Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Third-party login information hosting method and system

A technology for login information and successful login, applied in the field of Internet user login, can solve problems such as unfavorable secondary expansion, information leakage, uneven website performance, etc., and achieve the effect of increasing the difficulty of guessing, encryption method security, and hosting information security.

Active Publication Date: 2014-07-09
CHINA UNIONPAY
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. It is easy to be subject to the third-party login system of the joint login provider used, and there is no independent account password, which is not conducive to secondary expansion
[0006] 2. Malicious websites can carry out illegal activities by forging third-party login entries of joint login providers
[0007] 3. It is easily affected by the robustness of the third-party system. For example, when there is a problem with the third-party login system of the joint login provider, it will affect the normal login of the user
[0010] 1. It is not suitable for vertical industry applications with real-name system, which will cause information leakage
[0011] 2. Anyone can build a website to provide OpenID verification service, but the performance of the website is uneven, which makes the OpenID verification process unstable
[0012] 3. If the website that provides the OpenID verification service is suddenly closed, a large number of users may not be able to use the services of multiple websites
[0013] Therefore, a new secure third-party login information hosting method and system is needed to solve the risks and shortcomings of the above two solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third-party login information hosting method and system
  • Third-party login information hosting method and system
  • Third-party login information hosting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The specific implementation manners of the present invention will be described in further detail below with reference to the accompanying drawings. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more aspects of the embodiments. It may be apparent, however, to one skilled in the art that one or more aspects of the various embodiments may be practiced with a lesser degree of these specific details. Although a particular feature or aspect of an embodiment may be disclosed with respect to only one of several implementations, such feature or aspect may be disclosed in conjunction with other implementations as may be desired and advantageous for any given or particular application. One or more other features or aspects in combination.

[0091] figure 1 It is a schematic diagram of steps of a third-party login information hosting method according to an embodiment of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a third-party login information hosting method and system. The third-party login information hosting method comprises the following steps that firstly, registration is conducted on a hosting server, wherein a user name and a password for the hosting server are generated through a hosting client side; secondly, a user logs in to the hosting server on the hosting client side through the user name and the password, wherein the hosting server returns third-party URL ciphertext to the hosting client side after the login succeeds; thirdly, third-party login information is used for logging in to a third-party URL, wherein third-party login information ciphertext and a decipherment algorithm of the third-party login information are acquired from the hosting server through the third-party URL ciphertext, the third-party login information ciphertext is deciphered through the decipherment algorithm of the third-party login information to obtain the third-party login information, and therefore the third-party URL is logged in.

Description

technical field [0001] The invention relates to Internet user login technology, and in particular to a third-party login information trusteeship method and system. Background technique [0002] With the development of the Internet, the number of independent websites is increasing, and users need to perform login verification when using different websites (for example, e-commerce) to provide personalized services. The storage and use of many login information brings great inconvenience to the user, and the verification affects the user experience. To this end, different websites have adopted different solutions, such as using third-party authentication to log in or using OpenID to log in. But there are certain risks and deficiencies in these two schemes. [0003] For third-party authentication login, such as the joint login represented by JD.com, users can use the login platform they are most familiar with to verify user login information and save user personalized informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 张飞鲁志军尹亚伟
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products