CN109660487B - Authorization method based on H5 webpage, storage medium, electronic device and system - Google Patents

Authorization method based on H5 webpage, storage medium, electronic device and system Download PDF

Info

Publication number
CN109660487B
CN109660487B CN201710935284.7A CN201710935284A CN109660487B CN 109660487 B CN109660487 B CN 109660487B CN 201710935284 A CN201710935284 A CN 201710935284A CN 109660487 B CN109660487 B CN 109660487B
Authority
CN
China
Prior art keywords
authorization
token
server
authorization token
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710935284.7A
Other languages
Chinese (zh)
Other versions
CN109660487A (en
Inventor
张磊
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710935284.7A priority Critical patent/CN109660487B/en
Publication of CN109660487A publication Critical patent/CN109660487A/en
Application granted granted Critical
Publication of CN109660487B publication Critical patent/CN109660487B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Abstract

The invention discloses an authorization method, a storage medium, electronic equipment and a system based on an H5 webpage, and relates to the field of application program authorization. The method comprises the following steps: after user information of an application program A input by a user is acquired on a page H5, the user information is sent to a server A of the application program A; the server A generates an authorization token according to the user information and returns to the H5 page, and the H5 page stores the authorization token and then sends the authorization token information to the server B of the application program B; the server B generates a login token according to the authorization token information and then sends the login token to the server A; after obtaining the authorization token corresponding to the login token, the server A returns the authorization token and the user information to the server B, and the server B issues the user information to the client B. According to the invention, when the user needs the application program A to authorize the application program B, the authorization of the application program A can be completed through the H5 webpage, the application range is very wide, and the user experience is obviously improved.

