Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Login method and device, terminal and network server

A technology of network server and login method, applied in the fields of instruments, digital data authentication, electronic digital data processing, etc., can solve the problems of easy privacy leakage, affecting the willingness to use, and degrading user experience, and achieve the effect of ensuring security and login security.

Active Publication Date: 2013-09-11
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In terms of privacy protection, there are two options in the prior art. One is to remember the actual login password, that is, remember the actual login password in the password input box corresponding to the account, and log in directly according to the remembered password when logging in. The disadvantage of this situation is: in the case of fully remembering the password, other users can also directly use this device to log in to the account, which is easy to leak privacy
The other is not to remember the password, and enter the login password to log in every time you log in. The disadvantage of this situation is: in order to protect the user's password security during use, the current account password has become more and more complicated, for example, Passwords can contain numbers, characters, uppercase and lowercase English, etc., which makes it very troublesome to enter the password every time, brings a lot of inconvenience to users, reduces user experience, and also affects their willingness to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login method and device, terminal and network server
  • Login method and device, terminal and network server
  • Login method and device, terminal and network server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] figure 2 is a schematic flow chart of the login method provided by Embodiment 1 of the present invention, which can be applied to figure 1 In the terminal 110 in. Login methods include:

[0067] Step 210, acquiring the account to be logged in and the first password.

[0068] The first password can be the input password input for the current account to be logged in, and the first password can also be the input password input for the current account to be logged in and the machine code of the terminal (i.e. terminal 110) used to receive the input password combination.

[0069] Wherein, the machine code is used to uniquely identify a terminal, and the machine code of the terminal 110 is the unique identification code of the terminal 110 .

[0070] Step 220, judging whether the first password is the same as the local password bound to the pre-stored account.

[0071] In this embodiment, the local password can be a custom password that has been stored in the terminal a...

Embodiment 2

[0079] image 3 is a schematic flow chart of the login method provided in Embodiment 2 of the present invention, which can be applied to figure 1 In the terminal 110 in. Login methods include:

[0080] Step 310, obtaining an account to be logged in and receiving a user-defined password input by the user.

[0081] A custom password is a password that the user presets for the account to be logged in. Usually, in order to avoid the complexity of the custom password and make it easier for the user to remember or input, the custom password can be set relatively simply. Generally, the custom password can be set by A combination of letters, numbers, or punctuation symbols. For example, a custom password can be set to 123 or abc. In practical applications, on a fixed terminal 110, generally only one custom password is set for the same account, that is, on the same terminal 110, the same account corresponds to only one custom password.

[0082] In specific implementation, you can s...

Embodiment 3

[0098] Figure 5 is a schematic flowchart of the login method provided by Embodiment 3 of the present invention, which can be applied to figure 1 In the terminal 110 in. Login methods include:

[0099] Step 510, obtain the account to be logged in, receive the user-defined password input by the user, and obtain the local machine code.

[0100] A custom password is a password preset by the user for the account to be logged in. Usually, in order to avoid the complexity of the custom password and make it easier for the user to remember or input, the custom password can be set relatively simple. Generally, the custom password can be It is composed of letters, numbers, or punctuation symbols. For example, a custom password can be set to 123, or abc, etc. In practical applications, on a fixed terminal, generally only one custom password is set for the same account, that is, on the same terminal 110, the same account corresponds to only one custom password.

[0101] In specific im...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a login method and device, a terminal and a network server, and belongs to the field of communication. The login method comprises the steps of obtaining an account number to be logged in and a first password to be logged in, judging whether the first password is the same as a local password bound with the prestored account number or not, uploading a second password corresponding to the prestored account number to the network server to conduct matching if the first password is the same as the local password bound with the prestored account number, and logging in the account number if the matching is successful. Due to the fact that the user-defined password, namely the first password is introduced, complexity generated when the practical login password, namely the second password is input is avoided, insecurity generated when the practical login password is remembered on a terminal is avoided, therefore, rapidness, convenience and safety of login are improved, and user experience is strengthened.

Description

technical field [0001] The invention relates to the communication field, in particular to a login method and device, a terminal and a network server. Background technique [0002] With the continuous development of mobile Internet devices, large-screen device terminals make multi-person use a common phenomenon. But at the same time, in order to protect the password of the application program in the terminal from being stolen, the length of the password itself is also constantly increasing, and the composition is also constantly complicated. The inconvenience of input brings a large operational burden to the use of many people who need privacy protection many times a day. [0003] For example, in the prior art, when multiple accounts of multiple people use the same terminal to log in, the user selects an existing account and logs in when logging in the account. In terms of privacy protection, there are two options in the prior art. One is to remember the actual login passwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCG06F21/31H04L63/083G06F21/44G06F21/45G06F2221/2115H04L63/0838
Inventor 王佼刘凌邓亮孙一博
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products