Method, system and device used for controlling login and based on two-dimensional code

A control method and control system technology, applied in the field of login control based on two-dimensional codes, can solve problems such as poor user experience, high cost, forgotten account number, password, etc., and achieve the goals of improving user experience, reducing operating costs, and ensuring security Effect

Active Publication Date: 2013-03-27
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, many network services require users to set a relatively complex password to ensure sufficient password strength in order to ensure the security of user account information. Happening
And the verification code is generally randomly generated by the system, and the user experience is generally poor
Especially for mobile devices without peripheral keyboards such as tablet computers, a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device used for controlling login and based on two-dimensional code
  • Method, system and device used for controlling login and based on two-dimensional code
  • Method, system and device used for controlling login and based on two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0051] Refer below figure 1 Describe the login control method based on the two-dimensional code according to the embodiment of the present invention, including the following steps:

[0052] Step S110: the cloud server receives the login request sent by the first client.

[0053] Step S120: the cloud server assigns an identification string to the login request, obtains temporary authentication information from the push server, and generates a two-dimensional code according to the identification string.

[0054] Step S130: the cloud serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method used for controlling login and based on a two-dimensional code. The method includes that a cloud server receives a login request sent by a first client; the cloud server distributes identification strings for the login request and obtains temporary authentication information from a push server to generate the two-dimensional code; the cloud server sends the two-dimensional code and the temporary authentication information to the first client, and the two-dimensional code is displayed through the first client; the first client builds connection with the push server according to the temporary authentication information; the cloud server receives a proxy login request sent by a second client to the cloud server after the second client shoots and analyzes the two-dimensional code; the cloud server conducts identity authentication on the user according to the proxy login request; and the cloud server pushes user login conversion information to the first client through the push server after the user passes the identity authentication. By means of the method, operation cost of the user is low, user experience is good, and safety is high. The invention further discloses a system used for controlling the login and based on the two-dimensional code, clients, the cloud server and a mobile terminal.

Description

technical field [0001] The invention relates to the field of computer information technology, in particular to a login control method, system and device based on a two-dimensional code. Background technique [0002] The popularity and development of the Internet has brought a large number of network service providers. Many network service providers provide a login function, and some services require users to log in before they are authorized to obtain them. [0003] The basic implementation method of the user login system provided by the existing network service is as follows: [0004] Step S1: When the user requests to log in, the client system of the network service, such as the browser-side webpage, displays a login interface to the user. [0005] Step S2: The user enters a user account information on the login interface, including one or more of user name, email address, account number or mobile phone number, as well as the corresponding user password, verification cod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 朱建庭
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products