One-key login method and system, related devices and computer readable storage medium

A login method and login request technology, applied in the field of communication, can solve the problems of low security, information forgery in SIM cards, etc.

Active Publication Date: 2018-04-20
MIGU CO LTD +1
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, because the SIM card does not necessarily contain number information, and the information in the SIM card may be forged; therefore, only relying on the SIM card to identify and confirm the user to log in to the application, the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-key login method and system, related devices and computer readable storage medium
  • One-key login method and system, related devices and computer readable storage medium
  • One-key login method and system, related devices and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] From the description of the background art, it can be seen that in the related art, when performing one-key login, if only relying on the SIM card to identify and confirm the user to log in to the application, there is a problem of low security.

[0064] For example, when there is only the SIM card's own information in the SIM card but no number information, it is impossible to confirm the user by comparing the number information at this time; for another example, if the user's SIM card is lost, the IMSI in the newly copied SIM card will The code must be different from the previous IMSI code. If the newly copied SIM card is used to directly log in to the application, the user will be prohibited from logging in because the IMSI code information cannot be matched successfully.

[0065] Therefore, if only relying on the SIM card to identify and confirm the user, there will be a problem of low security of one-key login.

[0066] Based on this, in the embodiment of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a one-key login method. The method comprises the following steps: if a one-key login operation is detected, calling, by a client, an SDK interface to send first verification information to a gateway server in the form of a short message; calling the SDK interface to send a login request message to an SDK server, wherein the login request message carries second verificationinformation; obtaining, by the gateway server, the identifier of the user who sends the short message, and sending the first verification information and the user identifier to the SDK server; comparing, by the SDK server, the first verification information and the second verification information; if the comparison is successful, sending a generated authentication success message to the client, wherein the authentication success message comprises the user identifier, and the authentication success message is used for characterizing that the client can use the user identifier as a login account; and performing, by the client, user login according to the authentication success message. The invention further discloses a one-key login system, a client, a gateway server and a computer readablestorage medium.

Description

technical field [0001] The present invention relates to the technical field of communications, and in particular to a one-key login system and method, and a computer-readable storage medium. Background technique [0002] With the development of Internet technology, user security authentication in various applications has become a major concern. At present, users mainly log in to the application through the authentication method of account number and password; however, this authentication method is relatively complicated, which makes the user's operation more cumbersome when authenticating and logging in, and the one-key login authentication method is widely used because of its simple operation . [0003] In related technologies, the one-key login solution mainly includes: obtaining an IMSI code and a first number from a Subscriber Identification Module (SIM) of a mobile terminal; sending the IMSI code to a server, and receiving the first number fed back by the server; Two ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/0884
Inventor 赵家成周效军李琳周冰
Owner MIGU CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products