Unlock instant, AI-driven research and patent intelligence for your innovation.

Mutual exclusion method and device for multiple terminal devices with the same application

A terminal device and multi-terminal technology, applied in the field of communication, can solve the problem of difficult acquisition of terminal device identification, and achieve the effects of improving access efficiency and security, reducing session process, and reducing interaction burden.

Active Publication Date: 2020-11-27
湖州帷幄知识产权运营有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is difficult to obtain the terminal device ID of the terminal device. The terminal device is bound to the user and has strong coupling. The mutual exclusion of multiple terminal devices in the same application depends on the acquisition of the terminal device ID.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mutual exclusion method and device for multiple terminal devices with the same application
  • Mutual exclusion method and device for multiple terminal devices with the same application
  • Mutual exclusion method and device for multiple terminal devices with the same application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1 of the present invention provides a method for mutual exclusion of multiple terminals of the same application. Based on the OAuth2.0 protocol, users log in to the same application through different terminal devices to allocate different tokens (Token), and at the same time, ensure that the database only stores the same application corresponding to the user. The only effective token with a group identifier. When a user uses a certain terminal device to access the same application authority interface, the comparison of the aforementioned two tokens ensures that the user can only pass the token authentication through a certain terminal device at the same time. It solves the problem of realizing the mutual exclusion of multiple terminals of the same application without relying on the terminal device identification.

[0028] refer to figure 1 , which is a schematic flowchart of a method for mutual exclusion of multiple terminals with the same application provide...

Embodiment 2

[0042] The first embodiment described above describes how to pass token authentication when the user accesses the first application through the first terminal device. This embodiment describes how to realize the same application with multiple terminals when the user accesses the first application through the second terminal device at the same time. mutually exclusive.

[0043] refer to figure 2 , which is a schematic flowchart of a method for mutual exclusion of multiple terminals with the same application provided in Embodiment 2 of the present invention.

[0044] Step S2001: Receive a login request message for a user to log in to a first application through a second terminal device, where the login request message includes an identifier of the first application corresponding to the second terminal device, a user identifier and a password.

[0045] Step S2002: After the user ID and password pass the verification, distribute and issue a second token to the second terminal de...

Embodiment 3

[0055] Embodiment 3 of the present invention provides a method for mutual exclusion of multiple terminals with the same application. refer to image 3 , which is a schematic flowchart of a method for mutual exclusion of multiple terminals with the same application provided in Embodiment 3 of the present invention.

[0056] Step S3001: Receive an access message for a user to access a first application authority interface through a first terminal device, where the access message includes a first token and a user identifier.

[0057] Step S3002: According to the user ID, compare whether the first token in the access message is the same as the token stored in the database corresponding to the first application group ID corresponding to the user ID.

[0058] In the embodiment of the present invention, one and only one token stored in the database corresponding to the same application group identifier of the same user is valid. Usually, the latest token allocated to the user by th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the invention provide a method and a device for multi-terminal-equipment exclusion on the same application. The method includes the following steps: receiving an access message of a user accessing a first application permission interface through first terminal equipment, wherein the access message includes a first token and a user identifier; determining whether the first token in the access message is the same with the token of a first application group identifier corresponding to the user identifier stored in a database according to the user identifier; if the first token in the access message is the same with the token of the first application group identifier, sending an instruction allowing the user to access the first application permission interface through the first terminal equipment to the first terminal equipment; and if the first token in the access message is not the same with the token of the first application group identifier, sending a reminder message to the first terminal equipment to remind the user of a multi-terminal-equipment login conflict. By using the method provided by the embodiment of the invention, multi-terminal-equipment exclusion on the same application can be realized without relying on the identifiers of terminal equipment.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a mutual exclusion method and device for multiple terminal devices with the same application. Background technique [0002] With the rapid development of communication technology, various applications on terminal devices continue to enrich people's communication and life. People can use different terminal devices to access applications in different places. However, the same application requires simultaneous login operations on different terminal devices. For example, for applications involving sensitive information such as WeChat or Alipay, in order to avoid operation conflicts, it is required that different terminal devices cannot be logged in at the same time. If a user logs in on device A with a user ID and password, and at the same time logs in on device B with a user ID and password, the access of the user ID on device A is forcibly logged out. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L63/08H04L63/0815
Inventor 韩仁彬
Owner 湖州帷幄知识产权运营有限公司