Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

41results about How to "Simplify login operations" patented technology

Method, system and cloud server for multi-device safe logging

The invention provides a method, system and cloud server for multi-device safe logging, wherein the method comprises the steps that the cloud server creates connection information according to a connection request sent by a first terminal and creates a corresponding relation between account information in first logging session information and the connection information; the cloud server can send a login prompt to the first terminal according to the connection information corresponding to the account information corresponding to a user name sent by a second terminal, receives feedback information returned according to the login prompt, and controls logging of the second terminal according to the feedback information. According to the method, after a user normally logs in a device (such as the first terminal), a logging process can be completed only through inputting of the user name on other devices (such as the second terminal), logging operation of a user on multiple devices is simplified, user experience is promoted, the cloud server controls the logging of other equipment (such as the second terminal) according to the feedback information, and safety is guaranteed.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

A network logging on system and the corresponding configuration method and methods for logging on the application system

The invention relates to the technical field of network security and discloses a login system which comprises an application access platform and an identity and access management platform; wherein, the application access platform is used for installing and issuing an application system so as to lead users to login the application access platform and realize the logging in the application system which can pre-arrange and store related information of the application system; the identity and access management platform is used for obtaining the logging information and resource information of the application system from the application access platform, arranging the relatively accessible resource content and corresponding relations of network users and the users logging the application system, receiving the logging and making authentication of the network users. After the network users login the identity and access management platform with the application of the system disclosed by the invention, the identity and access management platform accesses the resource of the application system as legal users of the application system without leading the users directly to access the application system and the invention is high in access security and simple in the login operation of users.
Owner:亿阳安全技术有限公司

Web server, business logging method and system

The invention discloses a Web server, a business logging method and a business logging system, wherein the business logging method comprises the steps of: obtaining a second logging request information for logging on a second business, wherein the second logging request information comprises a first account number for logging on a first business by a user; and if the second account number bound to the first account number is inquired according to the second logging request information, logging on the second business according to the inquired second account number. According to the logging method disclosed by the invention, the user can achieve one-key logging when the user skips to another business with an account number binding relationship from one business, so the user operation is simplified.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Terminal application log-in method, device, client and electronic device

The invention discloses a terminal application log-in method and device, a client and an electronic device, and relates to the technical field of terminal application. According to the technical scheme, when an operation needing to be logged in is trigged in an application is received, whether an SIM card is available to a terminal is judged; if the SIM card is available to the terminal, a log-in operation is carried out in a first log-in mode or a second log-in mode according to user instructions, wherein the first log-in mode is automatic registering and / or logging-in and the second log-in mode is achieved through a registered account; if the SIM card is unavailable to the terminal, the log-in operation is carried out in the second log-in mode or a third log-in mode according to a user instruction, wherein the third log-in mode means to log in after registering is carried out through a mobile phone number or a mail box. The terminal application log-in method and device are mainly used in the log-in process of the terminal application.
Owner:北京鸿享技术服务有限公司

Account login method and electronic equipment

The embodiment of the invention discloses an account login method and electronic equipment, and relates to the field of electronic information technology. The account login operation can be simplified, automatic account login is realized, and account login efficiency is improved. The invention adopts the concrete scheme that the account login method comprises the steps: detecting login notification of a first APP (Application) of an application client by the electronic equipment; obtaining an authentication token of the application client after the login notification of the first APP is detected, wherein the authentication token of the application client is generated after any APP of the application client is logged in by the electronic equipment; logging the first APP according to the authentication token of the application client. The account login method and the electronic equipment disclosed by the invention are used in the account login process of the application client.
Owner:LETV INFORMATION TECH BEIJING

Cipher protection system and method

The invention discloses a password protection system, which comprises the following parts: an user boundary UI display unit, a saving unit with the password information and a comparison unit, wherein the password protection system includes a mouse operation dealing modular for sensing the mouse operation information in the password input frame of the UI display unit, analyzing the operation information and getting and outputting the mouse press key type information, the comparison unit is used to compare the output information of the mouse operation dealing modular with the saving password information in the saving unit, if the same, the right password signal is outputted, or the wrong password signal is outputted. The invention discloses a password protection method. The invention simplifies the landing operation, which safeguards the safety of the user' s information.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Method and apparatus for logging in client

The invention discloses a method and apparatus for logging in a client. The method comprises: a logging-in account number that is logged in currently by a second client operated at a terminal is obtained at a logging-in interface of a first client operated at the terminal, wherein the second client and the first client have an association relationship; a logging-in request that is generated after operation execution on the logging-in account number is obtained at the logging-in interface of the first client, wherein the logging-in request is used for requesting to use the logging-in account number to log in the first client; and the first client is logged in by using the logging-in account number to respond to the logging-in request. According to the invention, a technical problem of low logging-in efficiency due to utilization of the existing logging-in method can be solved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Single sign on methods and devices based on virtual private network (VPN)

