to the technical field of computer applications, in particular to a method, a server and an intelligent terminal for realizing client login through an intelligent terminal. Background technique [0002] In many network application scenarios, the user generally needs to enter the login account and password in the client first, so that the client can successfully log in to the server that provides network application services, and the user can use various network application software on the client. For example, online games or online payment, etc., are all such login mechanisms to provide users with network application services. However, the login account and password will be exposed to the public network at the same time, and are easily intercepted by intruders, resulting in the loss of the login account and the lack of security in the login process. [0003] Another traditional login method is that the user only enters the login ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04M1/725
Inventor 刘琦
Owner 刘子腾
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products