Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40results about How to "Login implementation" patented technology

Session method, web server and browser

ActiveCN105141605ALogin will not affectLogin implementationTransmissionWeb serverRegistered user
Embodiments of the invention disclose a session method, a web server and a browser, which are used for implementing login of a plurality of users in a plurality of tabs of a browser. The method in the embodiments of the invention comprises the following steps that the web server receives an access request for protected resources, which is sent by the browser, wherein the protected resources are only visited by legal registered users; the web server judges whether the access request carries an identification sequence, wherein the identification sequence is generated by the web server or the browser when the browser visits a login page of the web server; if the access request does not carry the identification sequence, the web server returns the login page to the browser; if the access request carries the identification sequence, the web server judges whether account information corresponding to the identification sequence carried by the access request exists in session information of the browser and the web server; if yes, the web server returns a page corresponding to the access request; if no, the web server returns the login page. The embodiments of the invention also disclose the web server and the browser, which are used for implementing login of a plurality of users in a plurality of tabs of the browser.
Owner:KINGDEE SOFTWARE(CHINA) CO LTD

Method and device for logging in web page

The invention discloses a method and a device for logging in a web page. The method comprises the steps as follows: a host process starts a sub-process and sends information of the target web page to be logged in currently to the sub-process; the sub-process obtains a login configuration rule corresponding to a target web page identifier; the sub-process loads the target web page corresponding to the target web page identifier according to the login configuration rule; the sub-process locates elements in the target web page so as to determine a login object; and login information corresponding to a login information identifier is filled in the login object. The step that the sub-process loads the target web page corresponding to the target web page identifier according to the login configuration rule specifically comprises the steps as follows: the target web page corresponding to the target web page identifier is loaded; whether the login configuration rule includes a dynamic library interception step or not is judged, and if the login configuration rule includes the dynamic library interception step, a dynamic link library corresponding to the target web page is intercepted. Compared with form filling login methods in the prior art, the login method has the advantage that a user can use a plurality of different account numbers and passwords to log in one website simultaneously.
Owner:BEIJING QIHOO TECH CO LTD

Charging control system and method for self-service equipment

The invention relates to a charging control system and method for self-service equipment. The system comprises a user terminal, a plurality of charging control terminals and a local server; the user terminal is used for registering a user account for logging in to the charging control system in the local server, recharging the user account online and generating user login information of logging into the charging control system; each charging control terminal is used for entering an operation interface of the charging control system through the user login information, controlling the self-service equipment to run according to an operation type selected on the operation interface and conducting charging; the local server is used for monitoring and managing the charging control terminals andautomatically deducting amount from the user account according to charging information of the corresponding charging control terminal. According to the system, through account self-creation and account login, the corresponding charging control terminal achieves charging control over the self-service equipment, the charged amount is deducted from the account online, the amount payment is quick andconvenient, and the system can adapt to various different application scenarios.
Owner:唐晓冬

Double-factor authentication security supervisor login system and method

The invention relates to a double-factor authentication security supervisor login system and method. Login plugin is installed in the security supervisor, unique identification is transmitted to a server, the server generates verification information according to the unique identification and returns the verification information to the security supervisor, the security supervisor displays the verification information as a two-dimensional code, a user terminal scans the two-dimensional code to verify the verification information, a server receives a verification request of the user terminal, when the request is matched with the account and verification information of the security supervisor in the server, the security supervisor is marked as verification passing, a verification passing state is transmitted to the security supervisor, and the security supervisor receives the verification passing state to finish login. By the double-factor authentication security supervisor login system and method, extra hardware is not required, double passwords do not need to be memorized, complicated rules do not need to be set, the cost is low, hardware such as USB key is omitted, double-factor login complexity degree is reduced, and the cost of the safety technology is reduced.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Terminal login method and system

The invention provides a terminal login method and system. The terminal login method comprises the following steps: establishing a one-to-one correspondence relationship between a first terminal and a mobile terminal by a server; receiving a login instruction sent by the mobile terminal; and sending the login instruction to the first terminal, so that the first terminal logs in the first terminal according to the login instruction. Based on the terminal login method and system provided by the invention, during the login of the terminal, a user does not need to manually input login information and only needs to establish the one-to-one correspondence relationship between the mobile terminal and the to-be-logged in terminal, and the login of the terminal can be realized by performing simple operations on the mobile terminal, thereby greatly improving the user experience.
Owner:BEIJING QIHOO TECH CO LTD