Description

Authorization method based on H5 webpage, storage medium, electronic device and system
Technical Field
The invention relates to the field of application program authorization, in particular to an authorization method, a storage medium, electronic equipment and a system based on an H5 webpage.
Background
With the development of networks, network applications are more and more, account information (user name and password) needs to be input when each network application is used generally, and in order to simplify the process of inputting the account information by a user, an application direct authorization method is provided in the industry, that is, 2 applications (for example, an application a and an application B) are authorized to run in an associated manner, so that the application B is directly authorized through the application a without inputting the account information by the user, the working efficiency is improved, and the application with the authorized associated running is popularized. For example: the online game (the application program A) is logged in through the account information of the live fish fighting platform (the application program B), the online game is directly authorized after the client of the live fish fighting platform on the terminal (such as a PC, a tablet computer, a mobile phone and the like) is operated, and the user can directly operate the client of the online game after the authorization.
However, when the application program is run in the authorization association, the following defects exist:
as can be seen from the foregoing, the user must authorize other applications to run through the client of the application B, and when the client of the application B does not exist on the user terminal, the application B must be downloaded, which not only complicates the operation process, but also increases the use cost (network traffic required for downloading). Meanwhile, when the user cannot download or run the application program B due to external factors (for example, the network is not smooth or the terminal is not compatible with the application program B), direct authorization of other application programs cannot be realized, so that the application range for authorizing the running of other application programs through the application program B is narrow, and the application program B has great limitation.
Disclosure of Invention
Aiming at the defects in the prior art, the invention solves the technical problems that: how to complete the authorization of the application program A through the H5 webpage when the user needs the application program A to authorize the application program B is very wide in application range, and therefore user experience is remarkably improved.
In order to achieve the above object, the authorization method based on the H5 webpage provided by the invention comprises the following steps:
the method comprises the following steps: after the user information of the application program A input by the user is obtained on the H5 page, the user information is sent to the server A of the application program A, and the step II is carried out;
step two: after judging that the received user information is correct, the server A generates a unique authorization token with an expiration date according to the user information, returns the authorization token to the H5 page, stores the authorization token in the H5 page, sends the authorization token information to the server B of the application program B, and goes to the third step;
step three: the server B generates a unique login token corresponding to the authorization token according to the authorization token information, and then sends the login token to the server A; after the server A acquires the authorization token corresponding to the login token, returning the authorization token and the user information corresponding to the authorization token to the server B, storing the authorization token and the user information by the server B, marking the authorization token to be associated with the client B of the application program B, and turning to the fourth step;
step four: and the server B sends the user information to the client B.
On the basis of the technical scheme, the first step further comprises the following steps: when monitoring that the user needs the application program A to authorize the application program B, the client B sends an authorization request to the server B; and after receiving the authorization request, the server B judges whether an unexpired authorization token associated with the client B exists, if so, the step IV is carried out, and if not, the step I is carried out.
On the basis of the above technical solution, the process of sending the authorization token information to the server B in the second step includes: the H5 page sends the authorization token information to the client B, and the client B sends the authorization token information to the server B.
On the basis of the above technical solution, the authorization token information in the second step is an authorization code converted according to the authorization token.
The storage medium provided by the invention is stored with a computer program, and the computer program realizes the authorization method based on the H5 webpage when being executed by a processor.
The electronic device provided by the invention comprises a memory and a processor, wherein the memory is stored with a computer program running on the processor, and the processor executes the computer program to realize the authorization method based on the H5 webpage.
The authorization system based on the H5 webpage comprises an H5 webpage information transmission module arranged on a client B, an authorization token generation module and a user information authorization module arranged on a server A, and a login token generation module and a user information issuing module arranged on the server B;
the H5 page information transfer module is used for: after user information of an application program A input by a user is obtained on a page H5, the user information is sent to an authorization token generation module of a server A; after receiving the authorization token returned by the authorization token generation module, storing the authorization token and sending the authorization token information to a login token generation module of the server B;
the authorization token generation module is to: after receiving the user information and judging that the user information is correct, generating a unique authorization token with an expiration date according to the user information, and returning the authorization token to the H5 page information transmission module;
the login token generation module is used for: after receiving the authorization token information, generating a unique login token corresponding to the authorization token according to the authorization token information, and sending the login token to a user information authorization module of the server A; after receiving the authorization token and the user information returned by the user information authorization module, storing the authorization token and the user information, marking the authorization token to be associated with the client B of the application program B, and sending a user information issuing signal to a user information issuing module of the server B;
