Decentralizing login methods and clients and system

A decentralization and login method technology, applied in transmission systems, electrical components, etc., can solve the problems of centralized server insecurity and single communication channel

Active Publication Date: 2016-06-08
BEIJING ZHONGXIANG BIT TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (3) The communication channel is simplified, that is, the client and the centralized server communicate through a single channel
The cen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralizing login methods and clients and system
  • Decentralizing login methods and clients and system
  • Decentralizing login methods and clients and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] figure 1 It is the decentralized login method provided by Embodiment 1 of the present disclosure. Such as figure 1 As shown, the decentralized login method is the decentralized login method of the first decentralized login client in the decentralized login system, including:

[0066] Step 110: After receiving the first ID of the first decentralized login client, the first decentralized login client receives the second ID of the second decentralized login client, and the first ID of the first decentralized login client The ID and the second ID of the second decentralized login client are respectively sent by the network node server.

[0067] Before step 110, the first decentralized login client starts, accesses the network node server (NetworkNodeServer, NNS), and establishes a direct connection channel with the network node server. Wherein, the network node server is a network node (NetworkNode) server in a network architecture (SystemsNetworkArchitecture, SNA). Net...

Embodiment 2

[0093] figure 2 It is a schematic flowchart of another decentralized login method provided by Embodiment 2 of the present disclosure. Such as figure 2 As shown, the decentralized login method is the decentralized login method of the second decentralized login client in the decentralized login system, including:

[0094] Step 210: After receiving the second ID of the second decentralized login client, the second decentralized login client identifies the first ID of the first decentralized login client, and the first ID of the first decentralized login client The ID and the second ID of the second decentralized login client are respectively sent by the network node server.

[0095] Before step 210, the second decentralized login client starts, accesses the network node server and establishes a direct connection channel with the network node server. The network node servers accessed by the second decentralized login client are dynamically assigned randomly, that is, the netw...

Embodiment 3

[0112] image 3 It is a schematic diagram of the implementation flow of the decentralized login method provided by Embodiment 3 of the present disclosure. Such as image 3 As shown, the decentralized login methods include:

[0113] Step 301: the first decentralized login client accesses the network node server;

[0114] Step 302: the network node server randomly generates the first ID of the first decentralized login client, and the first ID of the first decentralized login client is a 128-bit character string;

[0115] Step 303: the network node server sends the first ID of the first decentralized login client to the first decentralized login client;

[0116] Step 304: the first decentralized login client receives the first ID of the first decentralized login client;

[0117] Step 305: the first decentralized login client adds two characters to the first ID of the first decentralized login client, and generates a QR code for the first ID of the first decentralized login c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a decentralizing login method. The method comprises the steps that a first decentralizing login client receives a first identity (ID) number of the first decentralizing login client, and then receives a second ID of a second decentralizing login client, wherein the first ID of the first decentralizing login client and the second ID of the second decentralizing login client are each sent by a network node server; the first decentralizing login client establishes a directly connected channel with the second decentralizing login client according to the first ID of the first decentralizing login client and the second ID of the second decentralizing login client; and after login, the first decentralizing login client receives basic data information by using the directly connected channel. The present invention also discloses another decentralizing login method, a decentralizing login client, another decentralizing login client, and a decentralizing login system.

Description

technical field [0001] The present disclosure generally relates to the field of decentralization, and in particular to a decentralized login method, client and system. Background technique [0002] At present, the social software of the client mainly uses a centralized login method based on a centralized server. Here, the client includes a personal computer (Personal Computer, PC) client and a mobile phone client. [0003] The centralized server uniformly saves the account and password information required for client login. Specifically, the centralized server generally uses a file-type database to save the account password information and friend list data registered by the user on the client, so that the account password information and friend list registered by the user are fixed on the centralized server. Here, the file-type databases include two-dimensional databases, such as relational databases such as Oracle database, MySQL, and Microsoft (MS) SQL; the file-type data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0876
Inventor 黄松发陈姝
Owner BEIJING ZHONGXIANG BIT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products