Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network application login method and system

A network application and application server technology, applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve the problems of complexity and waste of resources, and achieve the effect of simplifying the login process and improving user experience

Active Publication Date: 2017-08-18
TENDYRON CORP
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the passwords of each application may be different, users need to remember the corresponding passwords of each application, and need to enter the corresponding password every time they log in to the application, which makes the process of logging in to the application more complicated, especially when logging into intranet applications. When using the same application login method as the external network to log in to the application, there is a large waste of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network application login method and system
  • Network application login method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] This embodiment provides a method for logging in a network application. In the process of the method, the smart key device is an identification device with an electronic signature function, which may be an electronic device such as a USB KEY or an audio KEY that can perform information interaction with the terminal; the terminal It can be a PC, mobile phone, tablet computer and other devices with network connection functions; the application server can be a network application server such as a mailbox server and an OA system server; the application server and the router are in the same intranet system, and the terminal can log in to the application through the router Intranet application of the server.

[0022] figure 1 A flow chart of a network application login method provided in this embodiment, such as figure 1 The shown method embodiment includes the following steps 101-105:

[0023] Step 101, after the smart key device establishes a connection with the terminal,...

Embodiment approach 2

[0048] Optional implementation mode 2. The difference between this optional implementation mode and optional implementation mode 1 is that the verification device in step 101 is an identity authentication server. The following only describes the differences from optional implementation mode 1:

[0049] In this step, the terminal triggers the verification device to execute the PIN code verification process of the smart key device, which specifically includes:

[0050] Step 121a, the terminal prompts the PIN code input prompt information, receives the PIN code and generates PIN code verification information, and sends the PIN code verification information to the identity authentication server;

[0051] In step 121b, the identity authentication server receives and verifies the PIN code verification information, and generates PIN code verification passing information if the verification is passed, and sends it to the smart key device through the router and the terminal.

[0052] O...

Embodiment approach 3

[0056] Optional implementation mode 3. The difference between this optional implementation mode and optional implementation mode 1 is that in step 101, the device that prompts for PIN code input and the verification device are both smart key devices. The differences are explained:

[0057] Step 131a, the terminal sends the PIN code input prompt information to the smart key device;

[0058] In step 131b, the smart key device receives and prompts the PIN code input prompt information, receives the PIN code and verifies it, and generates PIN code verification pass information if the verification is passed.

[0059] Optionally, after the smart key device generates the information that the PIN code has been verified, the information is set to a valid state.

[0060] In the solution provided by this optional implementation mode, the devices receiving the PIN code and verifying the PIN code are all smart key devices, and the PIN code does not need to be transmitted between devices, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network application login method and system. The method comprises the steps that: intelligent key equipment establishes connection with a terminal; the terminal triggers verification equipment to execute a PIN code verification process; if verification is passed, the intelligent key equipment obtains and stores PIN code verification passing information, and executes an identity authentication process with a router; when an identity authentication process result is that authentication is passed, the router distributes an IP address to the terminal, and stores binding information; the terminal sends application login service request information to an application server; and the application server obtains the determined identity information of the intelligent key equipment, and provides an application login service according to the determined identity information of the intelligent key equipment under the condition that the PIN code verification completion confirmation information is obtained. The method further comprises the steps that: the application server sends a PIN code verification state query request; the intelligent key equipment queries whether the PIN code verification passing information is stored and the state; and if the PIN code verification passing information is stored and the state is effective, the PIN code verification completion confirmation information is sent to the application server.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a network application login method and system. Background technique [0002] A router is a device connected to a local area network and a wide area network in the Internet. It will automatically select and set routes and transmit signals according to channel conditions. When users use terminal devices (computers, mobile phones, etc.) to access the Internet, they can connect to the application server through a router. In order to ensure the security of application data, the user's terminal device usually needs to enter the password corresponding to the application when logging in to the application server. For example, when the user uses a computer to log in to the mailbox, the user needs to enter the password of the mailbox. Since the passwords of each application may be different, users need to remember the corresponding passwords of each application, and need to enter the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3234H04L9/3247H04L9/3263H04L9/3273H04L63/0815H04L63/0823H04L63/0853H04L63/0869H04L63/0876
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products