Method and system for logging in client by using graphical identification code, and terminal

A graphic identification and client technology, applied in transmission systems, electrical components, etc., can solve problems such as complex processes

Active Publication Date: 2017-11-17
TENDYRON CORP
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the different manufacturers of the existing smart password devices, the pro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for logging in client by using graphical identification code, and terminal
  • Method and system for logging in client by using graphical identification code, and terminal
  • Method and system for logging in client by using graphical identification code, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] This embodiment provides a method for logging in to a client using a graphic identification code, such as figure 1 As shown, the login method includes steps S101-S107.

[0034] Step S101: the client of the terminal calls the interface of the graphic identification code acquisition function, and accesses the graphic identification code acquisition function through the interface of the graphic identification code acquisition function; the graphic identification code acquisition function calls the interface of the camera of the terminal, and obtains the smart password through the camera The graphic identification code provided by the device, and analyzing the graphic identification code to obtain graphic identification code information, and returning the graphic identification code information to the client, wherein the graphic identification code information includes at least the identification information of the smart password device;

[0035] In this embodiment, the ter...

Embodiment approach

[0056] Before the smart cryptographic device signs the received data to be signed, it is necessary to determine whether the user has the right to use the smart cryptographic device to prevent illegal elements from using the lost smart cryptographic device to log in if the smart cryptographic device is lost. In order to ensure that the user has the authority to use the smart cryptographic device, the following optional implementation is provided: the function input parameters also include: prompt information prompting the user to input the verification code; the signature data of the manufacturer's software obtains the first communication interface of the function call terminal , after the function input parameters are sent to the smart cryptographic device through the first communication interface, the method provided in this embodiment further includes: the smart cryptographic device receives the function input parameters, prompts the user to input a verification code, and veri...

Embodiment 2

[0065] This embodiment provides a terminal that uses a graphic identification code to log in to a client, such as figure 2As shown, the terminal 20 of this embodiment includes: a client 21, which is used to call the interface of the graphic identification code acquisition function module 210, and access the graphic identification code acquisition function module 210 through the interface of the graphic identification code acquisition function module 210, and obtain The graphic identification code acquisition function module 210 returns the graphic identification code information, and the graphic identification code information includes at least the identification information of the smart cryptographic device; it is also used to determine the interface of the vendor software 212 corresponding to the smart cryptographic device according to the identification information of the smart cryptographic device, and calls The interface of the vendor software 212 corresponding to the sma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for logging in a client by using a graphical identification code and a terminal, wherein the method comprises steps that: the client of a terminal acquire graphical identification code information and determines, according to the identification information of an intelligent password device, a manufacturer software interface corresponding to the intelligent password device; the client gets access to manufacturer software corresponding to the intelligent password device via the manufacturer software interface corresponding to the intelligent password device; the manufacturer software corresponding to the intelligent password device gets access to the certificate acquisition function of the manufacturer software and obtains a digital certificate for login or the identifier of the digital certificate for login, acquires a function input parameter and gets access to a signature data acquisition function of the manufacturer software to obtain signature data returned by the signature data acquisition function, wherein the function input parameter at least includes data to be signed; the client of the terminal sends, to a background server, the digital certificate for login or the identifier of the digital certificate for login, and the signature data; the background server completes the login after verifying the signature data.

Description

technical field [0001] The invention relates to the field of software login, in particular to a method, system and terminal for logging in a client by using a graphic identification code. Background technique [0002] With the development of smart terminals, it has become a popular trend for people to view, manage and consume personal assets using a banking client (eg, a mobile banking client of Bank of China) on a smart terminal (eg, a mobile phone). In order to ensure security, it is necessary to log in to the bank client terminal through a smart password device to ensure account security. However, due to the different manufacturers of existing smart password devices, the process of logging in to the bank client terminal through the smart password device is very complicated. In order to simplify the process of logging into the bank client, the present invention proposes a novel method of logging into the bank client. Contents of the invention [0003] The present inven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0823H04L63/083
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products