the user information authorization module is used for: after receiving the login token, acquiring an authorization token corresponding to the login token, and returning the authorization token and user information corresponding to the authorization token to a login token generation module of the server B;
the user information issuing module is used for: and after receiving the user information issuing signal, issuing the user information to the client B.
On the basis of the above technical solution, the system further includes an authorization monitoring module disposed on the client B, and configured to: when monitoring that the application program A is required to authorize the application program B, sending an authorization request to a login token generation module of a server side B; and after receiving the authorization request, the login token generation module judges whether an unexpired authorization token associated with the client B exists, if so, sends a user information issuing signal to the user information issuing module, and otherwise, sends a working signal to the H5 page information transmission module.
On the basis of the technical scheme, the process that the H5 page information transmission module sends the authorization token information to the login token generation module of the server B comprises the following steps: the H5 page information transfer module sends the authorization token information to the client B, and the client B sends the authorization token information to the login token generation module of the server B.
On the basis of the technical scheme, the authorization token information in the H5 page information transmission module is an authorization code converted according to the authorization token.
Compared with the prior art, the invention has the advantages that:
(1) as can be seen from the first to fourth steps of the present invention, when the user needs the application a to authorize the application B, the authorization of the application a is completed through the H5 webpage, and compared with the prior art in which the authorization is completed through the client, the H5 webpage does not need to be downloaded, and the problem of incompatibility with the terminal does not exist basically, so that the application range of the present invention is very wide, and the user experience is further improved significantly.
(2) According to the invention, when the user needs the application program A to authorize the application program B, if the server B has an unexpired authorization token associated with the client B (namely the method is not used for the first time and is in the validity period), the steps one to three can be skipped, and the step four is directly executed, so that the working process is obviously simplified, the working efficiency is greatly improved, the user can log in the client B quickly, and the user experience is improved.
(3) According to the second step of the invention, the authorization token is converted into the authorization code and then sent to the server B, and the authorization token is converted into the authorization code, so that the difficulty of cracking the authorization token can be increased, and the network security performance can be improved. Meanwhile, the H5 page of the invention firstly sends the authorization token information to the client B, and then the client B sends the authorization token information to the server B. Because there may be a plurality of other applications that need authorization of the application a, that is, the server a may send information to a plurality of servers B at the same time, the load of the server a is large (overhead required for sending information, address of the server B is recorded, etc.); according to the invention, the transmission of the authorization code is completed through the H5 page corresponding to each server B and the client B, so that the overhead required by the transmission of the authorization code is borne by the background (the server B) of the initiator, thereby realizing the overhead required by different initiators for respective information transmission, and not only is the setting reasonable, but also the load of the server A is obviously reduced.
Drawings
FIG. 1 is a flowchart of an H5 web-based authorization method according to an embodiment of the present invention;
fig. 2 is a connection block diagram of an electronic device in an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
Referring to fig. 1, the authorization method based on the H5 webpage in the embodiment of the present invention includes the following steps:
s1: when a user needs the application program A to authorize the application program B (namely when the application program B is used, the authorization of the application program A is needed), the client B of the application program B sends an authorization request to the server B of the application program B; and after receiving the authorization request, the server B judges whether an unexpired authorization token associated with the client B exists, if so, the S6 is carried out, and if not, the S2 is carried out.
Referring to S1, if the server B has an unexpired authorized token associated with the client B (i.e., the method is not used for the first time and is within the validity period), S2 to S5 may be skipped and S6 may be directly executed, thereby significantly simplifying the work flow, greatly improving the work efficiency, and improving the user experience because the user logs in the client B quickly.
S2: the client B jumps to a preset H5 page, and the user inputs user information (an account and a password) of the application A on the H5 page; after the H5 page obtains the user information input by the user, the user information is sent to the server a of the application a, and the process goes to S3.
S3: after the server A judges that the received user information is correct (if the received user information is incorrect, the user information is directly returned to have an input error, and the user information is required to be input again), a unique authorization token with an expiration date is generated according to the user information, the authorization token is returned to the H5 page, and the S4 is turned.
S4: the H5 page caches the authorization token (thus, the process of obtaining the authorization token again when the authorization token is reused in the caching period is omitted), the authorization token is converted into an authorization code, the authorization code is sent to the server B, the authorization token is converted into the authorization code, the difficulty of cracking the authorization token can be increased, the network security performance is improved, and the process goes to S5.
