Configuration-based joint login method and device, and computer device

A login method and computer technology, applied to secure communication devices, public keys for secure communications, digital transmission systems, etc., can solve problems such as inconvenient data and security, and achieve the effects of ensuring security, simplifying the login process, and improving experience

Active Publication Date: 2020-05-22
北京淇瑀信息科技有限公司
View PDF12 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention aims to solve the operation inconvenience and data security problems of frequent switching when APP accesses multiple third-party H5 page programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration-based joint login method and device, and computer device
  • Configuration-based joint login method and device, and computer device
  • Configuration-based joint login method and device, and computer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. Although each exemplary embodiment can be implemented in a variety of specific ways, it should not be understood that the present invention is limited to the embodiments set forth herein. On the contrary, these exemplary embodiments are provided to make the content of the present invention more complete and more convenient to comprehensively convey the inventive concept to those skilled in the art.

[0022] On the premise of conforming to the technical concept of the present invention, the structure, performance, effect or other features described in a particular embodiment can be combined into one or more other embodiments in any suitable manner.

[0023] In the process of introducing specific embodiments, the detailed description of the structure, performance, effects or other features is to enable those skilled in the art to fully understand the embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a configuration-based joint login method and device, a computer device and a computer readable device, and the method comprises the steps: configuring a partner ID for a third-party H5 program through a system, generating a temporary token through a native API interface of a client APP, and transmitting the temporary token to a third-party server; the third-party server sending the encrypted temporary token and the partner ID to the system; and requesting the system to perform verification, the system performing decryption verification after receiving the verification data sent by the third-party server, and if the temporary token is valid, returning unique identification information and other configured information of the user of the third-party server to be used for joint login. Therefore, the login process can be simplified, the user experience is improved, and login is convenient. And different third-party H5 programs can be accessed, so that the program development amount is reduced and the user privacy is protected. And meanwhile, the function of the APP system is also utilized, so that the security of data access is guaranteed.

Description

Technical field [0001] The present invention relates to the field of computer information processing, in particular, to the field of computer security technology, in particular to a mobile terminal APP and H5-based login authority control method, device, computer equipment and computer readable medium. Background technique [0002] APP, namely mobile phone application software, mainly refers to software installed on mobile terminals, and has been widely used. The application of H5 page is also widely used due to its simple development cost, and the interaction between the two is also very frequent. The so-called H5 application refers to a web page program based on the Hyper Text Markup Language (HTML) 5.0 standard, namely HTML5. [0003] In order to provide richer content and services to a large number of users on the APP, it is necessary to access a third-party H5 page program in the APP, and when accessing multiple third-party H5 page programs, it is necessary to frequently acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30
CPCH04L63/0815H04L63/0807H04L9/302
Inventor 黄师亮宋荣鑫赵立平吴晓彬丘晓强
Owner 北京淇瑀信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products