Cross-device login method, system and device

A login method and cross-device technology, applied in the field of communications, which can solve problems such as secondary user intervention

Inactive Publication Date: 2021-01-19
ADVANCED NEW TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a cross-device login method, system and device, which are used to solve the problem that the existing cross-device login methods require the user's secondary intervention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-device login method, system and device
  • Cross-device login method, system and device
  • Cross-device login method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] figure 1 It is a schematic flowchart of a cross-device login method according to Embodiment 1 of the present invention. Such as figure 1 As shown, the cross-device login method includes the following steps:

[0054] S101. The device to be authorized sends a login request to a server, where the login request includes login information for logging into an application program.

[0055] When a user tries to log in to an application program on a device to be authorized, a login request needs to be sent to the server corresponding to the application program through the device to be authorized, so as to request the server to allow the device to be authorized to log in to the application program, so that the device to be authorized The device has permission to use the application. Wherein, the login request at least includes login information for logging into the application program. Wherein, the login information is preferably a login account. In practical applications, g...

Embodiment 2

[0074] figure 2 It is a schematic flowchart of the cross-device login method provided by Embodiment 2 of the present invention. Such as figure 2 As shown, the cross-device login method includes the following steps:

[0075] S201. The device to be authorized sends a login request to the server.

[0076] For the specific process, please refer to the introduction of related content in the above embodiments, and details will not be repeated here.

[0077] S202. The server processes the login request to obtain login parameters therefrom.

[0078] The server may parse the login request to obtain the login parameters carried in the login request. The login parameters may include login account number and login time.

[0079] S203. The server verifies the validity of the login request according to the login parameters.

[0080] The server can determine whether the login account and the login time are valid, and if the login account is a valid account, it means that the login ac...

Embodiment 3

[0114] image 3 It is a schematic flowchart of a cross-device login method according to Embodiment 3 of the present invention. Such as image 3 As shown, the cross-device login method includes the following steps:

[0115] S301. Send a login request to a server, where the login request includes login information for logging into an application program.

[0116] In this embodiment, the execution subject of the cross-device login method is the device to be authorized. When a user tries to log in to an application program on a device to be authorized, the device to be authorized sends a login request to the server corresponding to the application program, requesting that the server allow the device to be authorized to log in to the application program, so that the device to be authorized has Permissions to use this application. Wherein, the login request at least includes a login account. Optionally, the login request may also include information such as the device identifie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cross-device login method, system and device. The device to be authorized sends a login request to the server, and the server sends the verification code used to verify the device to be authorized to the authorized device, and the authorized device broadcasts The audio signal, wherein the audio signal includes at least a check code, the device to be authorized obtains the check code from the audio signal after listening to the audio signal and sends it to the server for verification, and the server allows the device to be authorized to log in after the verification is passed. In the present invention, the authorized device near the device to be authorized can receive the verification code sent by the server, and then broadcast the audio signal carrying the verification code based on the near-field acoustic wave communication, and the device to be authorized can extract the verification code from the detected audio signal. The verification code is automatically sent to the server for verification, realizing cross-device login authentication without the need for the user's secondary intervention, more intelligent, reducing authorization costs, improving operational efficiency, and improving user experience.

Description

technical field [0001] The invention belongs to the communication field, and in particular relates to a cross-device login method, system and device. Background technique [0002] Now users can log in across devices through their mobile phones. The existing cross-device login methods through mobile phones mainly include: the user scans the QR code through the mobile phone, and completes the login based on the QR code; or, sends a SMS verification code to the mobile phone, and then the user completes the login based on the SMS verification code ; Or, by sending a voice verification code to the mobile phone, and then the user completes authority authentication based on the voice verification code. [0003] The existing cross-device login methods all require the user's secondary intervention, which makes the login not intelligent enough. For example, the login method based on scanning the code requires the user to operate the mobile phone, open the scanning page of the mobile...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/083H04L63/0853H04L63/18H04W12/06H04L2463/082H04W12/30H04B11/00H04W12/50
Inventor 周琪
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products