Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Login control method and login control system based on two-dimension code

A control method and technology for a control system, applied in the field of mobile internet, can solve problems such as high cost, poor user experience, forgetting account numbers and passwords, etc., and achieve the effects of reducing operating costs, improving user experience, and ensuring security.

Active Publication Date: 2013-04-10
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF7 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, many network services require users to set a relatively complex password to ensure sufficient password strength in order to ensure the security of user account information. Happening
And the verification code is generally randomly generated by the system, and the user experience is generally poor
Especially for mobile devices without peripheral keyboards such as tablet computers, a large amount of input brings a lot of inconvenience to users
[0010] In addition, once the user mistakenly enters a phishing website to log in, or the device is infected by a Trojan virus, the account number and password entered are at risk of being stolen, and the security is relatively low, especially for non-personal devices such as Internet cafe users. , user information security is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login control method and login control system based on two-dimension code
  • Login control method and login control system based on two-dimension code
  • Login control method and login control system based on two-dimension code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0035] Refer below figure 1 Describe the login control method based on the two-dimensional code according to the embodiment of the present invention, including the following steps:

[0036] Step S110: the cloud server of the network service provider receives the login request sent by the user through the first client, wherein the login request includes the address of the first client.

[0037] Step S120: the cloud server assigns an identification string to the login request, and generates a two-dimensional code according to the identifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a login control method based on two-dimension code. The login control method includes the following steps: a cloud server of a network service provider receives a login request of a user sent through a first client side; the cloud server distributes an identification string for the login request and generates the two-dimension code; the cloud server sends the two-dimension code to the first client side for display; the cloud server receives a agent login request which is photographed by a second client side and analyzed of the two-dimension code; the cloud server carries out identity authentication to the user according to the agent login request and sends an identity authentication result to the second client side; the second client side sends the identity authentication result to the first client side; and the first client side carries out re-direction of a page frame according to the identity authentication result. The login control method is small in user login input, low in operation cost, good in user experience, and high in safety. The invention further discloses a login control system based on the two-dimension code.

Description

technical field [0001] The present invention relates to the field of mobile internet technologies, in particular to a two-dimensional code-based login control method and system. Background technique [0002] The popularity and development of the Internet has brought a large number of network service providers. Many network service providers provide a login function, and some services require users to log in before they are authorized to obtain them. [0003] The basic implementation method of the user login system provided by the existing network service is as follows: [0004] Step S1: When the user requests to log in, the client system of the network service, such as the browser-side webpage, displays a login interface to the user. [0005] Step S2: The user enters a user account information on the login interface, including one or more of user name, email address, account number or mobile phone number, as well as the corresponding user password, verification code, etc. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06K7/10
Inventor 朱建庭
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products