Login method, login system and terminal

A login method and technology for a login system, applied in the terminal field, can solve problems such as low security, hidden dangers of user information security, poor experience, etc., and achieve the effect of avoiding cumbersome processes and improving security.

Inactive Publication Date: 2015-01-14
YONYOU NETWORK TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For enterprises, expanding to the mobile Internet will also have to face some operational problems. Enterprise mobile application servers are deployed in the internal network of the enterprise. The C/S architecture system needs to pass public network IP, domain name, VPN server, user name, Passwords and other methods are used for mobile client registration, login and access. At present, the client manually sets the se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login method, login system and terminal
  • Login method, login system and terminal
  • Login method, login system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0029] In order to be able to understand the above objectives, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that the embodiments of the application and the features in the embodiments can be combined with each other if there is no conflict.

[0030] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited to the specific details disclosed below. Limitations of the embodiment.

[0031] figure 1 A schematic flowchart of a login method according to an embodiment of the present invention is shown.

[0032] Such as figure 1 Said, the login method according to an embodiment of the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a login method, a login system and a terminal. The login method includes the steps of obtaining a two-dimensional code identification which is generated by a server and includes user information and server information, analyzing the user information and the server information in the two-dimensional code identification, sending the user information to the server according to the analyzed server information, and finishing login after obtaining a login permission instruction of the server. According to the technical scheme, a new convenient login server scheme is provided for a user, and the complex process that the user inputs the server information and the user information is avoided; besides, after the second kind of configuration information is matched with the first kind of configuration information through verification, the login permission instruction sent by the server is obtained, and safety of the login process is improved.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a login method, a login system and a terminal. Background technique [0002] In related technologies, with the rapid popularization of smart mobile devices, the mobile Internet has been accepted and used by the public far faster than the traditional Internet, and a new era has begun. For enterprises, expanding to the mobile Internet will also have to face some operational problems. Enterprise mobile application servers are deployed in the internal network of the enterprise. The C / S architecture system needs to pass public network IP, domain name, VPN server, user name, Passwords and other methods are used for mobile client registration, login and access. At present, the client manually sets the service address to register and enters the user name and password to log in. Implementing the support staff brought a certain amount of trouble. [0003] In addition, the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCG06F21/36H04L63/08
Inventor 丛日学刘瑜王甲纲董雷张春杰
Owner YONYOU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products