The specific process of sending the authorization code to the server B in S4 is as follows: the H5 page sends the authorization code to the client B, which sends the authorization code to the server B, with the benefits of: if the server a directly sends information to the server B, because there may be a plurality of other application programs that need authorization of the application program a, that is, the server a may send information to a plurality of servers B at the same time, the load of the server a is large (overhead required for sending information, address of the server B is recorded, etc.); in the embodiment of the invention, the transmission of the authorization code is completed through the H5 page corresponding to each server B and the client B, so that the overhead required by the transmission of the authorization code is borne by the background (the server B) of the initiator, thereby realizing the overhead required by different initiators for respective information transmission, and not only setting is reasonable, but also the load of the server A is obviously reduced.
S5: the server B generates a unique login token corresponding to the authorization token according to the authorization code, and then sends the login token to the server A; after the server A obtains the authorization token corresponding to the login token, returning the authorization token and the user information corresponding to the authorization token to the server B; the server B stores the authorization token and the user information, associates the authorization token with the user information and the client B, respectively (it can be seen that if the authorization token exists in S1, the associated user information inevitably exists), and proceeds to S6.
S6: the server B issues the user information (the user information is the user information of the authorization token associated with the client B) to the client B, and the client B prompts that the authorization login is successful, namely the client can be used normally.
As can be seen from S1 to S6, in the embodiment of the present invention, when a user needs the application a to authorize the application B, the authorization of the application a is completed through the H5 webpage, and compared with the prior art in which authorization is completed through a client, the H5 webpage does not need to be downloaded, and there is substantially no problem of incompatibility with a terminal, so that the application range of the embodiment of the present invention is very wide, and user experience is significantly improved.
The embodiment of the invention also provides a storage medium, wherein a computer program is stored on the storage medium, and when being executed by a processor, the computer program realizes the authorization method based on the H5 webpage. The storage medium includes various media capable of storing program codes, such as a usb disk, a removable hard disk, a ROM (Read-Only Memory), a RAM (Random Access Memory), a magnetic disk, or an optical disk.
Referring to fig. 2, an embodiment of the present invention further provides an electronic device, which includes a memory and a processor, where the memory stores a computer program running on the processor, and the processor executes the computer program to implement the aforementioned authorization method based on the H5 webpage.
The authorization system based on the H5 webpage in the embodiment of the invention comprises an authorization monitoring module and an H5 webpage information transmission module which are arranged on a client B, an authorization token generation module and a user information authorization module which are arranged on a server A, and a login token generation module and a user information issuing module which are arranged on the server B.
The authorization monitoring module is to: when monitoring that the application program A is required to authorize the application program B, sending an authorization request to a login token generation module of a server side B; and after receiving the authorization request, the login token generation module judges whether an authorization token which is associated with the client B and is not overdue exists, if so, sends a user information issuing signal to the user information issuing module, and otherwise, sends a working signal to the H5 page information transmission module.
The H5 page information transfer module is used for: after receiving the working signal, displaying an H5 page, and after acquiring user information of the application program A input by a user on the H5 page, sending the user information to an authorization token generation module of the server A; after receiving the authorization token returned by the authorization token generation module, storing the authorization token, and sending the authorization token information (according to the authorization code converted by the authorization token) to the login token generation module of the server B (H5 page information transmission module sends the authorization token information to the client B, and the client B sends the authorization token information to the login token generation module of the server B).
The authorization token generation module is to: and after receiving the user information and judging that the user information is correct, generating a unique authorization token with an expiration date according to the user information, and returning the authorization token to the H5 page information transmission module.
The login token generation module is used for: after receiving the authorization token information, generating a unique login token corresponding to the authorization token according to the authorization token information, and sending the login token to a user information authorization module of the server A; and after receiving the authorization token and the user information returned by the user information authorization module, storing the authorization token and the user information, marking the authorization token to be associated with the client B of the application program B, and sending a user information issuing signal to a user information issuing module of the server B.
The user information authorization module is used for: and after receiving the login token, acquiring an authorization token corresponding to the login token, and returning the authorization token and the user information corresponding to the authorization token to a login token generation module of the server B.
The user information issuing module is used for: and after receiving the user information issuing signal, issuing the user information to the client B.
It should be noted that: in the system provided in the embodiment of the present invention, when performing inter-module communication, only the division of each functional module is illustrated, and in practical applications, the above function distribution may be completed by different functional modules as needed, that is, the internal structure of the system is divided into different functional modules to complete all or part of the above described functions.
Further, the present invention is not limited to the above-mentioned embodiments, and it will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the principle of the present invention, and these modifications and improvements are also considered to be within the scope of the present invention. Those not described in detail in this specification are within the skill of the art.

