Login validation method for network system database

A technology for network system and login verification, which is applied in the direction of user identity/authority verification, etc., and can solve problems such as hidden safety hazards and hidden dangers of online game databases

Inactive Publication Date: 2008-09-10
好旺角(厦门)电子科技有限公司
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the game database is operated by a third party, it will inevitably bring hidden dangers to the security of the online game database. Therefore, an appropriate login verification method must be designed
[0004] Similarly, using a third-party platform to log in to other network system databases also has such security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login validation method for network system database
  • Login validation method for network system database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Specific embodiments of the present invention will be described below with reference to the accompanying drawings.

[0011] This embodiment is mainly to provide a safe login verification method for logging into the game database for the online game virtual property online transaction management system, that is, to provide a safe login verification method for logging into the online game database through a third-party platform. The above-mentioned online game virtual property online management system mainly establishes a management platform that supports many client terminals with functions such as online storage, transfer, transaction and payment, and establishes an adapter between the management platform and the network game operator system. A series of standardized definitions made by the adapter enable data exchange between the management platform and the game database of the online game operator system, so as to realize the online storage, transfer, transaction and p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a logon authentication method of a network system database, which comprises the steps that: a logon request is sent from a user terminal to a third-party platform and the third-party platform requires the user terminal to enter into a logon platform of a network system; after the user terminal logs in the network system logon platform, the logon platform of the network system sends an one-time token to the user terminal; the user terminal sends the one-time token to the third-party platform which then sends the one-time token to a network system logon authentication server for verification; and the network system logon authentication server voids the one-time token, and authorizes a limited validity using term to the third-party platform; the user terminal enters into a network system database through the third-party platform according to authorization. The logon authentication method of the invention provides a safe and reliable verification method, thus ensuring that the network system virtual properties provided by a third-party can be widely applied to an online trading management system.

Description

technical field [0001] The invention relates to the field of network systems, in particular to a login verification method for a network system database. Background technique [0002] With the vigorous development of the online game industry, the trading of virtual property in online games has gradually become a reality, and various trading platforms for virtual property in online games have also emerged continuously. The most widely used virtual property trading platform only stops at providing third-party credit guarantees. To realize the transaction, the buyer and the seller need to agree on a time and at the same time complete the transaction by themselves through the seller informing the buyer of the game account number and password in the online game. For online games As far as the system is concerned, it is impossible to recognize this form of transaction, so it cannot be found that a transaction has occurred, and it cannot monitor the transaction, and cannot guarante...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 连庆仁
Owner 好旺角(厦门)电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products