The invention provides single sign on methods and devices based on a virtual private network (VPN). A method comprises the steps that when a VPN server detects that a VPN sign on account is input, theVPN server sends the VPN sign on account to an authentication server; the authentication server authenticates the VPN sign on account and returns an authentication result to the VPN server, wherein when authentication is successful, the authentication result comprises a token as a single sign on authentication evidence; when the authentication result received by the VPN server indicates that theauthentication is successful, if a resource request for obtaining a single sign on resource is received, the VPN server sends the token to a single sign on authentication center of a resource server,wherein the resource server comprises the single sign on authentication center and a resource system; and the single sign on authentication center checks the token and carries out corresponding operation according to a check result. The embodiment of the invention has the advantages of simple configuration, high account security and rapid sign on.
Owner:HANGZHOU DPTECH TECH

Access method on basis of brain waves and head-mounted virtual reality equipment

The invention discloses an access method on the basis of brain waves and head-mounted virtual reality equipment. The access method is applied to the head-mounted virtual reality equipment. The access method particularly includes steps of acquiring first brain wave information of a user who wears the head-mounted virtual reality equipment; extracting first key brain wave features in the first brain wave information; judging whether the first key brain wave features are consistent with preset verification brain wave features or not; skipping login interfaces to operation interfaces if the first key brain wave features are consistent with the preset verification brain wave features. The access method and the head-mounted virtual reality equipment have the advantages that the login interfaces can be skipped to the operation interfaces when the key brain wave features are consistent with the preset verification brain wave features, accordingly, manual operation can be omitted, login operation can be simplified, the login speeds can be increased, and the use experience can be enhanced for the user; the head-mounted virtual reality equipment can have independent login functions without auxiliary equipment, and accordingly the application range of the head-mounted virtual reality equipment can be expanded.
Owner:SHENZHEN MAGIC EYE TECH CO LTD

Account login method and terminal device

The embodiment of the invention relates to the technical field of communication, and discloses an account login method and a terminal device; wherein the method comprises that the terminal device obtains application software selected by a user and obtains biological characteristic information of the user; the terminal device obtains the account and password of the application software corresponding to the biological characteristic information; and the terminal device sends a login request carried with the account and the password to a server corresponding to the application software. Through application of the embodiment of the invention, the user does not need to input the account and the password each time when the user logs in; therefore, the login operation is simplified; and the account login process is convenient and rapid.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Method and apparatus for automatically logging in VR platform

Embodiments of the invention disclose a method and an apparatus for automatically logging in a VR (Virtual Reality) platform. The method comprises the steps of obtaining first attribute information and second attribute information, wherein the first attribute information is attribute information of the VR platform, and the second attribute information is attribute information of a local operation system; judging whether the first attribute information is matched with the second attribute information or not; and when the first attribute information is matched with the second attribute information, obtaining account information of the operation system, and when a system account is in a login state, automatically logging in the VR platform according to the account information of the operation system. According to the method, a user can automatically log in the VR platform without actively inputting the account information of the VR platform, so that the login operation of the user is simplified, the user operation efficiency is improved, and the user experience can be enhanced.
Owner:LETV HLDG BEIJING CO LTD +1

Login method without password based on third party authentication, device and system thereof

The invention discloses a login method without password based on third party authentication, a device and a system thereof. The system comprises a client, an application system, and a third-party authentication server. The client sends a login confirmation message to the third-party authentication server. The third-party authentication server, after receiving a login request of user login application system sent by the client or the application system and the login confirmation message, executes the security authentication for users according to the user number that the login request carries and the user key that the login confirmation message carries, and executes the security authentication for the application system according to the system number that the login request carries and the application system key. After the safety authentications for the user and application system are passed, the third-party authentication server sends a login confirmation order. The application system confirms the user corresponded to the user number and calls the login process to complete the user login after receiving the login confirmation order. By the login method without password based on third party authentication, the device and the system thereof, users login to any system without entering password and verification code.
Owner:北京花晗科技有限公司

