Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

167 results about "Login session" patented technology

In computing, a login session is the period of activity between a user logging in and logging out of a (multi-user) system.

System and method for user authentication with exposed and hidden keys

The present invention relates to a system and method for digitally authenticating users both online and offline. In one embodiment, a hardware token assigned by a trusted token provider to the user is employed to ensure the identity of the user. In the online authentication, the token is adapted for generating an exposed key EK and a hidden key HK based on a noise code NC and a time code TC of the token, a space code SC of a service server, and an owner code OC of the user. A login session is initialized by entering a user identifier at the service server and the generated EK from a computing device. The service server computes an expose key CEK and a hidden key CHK based one an authentication license generated by the token provider. The service server authenticates the user if the CEK is same as the EK, and sends a response message encrypted the CHK to the computing device. Then, the user provides the HK to the computing device to decrypt the encrypted response message so as to access his / her account. In the offline authentication, the token is adapted for generating a license exposed key LEK used to render the encrypted digital content on an offline compliant device. The compliant device authenticates the user if a license exposed key computed by the compliant device based on a content license of which the user bought is same as LEK, so as to render the protected digital content after authentication.
Owner:ZHU YUNZHOU +1

Log-in control method and system based on two-dimension code

The invention provides a log-in control method based on a two-dimension code. The log-in control method based on the two-dimension code comprises the steps that a network service provider cloud server receives a log-in request sent through a first client-end by a user, the cloud server generates a two-dimension code, sends the two-dimension code to the first client-end and displays the two-dimension code through the first client-end, a second client-end obtains an identification string and an address message in the two-dimension code, the second client-end logs in and sends an agency log-in request according to the address message, the cloud server carries out identity authentication of the user according to the agency log-in request, and the cloud server receives a polling request or a long connection request of the first client-end and returns a user log-in conversation message to the first client-end after the identity authentication of the user is carried out. According to the log-in control method based on the two-dimension code, inconvenience brought by a large amount of input during a user log-in process is avoided, safety of a user account is improved, operating cost is low, and user experience is good. Further disclosed is a log-in control system based on the two-dimension code.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Method and system for logging in through mobile terminal and cloud server

The invention provides a method for logging in through a mobile terminal. The method comprises the following steps that a cloud server establishes a corresponding relation between the account information of a user and the identification code of a mobile terminal; the cloud server receives an identification code and a user name transmitted by the mobile terminal according to the login command of the user; the server acquires the account information according to the user name and judges whether the identification code which corresponds to the information is consistent with the identification code transmitted by the mobile terminal or not; and if the identification code which corresponds to the information is consistent with the identification code transmitted by the mobile terminal, the cloud server establishes login session information for the user according to the account information and transmits the session information to the mobile terminal. Due to the adoption of the method, the input cost of a user login process can be reduced and even eliminated, and the user experience is improved; and the method has the advantages of rapidness, safety and applicability. The invention further discloses a system for logging in through the mobile terminal, and a cloud server.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Login method, login system and cloud server

InactiveCN103152330AReduce or even completely eliminate input costsImprove experienceTransmissionComputer scienceLogin session
The invention provides a login method, a login system and a cloud server. The login method comprises the following steps that the cloud server receives a session request which is transmitted by a first terminal aiming at a preset address; the cloud server obtains first login session information between the cloud server and the first terminal; the cloud server generates a login two-dimensional code according to the first login session information and transmits the login two-dimensional code to the first terminal to display the two-dimensional code through the first terminal; the cloud server receives a login request which is transmitted by a second terminal after the second terminal resolves the login two-dimensional code, wherein the login request contains the first login session information; and the cloud server generates second login session information between the cloud server and the second terminal according to the first login session information, and transmits the second login session information to the second terminal. According to the method provided by the embodiment of the invention, the input cost in the user login process is reduced or even fully eliminated, the user experience is improved, and the rapidness, the security and the applicability are good.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Dual authentication method, system and device for SSH safe login

InactiveCN105162764ARealize remote login authenticationWithout compromising securityTransmissionPasswordIdentity theft
The invention discloses a dual authentication method for SSH safe login. The method includes the following steps: a client sends a user name and a password or certificate, and a user uses the user name and the password or certificate to log in a managed SSH authentication server; if the user name and the password or certificate are valid, the SSH authentication server returns a two-dimensional code to be displayed on the client; the user uses an intelligent terminal to scan the two-dimensional code displayed on the client; the intelligent terminal generates signature information for a login session of this time to a two-dimensional verification server or the SSH authentication server through the two-dimensional code, a built-in certificate and a hardware token thereof; and the SSH authentication server verifies whether the signature information is correct, and if the signature information is correct, the SSH authentication server logs in successfully. The dual authentication method for SSH safe login has the beneficial effects that a secondary authentication process based on a two-dimensional code is added, and two-dimensional code information is leaked, is unique and cannot be repetitive, thereby greatly improving security of login verification of the SSH authentication server, and preventing the problem of identity theft caused by user password loss.
Owner:BEIJING STONE SHIELD TECH

System and method for logging in applications (APPs)

ActiveCN104113534AEliminate operating costsThe login process is smoothTransmissionLogin sessionEncryption
The invention provides a system and method for logging in applications (APPs). The system includes a first APP, a first server, a second APP and a second server, wherein the first APP is sued for sending a service request to the second APP, receiving encrypted information from the second APP, and sending the encrypted information to the first server; the second APP is sued for obtaining information of the first APP according to the service request, obtaining login session information, then sending an encryption request containing the information of the first APP, the service request and the login session information to the second server, and sending encrypted information from the second server to the first server; the second server is used for generating encrypted information according to the encryption request, and sending the encrypted information to the second APP; and the first server is used for receiving the encrypted information send by the first APP, decrypting the encrypted information, obtaining an account number of the first APP according to a decrypted result, and providing a login service for the account number. According to the abovementioned system and method, operating cost for initiative login of a user is omitted, and no page jump occurs in a login process.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products