Login method without password based on third party authentication, device and system thereof

A login method and password-free technology, applied to devices and systems, in the field of password-less login methods based on third-party authentication, can solve problems such as cumbersome login methods

Active Publication Date: 2017-05-31
北京花晗科技有限公司
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a passwordless login method, device and system based on third-party auth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login method without password based on third party authentication, device and system thereof
  • Login method without password based on third party authentication, device and system thereof
  • Login method without password based on third party authentication, device and system thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0040] figure 1 The flow chart of the passwordless login method based on third-party authentication provided in the first embodiment of the present application. The login method implements the process of user login application system using a passwordless login method, wherein the third-party authentication server implements For the security authentication of users and application systems, each user uniquely corresponds to a user number and user key, and each application system uniquely corresponds to an application system number and application system password, and the user number and user key are judged by a third-party authentication server The credential for whether the user is safe, the application system number and the application system key are the credential for the third-party authentication server to judge whether the application system is safe.

[0041] In this embodiment, a third-party authentication server is used as an execution subject to describe a passwordless ...

no. 2 example

[0065] figure 2 The flow chart of the passwordless login method based on third-party authentication provided by the second embodiment of the present application is a preferred embodiment based on the first embodiment above, and relevant descriptions may refer to each other. Specifically, the method includes the following steps S202 to S212.

[0066] Step S202: Receive the login request forwarded by the application system.

[0067] Wherein, the login request is the content sent by the application system to the third-party authentication server when the login module receives the user number. Specifically, the application system sets up a login module. The login module is also provided with a user number receiving box and a user name and password receiving box. The security authentication process through the user name and password is used for security authentication, so that the embodiment of this application is compatible with the password login method in the prior art; when ...

no. 3 example

[0079] image 3 The flow chart of the third-party authentication-based passwordless login method provided by the third embodiment of the present application is a preferred embodiment based on the above-mentioned first embodiment, and relevant descriptions may refer to each other. Specifically, the method includes the following steps S302 to S306.

[0080] Step S302: Receive the login request and login confirmation information sent by the client.

[0081] In this embodiment, the client is provided with a scanning tool for scanning the image to obtain the application system number and the application system key, for example, a two-dimensional code scanning tool, which generates the two-dimensional code information for the application system number and the application system key, and scans the After the tool scans the QR code, the application system number and application system key can be obtained. The client is used to display the receiving control for receiving the confirmat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login method without password based on third party authentication, a device and a system thereof. The system comprises a client, an application system, and a third-party authentication server. The client sends a login confirmation message to the third-party authentication server. The third-party authentication server, after receiving a login request of user login application system sent by the client or the application system and the login confirmation message, executes the security authentication for users according to the user number that the login request carries and the user key that the login confirmation message carries, and executes the security authentication for the application system according to the system number that the login request carries and the application system key. After the safety authentications for the user and application system are passed, the third-party authentication server sends a login confirmation order. The application system confirms the user corresponded to the user number and calls the login process to complete the user login after receiving the login confirmation order. By the login method without password based on third party authentication, the device and the system thereof, users login to any system without entering password and verification code.

Description

technical field [0001] The present invention relates to the technical field of passwordless login, in particular to a passwordless login method, device and system based on third-party authentication. Background technique [0002] At present, almost all application systems must use passwords to log in. For users, this is a cumbersome and troublesome thing, especially when users use multiple application systems. Different passwords are set on the system, which not only requires multiple logins, but also requires the user to memorize multiple passwords. And in order to further increase the strength of the password, the user is required to increase the complexity of the password, so that the user forgets the password more and more. When the user forgets the password, it is necessary to retrieve the password through a cumbersome process. Therefore, the convenience and experience of logging in to the application system through the password login method are relatively poor for the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/321H04L9/3226H04L63/0815H04L63/0876
Inventor 常卫华
Owner 北京花晗科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products