Method and system for logging in by borrowing accounts of other people

An account and account authentication technology, applied in the Internet field

Inactive Publication Date: 2016-05-25
BEIJING QIHOO TECH CO LTD +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, various applications usually have a website terminal and a mobile terminal, and the accounts of the two are the same, that is, when logging in to the website and the APP on the mobile terminal, the account and password of the two are the same, and the account number needs to be provided when logging in to the APP on the mobile terminal and password, account and password are the credentials to verify whether the user's identity is legal; and by setting up accounts with different services or permissions, differentiated services and management capabilities can be provided. For example, video providers use paid member accounts as VIP accounts, The VIP account has the right to watch all the videos, while the account of unpaid members is regarded as an ordinary account, which is restricted to watch some videos of average quality or outdated. How to realize the sharing and management of accounts between accounts is a problem faced by the industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for logging in by borrowing accounts of other people
  • Method and system for logging in by borrowing accounts of other people
  • Method and system for logging in by borrowing accounts of other people

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0067] refer to figure 1 , which is a flowchart of an account borrowing management method according to an embodiment of the present invention. The method for logging in by borrowing another person's account in this embodiment mainly includes the following steps:

[0068] Step S101, according to the account borrowing request of the borrower, the first APP on the mobile terminal of the borrower acquires the first account authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for logging in by borrowing accounts of other people. The method comprises that first APPs on the mobile terminals of borrowing parties receive first account authentication cache files according to the account borrowing requests of the borrowing parties; the first account authentication cache files comprise first account authentication cache information demanded for logging in second APPs by the borrowed parties on the mobile terminals of the borrowed parties; the obtained first account authentication cache files of the borrowed parties are stored at the appointed locations on the mobile terminals of the borrowing parties through the first APPs on the mobile terminals of the borrowing parties; according to the first account authentication cache files stored at the appointed locations on the mobile terminals of the borrowing parties, the second APPs on the mobile terminals of the borrowing parties log in the servers of the second APPs through the first account authentication cache information contained in the first account authentication cache files, therefore the appointed applications are logged in by other people through the accounts of the borrowed parties without providing accounts and passwords of appointed applications by the borrowed parties.

Description

technical field [0001] The present invention relates to the field of Internet technology, and more specifically, relates to a method and system for logging in by borrowing another person's account. Background technique [0002] At present, various applications usually have a website terminal and a mobile terminal, and the accounts of the two are the same, that is, when logging in to the website and the APP on the mobile terminal, the account and password of the two are the same, and the account number needs to be provided when logging in to the APP on the mobile terminal and password, account and password are the credentials to verify whether the user's identity is legal; and by setting up accounts with different services or permissions, differentiated services and management capabilities can be provided. For example, video providers use paid member accounts as VIP accounts, The VIP account has the right to watch all the videos, while the account of unpaid members is regarde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L67/568
Inventor 陈虞付
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products