Method and system for logging in by borrowing accounts of other people

An account and account authentication technology, applied in the Internet field

Inactive Publication Date: 2016-05-25
BEIJING QIHOO TECH CO LTD +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, various applications usually have a website terminal and a mobile terminal, and the accounts of the two are the same, that is, when logging in to the website terminal and the APP on the mobile terminal, the accounts and passwords of the two are the same, and the account number needs to be provided when logging in to the APP on the mobile terminal and password, account and password are the credentials to verify whether the user's identity is legal; and by setting up accounts with different services or permissions, differentiated services and management capabilities can be provided. For example, video providers use paid member accounts as VIP accounts, The VIP account has the right to watch all the videos, while the account of unpaid members is regarded as an ordinary account, which is restricted to watch some videos of average quality or outdated. How to realize the sharing and management of accounts between accounts is a problem faced by the industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for logging in by borrowing accounts of other people
  • Method and system for logging in by borrowing accounts of other people
  • Method and system for logging in by borrowing accounts of other people

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0072] refer to figure 1 , which is a flowchart of an account borrowing management method according to an embodiment of the present invention. The account borrowing management method in this embodiment mainly includes the following steps:

[0073] Step S101, receiving the first account authentication cache file sent by the first APP on each borrowed party's mobile terminal, the first account authentication cache file of each borrow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for logging in by borrowing accounts of other people. The method comprises following steps of receiving the first account authentication cache file sent by the first APP on the mobile terminal of each borrowed party; carrying out prior recommendation sequence ranking to the first account authentication cache file of each borrowed party; preferentially obtaining the first account authentication cache files of the borrowed parties with higher ranks according to the account borrowing requests of borrowing parties; sending the obtained first account authentication cache files to the first APPs on the mobile terminals of the borrowing parties, wherein the borrowing parties store the first account authentication cache files in the appointed locations through the first APPs on the mobile terminals; the second APPs on the mobile terminals of the borrowing parties log in through the first account authentication cache information contained in the first account authentication cache files, thus realizing the login by other people through using the accounts of the borrowed parties without providing accounts and passwords by the borrowed parties.

Description

technical field [0001] The present invention relates to the field of Internet technology, and more specifically, relates to a method and system for logging in by borrowing another person's account. Background technique [0002] At present, various applications usually have a website terminal and a mobile terminal, and the accounts of the two are the same, that is, when logging in to the website terminal and the APP on the mobile terminal, the accounts and passwords of the two are the same, and the account number needs to be provided when logging in to the APP on the mobile terminal and password, account and password are the credentials to verify whether the user's identity is legal; and by setting up accounts with different services or permissions, differentiated services and management capabilities can be provided. For example, video providers use paid member accounts as VIP accounts, The VIP account has the right to watch all the videos, while the account of unpaid members...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L67/568
Inventor 陈耀攀
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products