Application login method and system, terminal and electronic equipment

A user and key pair technology, applied in the field of login applications, can solve problems such as endangering customer property and personal safety, leakage of customer data, etc., to avoid leakage, improve security, and ensure the effect of security

Active Publication Date: 2019-10-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method, system, terminal, and electronic device for logging in to applications, so as to solve the problems caused by the theft of user identity information when a third-party application uses the user identity information on the application to log in in the prior art. The resulting leakage of customer information, which in turn endangers the customer's property and personal safety and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application login method and system, terminal and electronic equipment
  • Application login method and system, terminal and electronic equipment
  • Application login method and system, terminal and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0134] In order to prevent insecurity problems caused by leakage of user identity information when a third-party application uses the user identity information of the terminal user to log in to another application, the embodiment of the present invention provides a method, system, terminal and application login method. Electronic equipment.

[0135] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention, and in the absence of conflict, the present invention The embodiments and the features in the embodiments can be combined with each other.

[0136] In order to solve the problem of improving user information security proposed by the present invention, the embodiment of the present invention is based on Figure 1a The architecture...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application login method and system, a terminal and electronic equipment, and belongs to the technical field of information security. The method comprises the following steps of: when a first application in a terminal acquires authorization confirmation that a user permits to use user identity information of the first application to log in a second application, sending an authentication request of authentication encryption information carrying the identification information of the second application to an authentication server; when it is determined that the second application is legal according to an authentication result returned by the authentication server, obtaining the access token from the business server of the first application and sending the obtained access token to the second application, so that the second application can obtain the business data of the user from the business server by utilizing the access token, and meanwhile, the user is allowed to use the business data when carrying out the business of the second application. The data is transmitted in an encryption mode, information is prevented from being stolen in the transmission process, and therefore the safety of the data recorded on the service server by a user is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method, system, terminal and electronic device for logging in an application. Background technique [0002] With the popularity of customer relationship management software and the increasing number of users of applications with functions such as customer management, no matter the users of applications with functions such as customer management or other third-party companies are not only satisfied with using the application in the application For related functions, they hope to be able to use the account of the application to log in and use the relevant functions of the application, such as customer management functions, on the third-party application through the relevant software development kit (Software Development Kit, SDK) developed by the application. In order to avoid the leakage of customer information and then affect the customer's property and per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04L63/0428H04L9/3213H04L63/083
Inventor 林伟王波王锐朱青蓥阮闪闪
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products