Unlock instant, AI-driven research and patent intelligence for your innovation.

An information processing method, system, terminal and server

An information processing method and terminal technology, applied in the field of information processing, can solve the problems of password forgery or bill forgery, intrusion, and high account risk.

Active Publication Date: 2020-03-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above two methods have a certain time delay in the authorization login process, resulting in the risk of intrusion such as password forgery or bill forgery during the delay period, which makes the user's account more risky

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information processing method, system, terminal and server
  • An information processing method, system, terminal and server
  • An information processing method, system, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0120] An embodiment of the present invention provides an information processing method. figure 2 It is a schematic flow diagram of the information processing method in Embodiment 1 of the present invention; figure 2 As shown, the information processing method includes:

[0121] Step 201: the first terminal sends an account authorization request to the second terminal through the server, and receives a response of the second terminal's characterization confirmation; the account authorization request is used for the first terminal to request the second terminal account Authorize login.

[0122] In this embodiment, the first terminal acts as an account authorization applicant, and the second terminal acts as an account owner, and the same applies hereinafter. Here, the first terminal sends an account authorization request to the second terminal. Of course, the second terminal may also send information about whether to share an account to the first terminal, so that the first...

Embodiment 2

[0151] Based on the first embodiment, the embodiment of the present invention further provides an information processing method, and the information processing method is applied to a terminal. image 3 It is a schematic flow chart of the information processing method in Embodiment 2 of the present invention; as image 3 As shown, the method includes:

[0152] Step 301: The terminal sends an account authorization request, and after receiving a response representing confirmation, detects first action attribute information; the account authorization request is used to request authorized login of another terminal account; the first action attribute information represents the The state of the terminal changes.

[0153] In this embodiment, the terminal is equivalent to the first terminal in Embodiment 1, and the other terminal is equivalent to the second terminal in Embodiment 1; of course, in other implementation manners, the terminal may also be equivalent to The second terminal...

Embodiment 3

[0168] Based on the first embodiment, the embodiment of the present invention further provides an information processing method, and the information processing method is applied to a terminal. Figure 4 It is a schematic flow chart of the information processing method in Embodiment 3 of the present invention; as Figure 4 As shown, the method includes:

[0169] Step 401: the terminal receives an account authorization request, and sends a confirmation response; the account authorization request is used by another terminal to request authorized login of the terminal account.

[0170] In this embodiment, the terminal is equivalent to the second terminal in Embodiment 1, and the other terminal is equivalent to the first terminal in Embodiment 1; of course, in other implementation manners, the terminal may also be equivalent to The first terminal in the first embodiment and the other terminal are equivalent to the second terminal in the first embodiment.

[0171] Taking the termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose an information processing method and system, a terminal and a server. The method comprises the following steps: sending an account number authorization request by the terminal, and detecting first action attribute information after receiving response characterizing confirmation; the account number authorization request is used for requesting for the authorized login of an account number of another terminal; the first action attribute information is used for characterizing the state change of the terminal; detecting whether the first action attribute information satisfies a first preset condition, and when determining that the first action attribute information satisfies the first preset condition, obtaining a first time parameter of the first action attribute information; generating first information based on the first time parameter of the first action attribute information, and sending the first information; and after determining that the first information satisfies a second preset condition, logging in the account number by the terminal.

Description

technical field [0001] The present invention relates to information processing technology, in particular to an information processing method, system, terminal and server. Background technique [0002] In the existing network authorization login method, if user A wants to use the account of user B to log in, the following methods can be adopted: Method 1: User B informs user A of the account and password, and user A uses the account and password to log in. Authorized login of account B; method 2: User B first uses his own account and password to log in successfully, then generates an authorization ticket, which is equivalent to the account login entry of user B, and user B then sends the authorization ticket to User A, user A performs authorized login of user B's account through the authorization ticket. [0003] The above two methods have a certain time delay in the process of authorized login, which leads to the risk of intrusion such as password forgery or ticket forgery ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815
Inventor 任杰
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More