Method and system for controlling access of mobile terminal to third party server

A mobile terminal and access control technology, applied in the Internet field, can solve problems such as cumbersome operations, achieve the effects of simplifying operation procedures, improving access efficiency, and avoiding the risk of leaks

Active Publication Date: 2015-02-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 59 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present invention is to provide a mobile terminal access control method for third-party resources, so as to solve the problem that existing mobile terminal users need to input different account information for verification when accessing different websites, and the operation is cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling access of mobile terminal to third party server
  • Method and system for controlling access of mobile terminal to third party server
  • Method and system for controlling access of mobile terminal to third party server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In the following description, specific details such as specific system structures, interfaces, and technologies are presented for illustration rather than limitation, so as to provide a thorough understanding of the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0041] figure 1 A network architecture of a system for controlling access of mobile terminals to third-party resources provided by an embodiment of the present invention is shown. For ease of description, only parts related to the embodiment of the present invention are shown. Wherein, the system includes a mobile terminal 1 , a first-party server 2 and a third-party server 3 .

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure includes an exemplary method for controlling access to a third-party server by a mobile terminal. The method comprises : acquiring, at the mobile terminal from a first-party server, login authorization information using which a user of the mobile terminal has logged in the first-party server through a client-side application corresponding to the first-party server, wherein the login authorization information includes a logged-in account; transmitting, to the third-party server, a login request,wherein the login request includes the login authorization information that is to be verified; and receiving authorization for the user to log in the third-party server using the logged-in account included in the verified login authorization information.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to a method and system for controlling the access of a mobile terminal to a third-party server. Background technique [0002] In the prior art, when a mobile terminal user logs in to a certain website, it usually needs to register a login account on the website and set a corresponding login password. The user's account registered on website A can only log in to website A, and cannot log in to website B. With the increasing number of various Internet sites, users have increasingly strong demands for using multiple website applications and obtaining a lot of different information. However, in the existing independent website login method, the user can only log in and obtain application information of multiple different websites by inputting different account information multiple times for verification, and the operation is cumbersome. Moreover, the account informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L29/06H04L63/0815H04L63/10H04W12/06H04L67/02H04W12/062G06F21/41H04L63/083H04L63/0884
Inventor 任旻宗华刘楠唐彭壮刘硕裴
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products