Unlock instant, AI-driven research and patent intelligence for your innovation.

Simulated user login method and device

A technology for simulating users and login methods, which is applied in the field of computer information, and can solve problems such as cumbersome process and unfavorable user B reporting problems quickly.

Active Publication Date: 2021-08-24
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method must rely on the user name and password of user B, and the process is cumbersome, which is not conducive to the rapid resolution of the problem reported by user B

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Simulated user login method and device
  • Simulated user login method and device
  • Simulated user login method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0027] figure 1 A schematic flowchart of a method for logging in a simulated user according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes:

[0028] Step S110, receiving the local cookie information corresponding to the first user sent by the client in the login environment of the first user and parsing the local cookie information corresponding to the first user to obtain a par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for simulating user login. Wherein, the method includes: receiving the local cookie information corresponding to the first user sent by the client in the login environment of the first user and parsing the local cookie information corresponding to the first user to obtain the parsing result; second user information; and, if there is second user information, switching the login environment of the first user to the login environment of the second user according to the second user information. With this solution, the login environment of the first user can be switched to the login environment of the second user without the login password of the second user, thereby realizing the simulation of the login of the second user, which is convenient for quickly verifying or solving the problems reported by the second user .

Description

technical field [0001] The invention relates to the field of computer information technology, in particular to a method and device for simulating user login. Background technique [0002] With the continuous development of the information society, the issue of information security has become increasingly prominent. In the prior art, in order to ensure the security of information, users who access or process information are usually configured with corresponding user names and user passwords, and the information corresponding to the user can only be accessed or processed after the user names and user passwords are successfully verified. [0003] Since different users have different environments for accessing or processing information, when user B reports a problem encountered in his corresponding environment, when maintenance personnel A wants to provide a solution to the problem reported by user B, he usually needs to first obtain User B's username and password to access the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08
CPCH04L67/08H04L67/34
Inventor 张平马智昊
Owner BEIJING QIHOO TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More