Login authorization method and device, login method and device

A technology for login credentials and login requests, applied in the field of computer security, can solve problems such as low security, and achieve the effects of improving security, taking into account security, and ensuring convenience.

Inactive Publication Date: 2017-05-10
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a login authorization method and device, a login method and a device for the problem of low security caused by saving user accounts and user passwords in current browsers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authorization method and device, login method and device
  • Login authorization method and device, login method and device
  • Login authorization method and device, login method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] figure 1 It is an application environment diagram of a login authorization method and a login method in an embodiment. refer to figure 2 , the login authorization method and login method are applied to a login system, and the login system includes a terminal 110 , a mobile terminal 120 , an electronic device 130 and a server 140 . The terminal 110, the mobile terminal 120 and the electronic device 130 can all be connected to the server 140 through a network. The terminal 110 may be a personal computer or another mobile terminal distinct from the mobile terminal 120 . Terminal 110 and mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a login authorization method and device, a login method and device. The login authorization method comprises the following steps: receiving a login request sent by a terminal; extracting a login credential and a terminal identifier from the login request, wherein the extracted login credential is generated and issued to the terminal when the terminal finishes the previous login authorization; querying the login credential, which is generated and stored when finishing the previous login authorization, corresponding to the terminal identifier; when the extracted login credential is consistent with the queried login credential, performing the login authorization corresponding to the terminal identifier; updating the stored login credential corresponding to the terminal identifier; and issuing the updated login credential to the terminal. By use of the login authorization method and device, the login method and device provided by the invention, a user can rapidly and safely login.

Description

technical field [0001] The present invention relates to the technical field of computer security, in particular to the technical field of login, in particular to a login authorization method and device, and a login method and device. Background technique [0002] Login is an important means to verify the user's identity. After the user sends a login request to the server, the server will verify the user's identity, so that the user can obtain the authority to perform operations with the verified identity. Currently, a common login method is a method of logging in by inputting a user account number and a user password. [0003] In order to prevent users from frequently inputting user account numbers and user passwords and improve operation convenience, the browser provides the function of automatically saving user account numbers and user passwords. After the user enters the login interface, the browser can automatically enter the user account and user password, thereby real...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815
Inventor 王宇许鑫城王虎王晖孙丰静孙善鹏
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products