Claims (6)

1. An authorization method based on H5 webpage is characterized by comprising the following steps:
the method comprises the following steps: after the user information of the application program A input by the user is obtained on the H5 page, the user information is sent to the server A of the application program A, and the step II is carried out;
step two: after judging that the received user information is correct, the server A generates a unique authorization token with an expiration date according to the user information, returns the authorization token to the H5 page, stores the authorization token in the H5 page, sends the authorization token information to the server B of the application program B, and goes to the third step;
step three: the server B generates a unique login token corresponding to the authorization token according to the authorization token information, and then sends the login token to the server A; after the server A acquires the authorization token corresponding to the login token, returning the authorization token and the user information corresponding to the authorization token to the server B, storing the authorization token and the user information by the server B, marking the authorization token to be associated with the client B of the application program B, and turning to the fourth step;
step four: the server B sends the user information to the client B;
wherein, the first step also comprises the following steps: when monitoring that the user needs the application program A to authorize the application program B, the client B sends an authorization request to the server B; after receiving the authorization request, the server B judges whether an unexpired authorization token associated with the client B exists, if so, the step goes to a step four, and if not, the step one is gone to;
the method comprises the following steps of sending authorization token information to a server B of an application program B, specifically: the H5 page sends the authorization token information to the client B, and the client B sends the authorization token information to the server B.
2. The H5 web-based authorization method of claim 1, wherein: and in the second step, the authorization token information is an authorization code converted according to the authorization token.
3. A storage medium having a computer program stored thereon, characterized in that: the computer program, when executed by a processor, implements the method of any of claims 1 to 2.
4. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program that runs on the processor, characterized in that: the processor, when executing the computer program, implements the method of any of claims 1 to 2.
5. An authorization system based on an H5 webpage is characterized by comprising an H5 webpage information transmission module arranged on a client B, an authorization token generation module and a user information authorization module arranged on a server A, and a login token generation module and a user information issuing module arranged on the server B;
the H5 page information transfer module is used for: after user information of an application program A input by a user is obtained on a page H5, the user information is sent to an authorization token generation module of a server A; after receiving the authorization token returned by the authorization token generation module, storing the authorization token and sending the authorization token information to a login token generation module of the server B;
the authorization token generation module is to: after receiving the user information and judging that the user information is correct, generating a unique authorization token with an expiration date according to the user information, and returning the authorization token to the H5 page information transmission module;
the login token generation module is used for: after receiving the authorization token information, generating a unique login token corresponding to the authorization token according to the authorization token information, and sending the login token to a user information authorization module of the server A; after receiving the authorization token and the user information returned by the user information authorization module, storing the authorization token and the user information, marking the authorization token to be associated with the client B of the application program B, and sending a user information issuing signal to a user information issuing module of the server B;
the user information authorization module is used for: after receiving the login token, acquiring an authorization token corresponding to the login token, and returning the authorization token and user information corresponding to the authorization token to a login token generation module of the server B;
the user information issuing module is used for: after receiving the user information issuing signal, issuing the user information to the client B;
wherein, the system also comprises an authorization monitoring module arranged on the client B, and is used for: when monitoring that the application program A is required to authorize the application program B, sending an authorization request to a login token generation module of a server side B; after receiving the authorization request, the login token generation module judges whether an authorization token which is associated with the client B and is not overdue exists, if so, a user information issuing signal is sent to the user information issuing module, and if not, a working signal is sent to the H5 page information transmission module;
the process that the H5 page information transfer module sends the authorization token information to the login token generation module of the server B comprises the following steps: the H5 page information transfer module sends the authorization token information to the client B, and the client B sends the authorization token information to the login token generation module of the server B.
6. The H5 web-based authorization system according to claim 5, wherein: the authorization token information in the H5 page information transmission module is an authorization code converted according to the authorization token.
CN201710935284.7A 2017-10-10 2017-10-10 Authorization method based on H5 webpage, storage medium, electronic device and system Active CN109660487B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710935284.7A CN109660487B (en) 2017-10-10 2017-10-10 Authorization method based on H5 webpage, storage medium, electronic device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710935284.7A CN109660487B (en) 2017-10-10 2017-10-10 Authorization method based on H5 webpage, storage medium, electronic device and system

Publications (2)

Publication Number Publication Date
CN109660487A CN109660487A (en) 2019-04-19
CN109660487B true CN109660487B (en) 2021-11-09

