Login method and device based on terminal identification

A technology of terminal identification and login method, which is applied in the field of login methods and devices based on terminal identification, can solve the problems of wasting user time, reducing user experience, increasing user operation complexity, etc., so as to save time and reduce operation complexity. Effect

Active Publication Date: 2015-01-07
XIAOMI INC
View PDF9 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Therefore, limited by the security level of the operating system, the cookie file used to verify the user's identity information cannot be shared by multiple web browsers. Therefore, when the user switches web browsers to access a website with identity verification, he often needs to log in again. identity information, so the user's time is wasted, the user's operation complexity is increased, and the user's experience is reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login method and device based on terminal identification
  • Login method and device based on terminal identification
  • Login method and device based on terminal identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] figure 1 It is a flow chart of a login method based on terminal identification shown according to an exemplary embodiment, as shown in figure 1 as shown, figure 1 The terminal identification-based login method shown can be used in terminals. The terminal identification-based login method provided by the present disclosure can enable users to automatically log in without re-entering identity information when switching web browsers to access websites with identity verification, thereby saving users' time and reducing operational complexity. Improve user experience. The method includes the following steps.

[0075] In step S11, when the server receives the network request sent by the first browser running on the terminal, it extracts the terminal identifier in the network request.

[0076] Wherein, the method provided by the present disclosure can be applied in the server of the website. The user can open the first browser on the terminal, and input the website addres...

Embodiment 2

[0099] figure 2 is a flow chart of another login method based on terminal identification shown according to an exemplary embodiment, as shown in figure 2 as shown, figure 2 The terminal identification-based login method shown can be used in a terminal, and figure 2 The method shown with figure 1 The methods shown can be used in conjunction with each other. The terminal identification-based login method provided by the present disclosure can enable users to automatically log in without re-entering identity information when switching web browsers to access websites with identity verification, thereby saving users' time and reducing operational complexity. Improve user experience. The method includes the following steps.

[0100] In step S21, when receiving an instruction to access the server of the website by using the first browser, send a network request with a terminal identifier to the server of the website by using the first browser.

[0101] Wherein, the method pro...

Embodiment 3

[0105] image 3 It is a schematic diagram of a terminal identification-based login device according to an exemplary embodiment. The terminal identification-based login device provided by the present disclosure can enable users to automatically log in without re-entering identity information when switching web browsers to access websites with identity verification, thereby saving users' time and reducing operational complexity. Improve user experience. refer to image 3 , the device includes an extracting module 11 , a determining module 12 , a generating module 13 and a sending module 14 . in:

[0106] An extracting module 11, configured to extract the terminal identifier in the network request when receiving the network request sent by the first browser running on the terminal;

[0107] The determining module 12 is configured to query a pre-established library of correspondence between terminal identifiers and user identity information, and determine the user identity inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure relates to a login method and device based on terminal identification. The method comprises the following steps: when a network request sent by a first browser running on a terminal is received, extracting the terminal identification in the network request; inquiring a pre-established corresponding relation library between the terminal identification and user identity information, and determining the user identity information corresponding to the terminal identification; generating a cookie file comprising the user identity information; and transmitting the cookie file to the first browser. Through the disclosure, network requests subsequently sent by the first browser carry cookie files having the user identity information, so that a user can realize a login state without inputting the user identity information. Through a scheme provided by the disclosure, the user can realize automatic login without inputting the identity information once again while accessing a website having identity verification, so that time of the user is saved, and the operation complexity is lowered.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, to a terminal identification-based login method and device. Background technique [0002] With the development of mobile Internet technology, more and more Internet manufacturers have launched web browsers based on different platforms. At the same time, the user will also install different types of web browsers on the terminal to experience the functions and fun brought by different web browsers. [0003] Usually, when a user accesses a website using a certain web browser on a terminal, the server of the website will often request the user to enter a user name and password, and the website will display a check box of "automatically log in next time". If the user enters the user name and password, and checks the check box of "automatically log in next time", then the server of the website will send the cookie file encrypted by the user name and password to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
CPCH04L63/0815H04L67/08
Inventor 任远姚丽梅江岱霖
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products