Login authentication method, terminal and server

A login authentication and server technology, applied in the computer field, can solve problems such as low operating efficiency, and achieve the effect of saving operating time and improving efficiency

Active Publication Date: 2016-01-27
TENCENT TECH (BEIJING) CO LTD
View PDF6 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a login authentication method, a terminal, and a server to at least solve the operational efficiency caused by the need to perform multiple login authentications for different applications when performing cross-application operations between different applications in the prior art lower technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication method, terminal and server
  • Login authentication method, terminal and server
  • Login authentication method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] According to an embodiment of the present invention, a login authentication method is provided, such as figure 1 As shown, the method includes:

[0028] S102. Receive an operation request for requesting to operate on the interface of the second application displayed on the interface of the first application logged in with the first application account;

[0029] S104. Send a login authentication request to a server corresponding to the second application, where the login authentication request includes at least the identifier of the first application and the first application account;

[0030] S106, if the login authentication information of the second application sent by the server in response to the login authentication request is received, perform operations on the interface of the second application displayed on the interface of the first application.

[0031] Optionally, in this embodiment, the above-mentioned login authentication method can be applied to an authen...

Embodiment 2

[0062] According to an embodiment of the present invention, a login authentication method is also provided, such as Figure 7 As shown, the method includes:

[0063] S702. Receive a login authentication request sent by a terminal running the second application, where the login authentication request includes at least the identifier of the first application and the first application account, where the first application logged in with the first application account on the terminal The interface of the second application is displayed in the interface;

[0064] S704, in response to the login authentication request, search for a second application account for logging in the second application corresponding to the first application identifier and the first application account in the login authentication request;

[0065] S706. If the second application account is found, generate login authentication information of the second application according to the second application account; ...

Embodiment 3

[0101] According to an embodiment of the present invention, a terminal for implementing the above login authentication method is also provided, such as Figure 10 As shown, the terminal includes:

[0102] 1) a receiving unit 1002, configured to receive an operation request for requesting to operate on the interface of the second application displayed on the interface of the first application logged in with the first application account;

[0103] 2) The first sending unit 1004 is configured to send a login authentication request to a server corresponding to the second application, wherein the login authentication request includes at least the identifier of the first application and the first application account;

[0104] 3) The operation unit 1006 is configured to operate on the interface of the second application displayed on the interface of the first application when receiving the login authentication information of the second application sent by the server in response to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login authentication method, a terminal and a server. The method comprises receiving an operation request for requesting to perform operation on an interface of a second application displayed on an interface of a first application in which a first application account logs, sending a login authentication request, which at least comprises an identifier of the first application and the first application account, to the server corresponding to the second application, and performing operation on the interface of the second application displayed on the interface of the first application if login authentication information, which is sent by the server and responds to the login authentication request at the same time, is received. The problem of low operation efficiency resulted from the fact that login authentication needs to be performed for different applications multiple times when cross-application operation is performed between the different applications in the prior art is solved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a login authentication method, a terminal and a server. Background technique [0002] At present, Internet products are increasingly abundant, and different network products have their own login systems. Even for different products of the same company, their login status is not necessarily interoperable, but requires separate login authentication. Assuming that application A and application B are taken as examples, if the user logs in to application A, he needs to directly perform operations on application B on the page of application A, such as commenting. Currently, the commonly used technical solution will suspend the client of application A, and then enter the login page of application B. After successfully logging in to application B, the corresponding content can be commented on the page of application B. For example, taking Weibo and WeChat as examples, when the user visits the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 周文硕李佳
Owner TENCENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products