Supercharge Your Innovation With Domain-Expert AI Agents!

Third-party secure login method

A technology for secure login and successful login, which is applied in the computer field and can solve problems such as difficult management of login account passwords, difficulty in ensuring information security, and theft of personal information.

Pending Publication Date: 2022-05-27
重庆华唐云树科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The development of the Internet has brought us huge economic benefits and convenience, but due to the openness of the Internet, supervision is difficult
Issues such as personal information being stolen, information security difficult to guarantee, and login account passwords difficult to manage on major platforms are derived.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third-party secure login method
  • Third-party secure login method
  • Third-party secure login method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0114] The following describes in detail the embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are exemplary and are only used to explain the present invention, and should not be construed as a limitation of the present invention.

[0115] The present invention proposes a third-party secure login method, such as figure 1 shown, including the following steps:

[0116] [Step 101 ] Other platforms call the user data of the third-party login platform through openAPI. When other platforms send data requests to the third-party login platform, they need to pass identity verification and secret key verification before they can obtain temporary tokens.

[0117] [Step 102] When the user registers with the platform, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a third-party secure login method, which comprises the following steps: S1, registration operation: receiving an electronic form by a third-party login platform, inserting information of the electronic form into a dbo.user table, then verifying the information on the electronic form in a verification mode I, and if the information is correct, indicating that registration succeeds; meanwhile, a unique secret key (user Key) and a unique identification code (user IMEI) of identity authentication information can be automatically generated; s2, binding operation: other platforms receive the user Key and the user IMEI and verify the user Key and the user IMEI in a second verification mode, and login binding is completed if verification succeeds; s3, logging in other platforms: obtaining a dynamic password through a third-party login platform, inserting a piece of data containing the current time T and the dynamic password into a dynamic password library dbo.One-TimePWD, then judging whether the user IMEI and the dynamic password are received by other platforms, if yes, obtaining the current time T by other platforms, and finally, verifying through a third verification mode, and if not, entering the third verification mode; and if the verification succeeds, the login succeeds. According to the method, login verification and account password management of multiple platforms can be uniformly managed and controlled by third-party software, and the security is guaranteed.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a third-party secure login method. Background technique [0002] The development of the Internet has brought us huge economic benefits and convenience, but due to the openness of the Internet, supervision is difficult. Problems such as the theft of personal information, the difficulty in guaranteeing information security, and the difficulty in managing the login account passwords of major platforms have arisen. In order to effectively solve the series of problems, the present invention proposes the concept of changing the login information and identity information originally managed by each platform to a third party providing a login module and identity information authentication for access by other platforms. Unified management and control of multi-platform login verification, account password management by third-party software. SUMMARY OF THE INVENTION [0003] The presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04W12/71H04W12/128H04W12/12G06F21/46G06F40/289G06N3/04G06N3/08
CPCH04L63/0846H04L63/08H04L63/0876H04W12/71H04W12/128H04W12/12G06F21/46G06F40/289G06N3/08H04L2209/80G06N3/045
Inventor 陈尧
Owner 重庆华唐云树科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More