How to verify login authority

A permission and login information technology, applied in the field of login permission verification, can solve problems such as delay, user login impact, login failure, etc., and achieve the effect of convenient use and safe verification

Active Publication Date: 2019-05-31
北京博瑞彤芸科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above process, limited by SMS triggering, immediacy and correctness of the verification code, etc., it may affect the user's login, and there may be cases where the user fills in the wrong verification code or fails to receive the verification code, resulting in login failure or delay
[0005] Moreover, when the user changes the mobile phone number, it is equivalent to using another user account, and the user data corresponding to the two mobile phone numbers cannot be integrated, resulting in no continuity of data, which brings great inconvenience to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • How to verify login authority
  • How to verify login authority
  • How to verify login authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0041] The login authority verification method provided in this embodiment is mainly applied to a user terminal that can be inserted into a Subscriber Identification Module (Subscriber Identification Module, SIM) card, and is used for application login authority verification.

[0042] figure 1 The flow chart of the method for verifying the login authority provided by the embodiment of the present invention, such as figure 1 shown, including:

[0043] Step 101, obtaining the phone number information of the SIM card currently inserted in the user terminal;

[0044] Wherein, the phone number information may include information such as a service provider of the SIM card, a phone number, and the like.

[0045] In a more preferred solution, the user information of the user terminal can also be acquired at the same time. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to a login authority verifying method, and the method comprises the steps: obtaining the telephone number information of a currently inserted SIM (subscriber identity module) card in a user terminal; generating an initialized login interface according to the telephone number information; obtaining a login information submitting instruction inputted by a user; generating a preset number obtaining command according to the login information submitting instruction; obtaining the preset number information stored in a database of the user terminal according to the preset number obtaining command; determining whether the preset number information is the same as the telephone number information or not; updating the preset number information stored in the database according to the telephone number information when the preset number information is not the same as the telephone number information; determining whether the updated preset number information is the same as the telephone number information or not again; generating login information according to the telephone number information, the IMEI of a user terminal and the user information of the user terminal when the updated preset number information is the same as the telephone number information, transmitting the login information to a server, and carrying out the login of a user; and enabling the server to update the cellphone number field stored in user account information according to the login information.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for verifying login authority. Background technique [0002] During the login process of existing applications, the user's mobile phone number or user's login name is usually used for login verification. [0003] In the case of using the user's mobile phone number for login verification, the user needs to fill in the mobile phone number to log in, and then trigger the verification code to log in. After receiving the verification code request message sent by the system, the user finds the verification code in the message, fills it in and then performs login verification . [0004] In the above process, limited by SMS triggering, immediacy and correctness of the verification code, etc., it may affect the user's login, and there may be cases of login failure or delay due to the user filling in the wrong verification code or failing to receive the verification code. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W8/20H04W8/22
CPCH04L63/08H04W8/20H04W8/22
Inventor 王开源张鹏汪秀兵
Owner 北京博瑞彤芸科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products