Log-in control method and system based on two-dimension code

A control method and technology for a control system, applied in the Internet field, can solve the problems of forgetting account numbers, passwords, poor user experience, and high costs, and achieve the effects of ensuring security, improving user experience, and reducing operating costs.

Active Publication Date: 2013-04-24
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, many network services require users to set a relatively complex password to ensure sufficient password strength in order to ensure the security of user account information. Happening
And the verification code is generally randomly generated by the system, and the user experience is generally poor
Especially for mobile devices without peripheral keyboards such as tablet computers, a large amount of input brings a lot of inconvenience to users
[0010] In addition, once the user mistakenly enters a phishing website to log in, or the device is infected by a Trojan virus, the account number and password entered are at risk of being stolen, and the security is relatively low, especially for non-personal devices such as Internet cafe users. , user information security is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log-in control method and system based on two-dimension code
  • Log-in control method and system based on two-dimension code
  • Log-in control method and system based on two-dimension code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0036] Refer below figure 1Describe the login control method based on the two-dimensional code according to the embodiment of the present invention, including the following steps:

[0037] Step S110: the cloud server of the network service provider receives the login request sent by the user through the first client.

[0038] Step S120: the cloud server assigns an identification string to the login request, and generates a two-dimensional code according to the identification string and the address information of the cloud server.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a log-in control method based on a two-dimension code. The log-in control method based on the two-dimension code comprises the steps that a network service provider cloud server receives a log-in request sent through a first client-end by a user, the cloud server generates a two-dimension code, sends the two-dimension code to the first client-end and displays the two-dimension code through the first client-end, a second client-end obtains an identification string and an address message in the two-dimension code, the second client-end logs in and sends an agency log-in request according to the address message, the cloud server carries out identity authentication of the user according to the agency log-in request, and the cloud server receives a polling request or a long connection request of the first client-end and returns a user log-in conversation message to the first client-end after the identity authentication of the user is carried out. According to the log-in control method based on the two-dimension code, inconvenience brought by a large amount of input during a user log-in process is avoided, safety of a user account is improved, operating cost is low, and user experience is good. Further disclosed is a log-in control system based on the two-dimension code.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a two-dimensional code-based login control method and system. Background technique [0002] The popularity and development of the Internet has brought a large number of network service providers. Many network service providers provide a login function, and some services require users to log in before they are authorized to obtain them. [0003] The basic implementation method of the user login system provided by the existing network service is as follows: [0004] Step S1: When the user requests to log in, the client system of the network service, such as the browser-side webpage, displays a login interface to the user. [0005] Step S2: The user enters a user account information on the login interface, including one or more of user name, email address, account number or mobile phone number, as well as the corresponding user password, verification code, etc. Some service p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 朱建庭
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products