Third party authorized login method and system

A login method and authorized technology, applied in the Internet field, can solve the problems of cumbersome operation process and reduce user experience, and achieve the effect of simplifying operation process and improving experience

Inactive Publication Date: 2018-10-09
ADVANCED NEW TECH CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing third-party authorized login method, for the user, the operation process is relatively cumbersome, which reduces the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third party authorized login method and system
  • Third party authorized login method and system
  • Third party authorized login method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Because users often visit websites on PCs to check and download data, generally PCs are used as a tool for users’ daily office work, especially as public PCs, third-party account numbers and passwords are sensitive information of users themselves, and they will not be used on PCs for a long time. The third-party account is online, where the third-party account can be an Alipay account, QQ account, WeChat account, Weibo account, etc., and only when necessary will you log in to your own third-party account. Therefore, when a user needs to log in to access an authorized website, select a third-party account to log in, he needs to jump to the third-party website to log in with his third-party account and password to authorize, and then jump back to the authorized website. The authorized site shows that the user is logged in. For users, the operation process is cumbersome, which reduces the user experience.

[0029] In view of the above problems, the embodiments of this spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a third party authorized login method. The method comprises the following steps: when an authorized website detects that a login operation of a third party account of a user istriggered, the authorized website generates a two-dimensional code corresponding to the third party account; the authorized website displays the two-dimensional code to the user; when a third party client monitors that a two-dimensional code scanning operation of the user is triggered, the third party client identifies the two-dimensional code and prompts the user for authorization or not; when the third party client monitors that an authorization confirmation operation of the user is triggered, a third party server performs third party authorization authentication with the authorized website; and after the third party authorization authentication between the third party server and the authorized website is passed, the third party authorized login of the authorized website is successful.

Description

technical field [0001] The embodiments of this specification relate to the field of Internet technologies, and in particular to a third-party authorized login method and system. Background technique [0002] When a user logs in to a website, it is usually necessary to register a login account and set a corresponding login password on the website. For example, the account registered by the user on website A can only log in to website A, but cannot log in to website B. Therefore, if the user needs to log in to multiple websites, he needs to register multiple corresponding accounts, so that the user needs to manage multiple accounts, which causes inconvenience to the user. inconvenient. In order to solve the above problems, a third-party authorized login method has emerged, which means that users can log in to different websites through third-party authorization, where the third party is the authorizer and the website is the authorized party. For example, users can log in thro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K7/10
CPCG06K7/10544H04L63/0807H04L63/0815
Inventor 张德峰
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products