Login credentials verifying method and apparatus

A verification method and login credential technology, applied in the computer field, can solve problems such as session information sharing, user access callback address errors, etc., to achieve the effect of ensuring information security, ensuring information security, and avoiding cross-device login

Inactive Publication Date: 2017-05-31
GUANGZHOU HUADUO NETWORK TECH
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If there are multiple subdomains, the following situation may occur: www.a.com is used in the login process, and www.i.a.com is used in the callback address. Since the session information cannot be shared between the two subdomains, the user accesses Error in callback address

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login credentials verifying method and apparatus
  • Login credentials verifying method and apparatus
  • Login credentials verifying method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present invention.

[0053] In some processes described in the specification and claims of the present invention and the above drawings, multiple operations appearing in a specific order are included, but it should be clearly understood that these operations may not be in the order in which they appear in this document. Execution or parallel execution, the operation sequence numbers such as 101, 102, etc., are only used to distinguish different operations, and the sequence numbers themselves do not represent any execution order. In addition, these processes may include more or fewer operations, and these operations may be executed sequentially or in parallel. It should be noted that the descr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login credentials verifying method and apparatus. The verifying method comprises the following steps: in response to a login request transmitted by a first client for logging in a local server by virtue of first credentials information, parsing the login request to acquire an encryption data packet of the first credentials information obtained when the first client successfully logs in a first server; parsing the encryption data packet to acquire the first credentials information, wherein the first credentials information comprises user identifier information, user identification information, first client device information and first permission information generated by the first server; and transmitting the first credentials information to the first server so as to verify a legal connection between the first client and the local server established when the first credentials information is legal at the first server. In addition, the invention also provides a login credentials verifying apparatus. By adopting the login credentials verifying method and apparatus, the automatic login of the client in a preset period of time can be realized, and the login security of the client is also ensured.

Description

Technical field [0001] The present invention relates to the field of computer technology, and more specifically, to a method and device for verifying login credentials. Background technique [0002] OAuth (Open Authorization) protocol provides a safe, open and simple standard for user resource authorization. On the one hand, OAuth is secure. The difference from previous authorization methods is that OAuth authorization does not allow third parties to touch the user’s account information (such as user name and password), that is, the third party does not need to use the user’s user name and The password can apply for authorization of the user's resources, and at the same time allow the user to allow third-party applications to access the user's private resources stored on a website, such as photos, videos, contact lists, etc.; on the other hand, OAuth is also open , Any third party can use OAuth authentication service, and any service provider can implement its own OAuth authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06
Inventor 朱朝卓
Owner GUANGZHOU HUADUO NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products