Method, system and device used for controlling login and based on two-dimensional code

A control method and technology for a control system, applied in the field of mobile internet, can solve the problems of poor user experience, forgetting account numbers, passwords, and high costs, and achieve the effects of improving user experience, ensuring security, and reducing operating costs.

Active Publication Date: 2013-03-27
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, many network services require users to set a relatively complex password to ensure sufficient password strength in order to ensure the security of user account information. Happening
And the verification code is generally randomly generated by the system, and the user experience is generally poor
Especially for mobile devices without peripheral keyboards such as tablet computers, a large amount of input brings a lot of inconvenience to users
[0010] In addition, once the user mistakenly enters a phishing website to log in, or the device is infected by a Trojan virus, the account number and password entered are at risk of being stolen, and the security is relatively low, especially for non-personal devices such as Internet cafe users. , user information security is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device used for controlling login and based on two-dimensional code
  • Method, system and device used for controlling login and based on two-dimensional code
  • Method, system and device used for controlling login and based on two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0049] Refer below figure 1 Describe the login control method based on the two-dimensional code according to the embodiment of the present invention, including the following steps:

[0050] Step S110: the cloud server of the network service provider receives the login request sent by the user through the first client.

[0051] Step S120: the cloud server assigns an identification string to the login request, and generates a two-dimensional code according to the identification string and the address information of the cloud server.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method used for controlling login and based on a two-dimensional code. The method includes that a cloud server of a network service provider receives a login request sent by a user through a first client; the cloud server distributes identification strings for the login request to generate the two-dimensional code; the cloud server sends the two-dimensional code to the first client to be displayed; the cloud server receives a proxy login request sent by a second client to address information in the two-dimensional code after the second client shoots and analyzes the two-dimensional code; the cloud server conducts identity authentication on the user according to the proxy login request; and the cloud server receives a polling request of the first client or a long connection request and returns user login conversion information to the first client after the user passes the identity authentication. By means of the method, inconvenience caused by a large amount of input during login of the user is avoided, safety of an account is improved, operation cost is low, and user experience is good. The invention further discloses a system used for controlling the login and based on the two-dimensional code and the client server.

Description

technical field [0001] The present invention relates to the field of mobile Internet technology, in particular to a login control method, system and device based on a two-dimensional code. Background technique [0002] The popularity and development of the Internet has brought a large number of network service providers. Many network service providers provide a login function, and some services require users to log in before they are authorized to obtain them. [0003] The basic implementation method of the user login system provided by the existing network service is as follows: [0004] Step S1: When the user requests to log in, the client system of the network service, such as the browser-side webpage, displays a login interface to the user. [0005] Step S2: The user enters a user account information on the login interface, including one or more of user name, email address, account number or mobile phone number, as well as the corresponding user password, verification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 朱建庭武林
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products