Family

ID=66109523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710935284.7A Active CN109660487B (en) 2017-10-10 2017-10-10 Authorization method based on H5 webpage, storage medium, electronic device and system

Country Status (1)

Country Link
CN (1) CN109660487B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493184B (en) * 2019-07-09 2022-10-14 深圳壹账通智能科技有限公司 Method and device for processing login page in client and electronic device
CN110933078B (en) * 2019-11-29 2022-04-05 交通银行股份有限公司 H5 unregistered user session tracking method
CN111556060B (en) * 2020-04-29 2022-09-02 上海中通吉网络技术有限公司 Method, device, equipment and storage medium for embedding target software into external H5 page
CN114416195B (en) * 2021-12-24 2023-08-18 青岛海尔科技有限公司 H5 page loading method and device, intelligent terminal and server

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103888451A (en) * 2014-03-10 2014-06-25 百度在线网络技术(北京)有限公司 Method, device and system for certification authorization
CN104113533A (en) * 2014-07-02 2014-10-22 百度在线网络技术(北京)有限公司 Login authorization method and device
CN104902028A (en) * 2015-06-19 2015-09-09 赛肯(北京)科技有限公司 Onekey registration authentication method, device and system
CN106131604A (en) * 2016-06-24 2016-11-16 腾讯科技(深圳)有限公司 The transmission method of a kind of multimedia messages and device
CN106453303A (en) * 2016-10-09 2017-02-22 武汉斗鱼网络科技有限公司 Method and system for storing user login status for IOS client

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040073617A1 (en) * 2000-06-19 2004-04-15 Milliken Walter Clark Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
CN105897668A (en) * 2015-10-22 2016-08-24 乐视致新电子科技(天津)有限公司 Third party account authorization method, device, server and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103888451A (en) * 2014-03-10 2014-06-25 百度在线网络技术(北京)有限公司 Method, device and system for certification authorization
CN104113533A (en) * 2014-07-02 2014-10-22 百度在线网络技术(北京)有限公司 Login authorization method and device
CN104902028A (en) * 2015-06-19 2015-09-09 赛肯(北京)科技有限公司 Onekey registration authentication method, device and system
CN106131604A (en) * 2016-06-24 2016-11-16 腾讯科技(深圳)有限公司 The transmission method of a kind of multimedia messages and device
CN106453303A (en) * 2016-10-09 2017-02-22 武汉斗鱼网络科技有限公司 Method and system for storing user login status for IOS client

Also Published As

Publication number Publication date
CN109660487A (en) 2019-04-19

Similar Documents

Publication Publication Date Title
CN109660487B (en) Authorization method based on H5 webpage, storage medium, electronic device and system
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN105282126B (en) Login authentication method, terminal and server
CN111478967B (en) Request processing method and device
CN104144419A (en) Identity authentication method, device and system
CN105450691A (en) Service-processing method and device, and server
CN104717261A (en) Login method and desktop management device
CN109005159B (en) Data processing method for terminal access system server and authentication server
CN105072112A (en) Identity authentication method and identity authentication device
CN108900479A (en) Short message verification code acquisition methods and device
CN104917766A (en) Security authentication method for two-dimension code
CN103685554A (en) Upgrading method, device and system
CN107820702B (en) Management and control method, device and electronic equipment
CN104601582A (en) File transfer method, device and system
JP2020187746A (en) Iot device, authentication method therefor, cloud server, processing device and readable medium
CN104917794A (en) Data sharing method, device and system
CN106453349A (en) An account number login method and apparatus
CN105991610B (en) Log in the method and device of application server
CN105450592A (en) Safety verification method and device, server and terminal
CN104468486A (en) Information processing method and system and electronic device
CN104065674A (en) Terminal device and information processing method
CN109150981B (en) Block chain network networking method, device, equipment and computer readable storage medium
CN104778389A (en) Numerical value transferring method, terminal, server and system
CN105141624A (en) Login method, account management server and client system
CN103559430A (en) Application account management method and device based on android system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant