Simulated account login method and device, equipment and storage medium

A technology for simulating login and account, applied in computer field

Pending Publication Date: 2021-01-12
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In some scenarios, it is necessary for a user to simulate another user to log in to the corresponding website, so that the above-mentioned one user completes some operations through the website as another user. However, in related technologies, a user often directly asks for another user's login account and login Account login information such as passwords, and then one account uses the account login information of another account to log in to the above-mentioned website, but the account login information of the other user mentioned above is known to the above-mentioned one user in the process, and the account of the above-mentioned other user has great security. Therefore, how to reduce the account security risk caused by the demo account login is a problem that needs to be considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Simulated account login method and device, equipment and storage medium
  • Simulated account login method and device, equipment and storage medium
  • Simulated account login method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0184] Example 1: Applied to the first application scenario above

[0185] See Figure 9 , in this example, user B of the second account and user A of the first account can chat by telephone or online, and user B can obtain the account query information of the first account, and then user B can obtain the account query information of the second account through the identity information of the second account After logging in to the first website, query the target jump object of the first account based on the account query information of the first account, and trigger the login jump instruction by clicking the target jump object of the first account.

[0186] The process of obtaining target identity conversion information includes: after the browser on the terminal 100 detects the login redirection instruction, it sends a login redirection request to the API gateway; the API gateway forwards the login redirection request sent by the browser to the first server 300; The fi...

example 2

[0217] Example 2: Applied to the second application scenario above

[0218] See Figure 12 , in this example, user B of the second account and user A of the first account can chat by telephone or online, and user B can obtain the account query information of the first account, and then user B can obtain the account query information of the second account through the identity information of the second account After logging in to the second website, query the target jump object of the first account based on the account query information of the first account, and trigger the login jump instruction by clicking the target jump object of the first account.

[0219] The process of obtaining target identity conversion information includes: after the browser on the terminal 100 detects a login redirection indication, it sends a login redirection request to the second server 400; and send the login instruction information including the identity conversion information to the brow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a simulated account login method and device, equipment and a storage medium, relates to the technical field of computers, and is used for improving the account security when logging in a simulated account. The method comprises the steps: after a service management device receives a target request sent by a terminal, if it is determined that the target request contains targetidentity conversion information, obtaining a login state identifier of a first account based on the target identity conversion information; adding the login state identifier to the target request andthen sending the target request to a first website, so that the terminal logs in the first website through the identity information of the first account based on the login state identifier, wherein the target identity conversion information comprises identity information of the first account and identity information of the second account, and the login state identifier is determined based on theidentity information of the first account. According to the method, the first website is logged in through the identity information of the first account without knowing the login account and the loginpassword of the first account, so that the security degree of the account login information of the first account when the first account is logged in is improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a method, device, device and storage medium for logging in with a simulated account. Background technique [0002] In some scenarios, it is necessary for a user to simulate another user to log in to the corresponding website, so that the above-mentioned one user completes some operations through the website as another user. However, in related technologies, a user often directly asks for another user's login account and login Account login information such as passwords, and then one account uses the account login information of another account to log in to the above-mentioned website, but the account login information of the other user mentioned above is known to the above-mentioned one user in the process, and the account of the above-mentioned other user has great security. Therefore, how to reduce the account security risk caused by the demo account login is a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/31G06F21/45
Inventor 徐宁
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products