Third-party authorized login method and device

A login method and login request technology, applied in the communication field, can solve the problems of poor scalability and achieve fast access and strong scalability

Active Publication Date: 2021-08-31
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing user login service simply realizes the login operation of users on different platforms, and the login logic is coupled at the bottom of the application system, which has poor scalability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third-party authorized login method and device
  • Third-party authorized login method and device
  • Third-party authorized login method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0033] Embodiments of the present application provide a third-party authorized login method and device, which can improve the accuracy of video risk assessment and the efficiency of video review and release. Each will be described in detail below. It should be noted that the sequence of the following embodiments is not intended to limit the preferred sequence of the embodiments.

[0034] In one embodiment, description will be made from the perspective that the third-party authorization login d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses a third-party authorized login method and device. The method includes: receiving a cloud application login request sent by a client, the login request at least including: an identity associated with a third-party platform account to be accessed, and address information of the cloud application, wherein the identity is associated with multiple different The third-party platform account of the system; obtain the corresponding user data set according to the address information; verify the identity based on the user data in the user data set; when the verification is passed, obtain the current user information of the third-party platform; The information returns the page data of the cloud application to the client. This solution integrates third-party platforms of different systems through a unified identity verification method, which solves the problem that the login identities of users on different platforms cannot be unified, realizes fast access to multi-platform account systems, and has strong scalability.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a third-party authorized login method and device. Background technique [0002] At present, many service platforms provide platform capabilities for applications that need to access the platform, so that the platform can achieve the purpose of pooling resources, and at the same time access applications to obtain platform resources. The connection between the application and the major service platforms requires the opening of a third-party account, so that the accounts on the major service platforms can directly log in and use the applications connected to the platform. [0003] However, the existing user login service simply realizes the login operation of different platforms for users, and the login logic is coupled at the bottom layer of the application system, so the scalability is poor. Contents of the invention [0004] Embodiments of the present appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0807H04L67/02H04L67/10
Inventor 马海刚盛颖马维宁邓磊阳凯刘志杰
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products