Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-application login method and device

A login method and multi-application technology, applied in the computer field, can solve problems affecting user experience and inflexible login methods, and achieve the effect of improving user experience and flexibility

Active Publication Date: 2019-03-01
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a multi-application login method and device to solve the problems in the prior art that the login mode is not flexible and affects user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-application login method and device
  • Multi-application login method and device
  • Multi-application login method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] figure 2 It is a schematic diagram of a multi-application login process provided by an embodiment of the present invention, and the process includes:

[0052] S201: Receive a login request of the first application sent by the first terminal device, generate a first login ID corresponding to the login request, and send a login QR code containing the first login ID to the first terminal device, enabling the first terminal device to display the login QR code.

[0053] In the embodiment of the present invention, the verification server will generate a login ID uniquely corresponding to the login request for each received application login request to identify the login request. For example, the login request ID can include the global A unique identifier (Globally Unique Identifier, GUID) and the like are used to ensure the uniqueness of the login request identifier.

[0054] In addition, in practical applications, the user can trigger the first terminal device to send a l...

Embodiment 2

[0070] In order to improve the reliability of login, on the basis of the above embodiments, in the embodiment of the present invention, if the public key and private key of each application are pre-configured, the login information also includes the private key signature, and the acquisition and Before the target user information corresponding to the target second login identifier of any of the target second applications, the method further includes:

[0071] Verifying the signature of the private key of the target second application according to the public key of the target second application;

[0072] If the signature verification is passed, the step of acquiring target user information corresponding to the target second login ID of the target second application is performed.

[0073] In the embodiment of the present invention, each application can also be configured with a public key and a private key, and publicize the public key.

[0074]Specifically, before the first ve...

Embodiment 3

[0078] image 3 It is a schematic diagram of a multi-application login process provided by an embodiment of the present invention, and the process includes:

[0079] S301: Scan the login QR code of the first application displayed on the first terminal device to obtain the first login ID included in the login QR code, where the first login ID is the first login ID corresponding to the first application. Generated by the verification server according to the login request of the first application sent by the first terminal device.

[0080] In the embodiment of the present invention, the verification server will generate a login ID uniquely corresponding to the login request for each received application login request to identify the login request. For example, the login request ID can include a GUID etc. are used to ensure the uniqueness of the logon request ID.

[0081] Specifically, after receiving the login request of the first application sent by the first terminal device, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-application login method and device. The method comprises the steps of receiving a login request of a first application sent by first terminal equipment by using a first verification server, and generating a login two-dimensional code including a first login identifier corresponding to the login request; displaying the login two-dimensional code by using the first terminal equipment; receiving a first login identifier acquired by second terminal equipment through scanning the login two-dimensional code and login information of at least one second application that is successfully logged in; when the target second application with the login state accepted by the first application in the at least one second application is recognized according to an applicationlist of third applications of which the login states are accepted by the first application, acquiring target user information corresponding to the target second login identifier of any target second application, thus allowing the first terminal to log in the first application via the target user information. The invention provides a login scheme which can achieve mutual authentication between thedifferent applications.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a multi-application login method and device. Background technique [0002] With the development of science and technology and the continuous improvement of people's living standards, terminal equipment has gradually entered people's work and life, bringing great convenience to people's work and life. People use various applications on terminal devices for entertainment, study, and office work. However, when users use applications on terminal devices, they usually need to log in to the applications. Only after successful login can they use the applications. [0003] Currently, a common login method for logging in to an application is to log in with a user name and password. However, this login method requires the input of a user name and password for each login. The login process is cumbersome and affects the user experience. In order to simplify the login process, the existing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/36
CPCG06F21/36H04L9/3247H04L63/08H04L63/083
Inventor 安晓江胡伯良蒋红宇
Owner BEIJING HAITAI FANGYUAN HIGH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products