Application account login method and system based on ciphertext Hash retrieval

The invention discloses an application account login method and system based on ciphertext Hash retrieval. The method includes the following steps: encrypting account names, passwords and other information in a mobile phone login process by using an SQLCipher technology, binding the encrypted information to a mobile phone identification code to establish an account library, and further realizing the function that the accounts and passwords are automatically classified and retrieved and automatically input during login; enabling a user to save account information in a classification mode basedon applications, encrypting the account information through a mobile phone feature code and master key related information by using an SMS4 encryption algorithm and a Hash algorithm, and then saving the information in a database to realize the double encryption of the data and database. After entering the system to turn on an application login mode, the function resides in a taskbar, when the userclicks the automatic entry function in the taskbar, the system calculates and retrieves a Hash value of a data character combination ciphertext in the background and merges the value into a characterstring, and then the corresponding account information can be retrieved by using the character string, the account login based on ciphertext Hash retrieval can be achieved, and the scheme of the invention is simple in operation and convenient in management, and has high security.
Owner:CHINA UNIV OF GEOSCIENCES (WUHAN)

Resource calling method, resource calling device, client and business server

The invention discloses a resource calling method, a resource calling device, a client and a business server, and the method comprises the steps: receiving Cookie issued by a third-party login serverafter the client logs in successfully through the preset third-party login server, and enabling the Cookie to comprise a session identification code; generating a token request carrying the Cookie, and sending the token request to a service server; receiving a target token returned by the service server based on the token request, the target token being generated by the service server according toa session identification code contained in the Cookie; and calling resources of the service server based on the target token. Through the scheme of the invention, the login function can be extractedfrom the service server, so that the client logs in the service server through the third-party login server, and the data security of the service server is still ensured while the design complexity ofthe service server is reduced.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Cross-application login method and device, equipment and medium

The invention relates to the field of artificial intelligence, and provides a cross-application login method and apparatus, a device and a medium, which can perform retrieval in an identifier list according to a target device identifier to obtain target account information corresponding to the target device identifier, so as to ensure that the target account information corresponding to the targetdevice identifier can be stored in the same group or the same organization. The equipment identifiers of one piece of equipment on different application programs are consistent, verifying the validity of the target account information, acquiring the current face image of the user by utilizing the camera device when the equipment identifiers are valid, verifying the current face image by adoptinga dynamic threshold method based on the target account information, and logging in the target application program when the equipment identifiers pass the verification; therefore, the related information of face authentication can be called through the unified equipment identifier to implement face login, the login security is ensured, cross-application login among different applications in the same organization is realized, and the login efficiency is improved. In addition, the invention also relates to a blockchain technology, and the identification list can be stored in the blockchain node.
Owner:PING AN TECH (SHENZHEN) CO LTD

Method and device for logging in to cloud desktop

The invention discloses a method and a device for logging in to a cloud desktop. The method comprises steps: when a user swipes a contactless IC card, a cloud terminal sends a login request to a server; after the server receives the login request from the cloud terminal, a character string is generated randomly and sent to the cloud terminal; the cloud terminal receives the character string from the server, a first verification code is calculated according to the user information in the contactless IC card and the received character string, and the calculated first verification code and the contactless IC card identifier are sent to the server; and the server looks for the user information corresponding to the contactless IC card identifier in a corresponding relation, a second verification code is calculated according to the found user information and the generated character string, whether the first verification code and the second verification code are matched is judged, and a cloud desktop environment is provided for the user. According to the scheme of the invention, as long as the user swipes the contactless IC card, login of the cloud desktop can be realized, the user does not need to input a username and a password, login of the cloud desktop can be simply and quickly realized, and the user experience is thus improved.
Owner:ZTE CORP

Method for activating intelligent television accounts in forced manner

The invention relates to the field of intelligent televisions, and discloses a method for activating intelligent television accounts in a forced manner. The method includes steps of a, entering startup guide when televisions are started up if the televisions are started up for the first time, entering a step b, or entering a step c if the televisions are not started up for the first time; b, displaying television account login interfaces in the startup guide and entering the step c; c, judging whether the television accounts are already activated or not, entering account automatic login processes if the television accounts are already activated, or entering a step e if the television accounts are not activated; d, judging whether current networks are connected or not, forcing users to activate the accounts if the current networks are connected, skipping the login interfaces if the current networks are not connected and entering the step e; e, monitoring the television networks, poppingout the television account login interfaces if network connection is monitored, and forcing the users to activate the accounts. The method has the advantages that account registration of the television users can be increased by the aid of forced activation mechanisms, and the activeness of the user accounts can be guaranteed.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Secure login method and system based on third-party authorization