Network management system and internetworking unit

Disclosed is a network management system that allows a system to be easily rebuilt, even when there is a switch in the configuration of cars, etc. Surveillance equipment, which includes surveillance cameras (1-1 to 1-4, ...) and image recording devices (1-5, ...), is networked in each car (21a, 21b, ...). Each of said car networks is configured as a LAN, and an inter-car network is configured as a WAN by connecting a router (1-10 (RT1), ...) to the LAN of each car. For the surveillance equipment in each car, identical equipment and equipment installed in identical locations in each car is connected to ports with identical port numbers, and allocated identical LAN addresses. Also, for access from the WAN side, which equipment is accessed is defined solely by the difference in port number, and it is possible to configure the network information of a switched car merely by changing the WAN address setting of the router, ...
Owner:KOKUSA ELECTRIC CO LTD

Login method and device based on applet, electronic equipment and storage medium

PendingCN114186206ASimplify login operationsSolve complex technical problems in login operationsDigital data authenticationEngineeringAuthorization
The invention provides a login method and device based on an applet, electronic equipment and a storage medium, and relates to the technical field of computers, in particular to the technical field of cloud services. The specific implementation scheme is as follows: acquiring a first login request; acquiring authentication information corresponding to the first login request from a first server; generating a second login request according to the first login request and the authentication information; sending a second login request to a second server corresponding to the applet; and receiving a login result returned by the second server based on the authentication information. It is easy to notice that the authentication information corresponding to the first login request can be obtained from the first server, the second login request capable of conducting user non-inductive login is obtained in combination with the authentication information, the user does not need to conduct authorization and login verification again, the technical effect of simplifying login operation is achieved, and the user experience is improved. The technical problem of complex login operation caused by tedious login steps in the prior art is solved.
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD

Vehicle time sharing rental intelligent application system and method

The invention provides a vehicle time sharing rental intelligent application system and method. The system includes a cloud and a terminal; the terminal is configured to receive a voice input and sendthe voice input to the cloud. The cloud includes: a voiceprint registration module configured to perform voiceprint registration on the voice according to the voice input sent by the terminal; a voiceprint verification module configured to perform voiceprint verification on the voice input; and a voice recognition and semantic analysis module configured to perform voice recognition and semantic analyzing after the voiceprint verification is passed; and a user behavior intention processing module configured to process the user behavior intention according to the voice recognition and semanticanalysis results, and feed the processing result back to the terminal in a voice message notification form.
Owner:WM SMART MOBILITY (SHANGHAI) CO LTD

Control method of intelligent TV set

The invention relates to a control method of an intelligent TV set. A remote controller starts multiple buttons of the intelligent TV set, and the intelligent TV set determines whether identity verification is needed. When the intelligent TV set needs identity verification, fingerprint information provided by a fingerprint reading component of the remote controller is received, and identity verification is carried out. When the intelligent TV set determines that the fingerprint information passes identity verification, the intelligent TV set is in a user mode corresponding to the fingerprint information and controls the fingerprint reading component to be in a dormant mode, and power is saved.
Owner:PRIMAX ELECTRONICS LTD

Login method and device of application program, readable medium and electronic equipment

The invention relates to a login method and device of an application program, a readable medium and electronic equipment, and relates to the technical field of electronic information processing. The method is applied to terminal equipment, and the method comprises the following steps: responding to triggering of a target application program in host application programs on the terminal equipment, and obtaining an application key corresponding to the target application program; sending the application key to a host server, so that the host server generates a corresponding authorization code according to the application key; receiving an authorization code sent by the host server, and sending the authorization code to the host server through the cloud device, so that the host server compares whether the authorization code received from the cloud device is the same as the authorization code generated according to the application key, and sends a comparison result to the cloud device; in response to the fact that the comparison result is the same, receiving and displaying first multimedia information sent by the cloud equipment, wherein the first multimedia information is information generated by the target application program after the cloud equipment logs in the target application program. According to the invention, the login efficiency can be improved.
Owner:BEIJING BYTEDANCE NETWORK TECH CO LTD

Timeout session management method and device, equipment and storage medium

The invention provides a timeout session management method and device, equipment and a storage medium. The method comprises the steps of: when a timeout session is detected, deleting the timeout session and generating a session timeout event; when an activation instruction is received, acquiring the timeout session identifier of the timeout session, and searching historical authentication information corresponding to the timeout session in a preset session timeout list according to the timeout session identifier; and creating a new target session, and updating the target session information and the target authentication information of the target session based on the timeout session information and the historical authentication information of the timeout session, so as to continue the session based on the target session and complete the activation of the timeout session. According to the invention, the session identifier and the authentication information of the timeout session are stored through the session timeout list, and the unauthenticated information of the newly built session is updated into the historical authentication information, so that the session with the user is continued through the newly built session, the user login operation is simplified, the session efficiency is improved, and the user experience is improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products