Login protocol operating method for inter-application user information transfer

A technology of user information and operating methods, applied in the field of communication, can solve problems such as limited scope of application, non-standard login authorization/association binding methods, inconsistent communication and authorization protocols, etc., to achieve a wide range of applications, compatibility and upgradeability Strong, wide-ranging effects

Inactive Publication Date: 2017-01-04
林友哲
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is no standardized login authorization/association binding method between websites, APPs, smart devices, etc., and open and peer-to-peer mutual login authorization/association binding and user information transmission cannot be realized
The main problem is that

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login protocol operating method for inter-application user information transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below in conjunction with the accompanying drawings and through specific embodiments. The following embodiments are only descriptive, not restrictive, and cannot limit the protection scope of the present invention.

[0032] A login protocol operation method for cross-application user information transmission, including systems or devices (hereinafter collectively referred to as applications), users and their usernames, Email, Uid (user identity certificate), etc. can be used as the identification of user login (hereinafter collectively referred to as user name), and the specific steps are as follows:

[0033] ⑴ Standardized and unified cross-application login username structure, username@@the access address of the application where the username is located (hereinafter referred to as the protocol specification username), such as username@@domain.com, where username is the username, @@ is a separation symbol used t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a login protocol operating method for inter-application user information transfer. The method includes the following steps that: unified user name structures in inter-application login are standardized; unified paths are standardized; unified character string formats are standardized; and when login authorization and user information transfer of one user are to occur, the user inputs a user name which accords with protocol specifications at an authorized website, and the corresponding login system of the A website resolves the user name and initiates a link request for an authorization website to obtain authorized login/association binding. According to the login protocol operating method of the invention, communication and authorization protocols are standardized, and cross-authorization and login of users can be realized under a condition that main bodies do not need to complete connection with each other in advance.

Description

technical field [0001] The invention belongs to the technical field of communication, in particular to a login protocol operating method system for cross-application user information transmission. Background technique [0002] Most of the user login / association operating protocols between different websites, APPs, smart devices and other user systems or devices are open platform authorized login services provided by the open platforms of major websites / manufacturers, such as QQ login, portal website Sign-in, etc., the obvious disadvantage is that only the platform provider can perform user login authorization / association binding and transfer of user information to the access party. There is no standardized login authorization / association binding method among websites, APPs, smart devices, etc., and open and peer-to-peer mutual login authorization / association binding and user information transmission cannot be realized. The main problem is that the communication and authoriz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 林友哲
Owner 林友哲
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products