The invention discloses a secure login method and system based on third-party authorization, and the method comprises: a server side of a calling party receiving an authentication request which is transmitted by a browser side and is provided with a unique identification code, and transmitting the unique identification code to a server side of a third party; the server of the third party acquiringuser information containing the unique identification code from the client of the third party, and determining the user information corresponding to the authentication request according to the uniqueidentification code; the server of the third party encrypting user information corresponding to the authentication request by using the unique identification code, acquiring encrypted user information and sending the encrypted user information to the server of the calling party; and the server of the calling party using the unique identification code to calculate a decryption key, using the decryption key to decrypt the encrypted user information, obtaining the user information corresponding to the authentication request, and allowing login operation. According to the invention, the user information is encrypted and decrypted in a symmetrical encryption mode, so that the security is greatly improved, and the authenticity and reliability of the user identity information are ensured.
Owner:AEROSPACE INFORMATION

The method of realizing the forced activation of the smart TV account

ActiveCN107872728BIncrease the number of registrationsReduce stepsSelective content distributionNetwork connectionStart up
The invention relates to the field of intelligent televisions, and discloses a method for activating intelligent television accounts in a forced manner. The method includes steps of a, entering startup guide when televisions are started up if the televisions are started up for the first time, entering a step b, or entering a step c if the televisions are not started up for the first time; b, displaying television account login interfaces in the startup guide and entering the step c; c, judging whether the television accounts are already activated or not, entering account automatic login processes if the television accounts are already activated, or entering a step e if the television accounts are not activated; d, judging whether current networks are connected or not, forcing users to activate the accounts if the current networks are connected, skipping the login interfaces if the current networks are not connected and entering the step e; e, monitoring the television networks, poppingout the television account login interfaces if network connection is monitored, and forcing the users to activate the accounts. The method has the advantages that account registration of the television users can be increased by the aid of forced activation mechanisms, and the activeness of the user accounts can be guaranteed.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Game weak network test analysis platform

PendingCN114146417ASave hassle and timeFaster login timesProcessor architectures/configurationVideo gamesImage resolutionData processing
The invention relates to the technical field of network testing, in particular to a game weak network testing and analyzing platform, which comprises a data acquisition module, a data processing module and an analysis module, the analysis module is connected with the data acquisition module and is used for analyzing the entity information acquired by the data acquisition module and acquiring current game login state parameters; the central control module is connected with the data acquisition module and is used for adjusting the analysis result of the analysis module; according to the method, the GPU ratio of each login process is judged based on several specific continuous processes of game login so as to accurately determine the login obstacle of a certain determined link of game login, firstly, the animation frame rate and the animation resolution are reduced, on one hand, login in a low-obstacle environment can be rapidly realized by adopting the mode, and on the other hand, the login obstacle of a certain determined link of game login can be accurately determined by adopting the animation frame rate and the animation resolution. By dividing each determination link, preparation can be made for subsequent detection and judgment of uplink and downlink packet loss rates.
Owner:GUANGZHOU YINHAN TECH CO LTD

Single sign-on method, first server and electronic equipment

The invention provides a single sign-on method, a first server and electronic equipment. The method comprises the steps that: a sign-on request transmitted by the electronic equipment is received, wherein the sign-on request comprises a first application type and first user account information; a first server firstly detects whether second user account information of a first application type corresponding to the first user account information is stored or not; if the second user account information is not stored, the first server generates a biological characteristic information collection instruction and sends the same to the electronic equipment; the electronic equipment sends collected target biological characteristic information to the first server; the first server can obtain the second user account information of the first application type corresponding to the target biological characteristic information, so that the electronic equipment logs in a first application program basedon the second user account information. Therefore, the purpose of logging in the first application program by utilizing the first user account information can be achieved under the condition that thecorresponding relationship between the first user account information and the second user account information is not set in advance.
Owner:BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products