Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Login authentication method, automatic login authentication method, server and client

A login verification and automatic login technology, which is applied in the Internet field, can solve the problem of low security and achieve the effect of improving security and protecting information

Active Publication Date: 2018-12-11
ADVANCED NEW TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, existing automatic login methods are less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication method, automatic login authentication method, server and client
  • Login authentication method, automatic login authentication method, server and client
  • Login authentication method, automatic login authentication method, server and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Multiple embodiments disclosed in this specification will be described below in conjunction with the accompanying drawings.

[0033] First, the inventive concept and application scenarios of the automatic login verification method provided by the embodiment of this specification are introduced. The method described is mainly based on the following observations and statistics:

[0034] At present, most mobile clients (hereinafter referred to as clients), that is, applications running on mobile terminals, provide an automatic login mechanism in order to improve user experience, that is, when a user enters authentication information, such as a user name and password , if the login is successful, when the user needs to log in again, he only needs to open the client without entering the authentication information again to complete the login. However, in traditional automatic login mechanisms, see figure 1 In the application scenario shown, the client needs to submit, and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present specification provides a login authentication method. The method includes: first, receiving device information of a device in which a client is located sent in response toa startup instruction, and generating a first device token for the device information; Then, determining the device identifier corresponding to the device information, and establishing a first mapping relationship between the device identifier and the first device token, and sending the first device token to the client; Then, receiving a login authentication request sent by a client, the login authentication request including at least a first device token, a user name and a password; then, when the user name and password are verified, obtaining the device identifier corresponding to the firstdevice token according to the first mapping relationship, and obtaining the user identifier corresponding to the user name,the user identificater being generated correspondingly based on the user name successfully registered; then, returning a user identification to the client and generating an authorization record , the authorization record including at least the device identifier and the user identifier.

Description

technical field [0001] The embodiment of this specification relates to the field of Internet technologies, and in particular, relates to a login verification method, an automatic login verification method, a server and a client. Background technique [0002] With the development of Internet technology, people more and more frequently use various applications in mobile terminals, such as mobile phones and tablet computers, to meet various needs in life and work. In order to use various functions provided in the application, such as the transfer function in Alipay, the user usually needs to log in to the application with a user name and password. Based on this, in order to enable users to log in more quickly, most applications provide an automatic login function, that is, after a user successfully logs in for a certain time, there is no need to enter the user name and password again, but to directly open the application to log in. [0003] However, the existing automatic logi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/083H04L63/0876
Inventor 王志强
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products