Third party login authentication method and system, proxy server and client

A proxy server, login authentication technology, applied in the field of proxy server, client and system, third-party login authentication method, can solve problems such as inconvenience of website or APP, and achieve the effect of improving efficiency

Active Publication Date: 2017-02-22
MAIPU COMM TECH CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the traditional third-party authentication login, in order to support third-party authentication login, the website or APP needs to apply for an authentication account and key from the third-party authentication login platform in advance, which brings great inconvenience to the provider of the website or APP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third party login authentication method and system, proxy server and client
  • Third party login authentication method and system, proxy server and client
  • Third party login authentication method and system, proxy server and client

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0024] Please see figure 2 , figure 2 It is a flowchart of a third-party login authentication method provided by an embodiment of the present invention, and the method is applied to a proxy server. The methods include:

[0025] Step S110: Receive the request initiated by the client to obtain the authentication address of the third-party platform.

[0026] Wherein, after the client responds to the third-party login authentication event, it sends a request to the proxy server to obtain the authentication address of the third-party platform. The third-party login authentication event may be an event triggered when the user of the client needs to use a third-party login method (such as QQ, Weibo, WeChat, etc.) to log in to the application on the client in the process of using the client. The request is triggered by the user of the client, or the client may be triggered when the installation is completed. It can be understood that the request carries identification informatio...

no. 2 example

[0037] Please see image 3 , image 3 It is a flowchart of a third-party login authentication method provided by an embodiment of the present invention, and the method is applied to a proxy server. The methods include:

[0038] Step S210: Receive the request initiated by the client to obtain the authentication address of the third-party platform.

[0039] Step S211: Analyzing the request for obtaining the authentication address of the third-party platform, obtaining the target application identification information of the client, searching for the target application identification information of the client in the pre-stored registered application identification information, if the search is successful, Then perform the search for the docking authentication information corresponding to the third-party platform obtained through pre-registration.

[0040] The proxy server may respond to the registration request of the client, and save the target application identification info...

no. 3 example

[0047] Please see Figure 4 , Figure 4 It is a flowchart of a third-party login authentication method provided by an embodiment of the present invention, and the method is applied to a client. The methods include:

[0048] Step S310: Initiate a request to the proxy server to obtain the authentication address of the third-party platform.

[0049] Certainly, after responding to the third-party login authentication event, the client may initiate an access request based on the third-party platform authentication to the target application server in advance, and receive the proxy server address returned by the target application server.

[0050] Based on the returned proxy server address, the client initiates a request to the proxy server to obtain the authentication address of the third-party platform.

[0051] In this embodiment, the third-party login authentication event may be triggered by the client terminal when the user selects third-party login authentication using the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a third party login authentication method and system, a proxy server and a client and belongs to the field of data communication. The method comprises the steps that the proxy server receives a request which is initiated by the client and is used for obtaining a third party platform authentication address; docking authentication information which is obtained through pre-login and corresponds to the third party platform authentication address is searched; the docking authentication information, the third party platform authentication address and a proxy server address are sent to the client; authentication result information generated after a login authentication request sent by the client is responded to is received, wherein the login authentication request carries the docking authentication information, the proxy server address and the target application identification information of the client, and an authentication result carries the target application identification information of the client; and the authentication result is sent to the client based on the target application identification information of the client. According to the method, the third party login authentication efficiency can be improved.

Description

technical field [0001] The invention relates to the field of data communication, in particular to a third-party login authentication method, proxy server, client and system. Background technique [0002] Third-party authentication login is a popular login method for major websites and mobile applications such as various APPs in the existing market. You must re-register on the new website or APP before you can log in and perform subsequent operations. However, in the traditional third-party authentication login, in order to support the third-party authentication login, the website or APP needs to apply for an authentication account and key from the third-party authentication login platform in advance, which brings great inconvenience to the provider of the website or APP. Contents of the invention [0003] In view of this, the purpose of the embodiments of the present invention is to provide a third-party login authentication method, proxy server, client and system, so as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0807H04L63/0884H04L67/56
Inventor 邓海红张洪
Owner MAIPU COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products