CN108134788A - A kind of third party login method and system of cloud operating system - Google Patents
A kind of third party login method and system of cloud operating system Download PDFInfo
- Publication number
- CN108134788A CN108134788A CN201711390928.5A CN201711390928A CN108134788A CN 108134788 A CN108134788 A CN 108134788A CN 201711390928 A CN201711390928 A CN 201711390928A CN 108134788 A CN108134788 A CN 108134788A
- Authority
- CN
- China
- Prior art keywords
- user
- party
- login
- module
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention relates to a kind of third party login method and system of cloud operating system, third party login authentication module are added in cloud drive system client, and the third party login authentication module and the service of third party's account are connected;When needing to log in cloud operating system, cloud operating system described in third party's account service login is logged in.Technical solution user provided by the invention can synchronously operating system setting preference, save file can synchronize all data and preference in the operating system of another use invention to local storage space, using same account.
Description
Technical field
The present invention relates to a kind of cloud operating system login methods, and in particular to a kind of third party login side of cloud operating system
Method and system.
Background technology
Chromium OS are a cloud operating system for more meeting Internet era.In user level, by it is well-known,
Also it is that " the Google's browser " increased income coordinates various Internet services (SaaS) popular at present to provide the user with abundant work(
Energy.The core of the operating system design is that high in the clouds is transplanted in the operation that legacy operating system needs are completed in the machine, to realize
More light weight, more rapidly, safer, the characteristics of being easier to safeguard.Wherein, for operations such as the establishment of user account, verification, logins
It is a most basic function of operating system.This series function is accessed and interconnected as cloud operating system by Chromium OS
Net, and depth is bundled with the account number service of Google's offer.When user starts the operating system for the first time, it is necessary to register new paddy
Song account number is verified using existing Google's account number with the server that Google specifies, and the operation can be continuing with after
System.If because any reason can not access Google's service or be unwilling, using Google's account number, can not be continuing with the operation
System.
If you need to cast aside Google's service using Chromium OS operating systems, existing technical solution is by repairing by a small margin
Change the mechanism during activation of Chromium OS systems, open the function of entitled " guest mode " in advance." guest mode " is given tacit consent to
It is just automatically turned on after system activation.Only drawback is that by " guest mode " using the operating system, user was using
All data generated in journey can not be stored in the use preference of local, including but not limited to user, and the file of download accesses
Network address etc., these data can be automatically deleted after system cut-off.To avoid loss of data, if user is under " guest mode "
Using the system, cloud backup careful, and that data must be carried out before publishing is needed, is operated cumbersome.
Invention content
In view of the above shortcomings of the prior art, the present invention provides a kind of third party login method of cloud operating system and is
System is overcome in the prior art when user starts the operating system for the first time, it is necessary to register new Google's account number or using existing
Google's account number verified with the server that Google specifies, the operating system can be continuing with after.It is if because any
The defects of reason can not access Google's service or be unwilling using Google's account number, can not be continuing with the operating system.
The purpose of the present invention is what is realized using following technical proposals:
The present invention provides a kind of third party login method of cloud operating system, it is improved in that the method includes:
Third party login authentication module is added in cloud drive system client, and by the third party login authentication module
It services and connects with third party's account;
When needing to log in cloud operating system, cloud operating system described in third party's account service login is logged in.
Further, it is described third party login authentication module to be added in cloud drive system client, and by the third
Square login authentication module is connected with the service of third party's account, including:
When the module that cloud drive system client call processing user logs in, start cloud drive system;
The module that processing user logs in determines whether to start cloud drive system for the first time, and to starting cloud drive system for the first time
It is acted accordingly with non-initial start cloud drive system.
Further, when to start cloud drive system for the first time, then to client user's presentation, interface is welcome in startup for the first time;It cuts
Disconnected original flow with Google servers distribution of machine information, and guides client user to be attached with internet;
After user obtains internet connection, the module that processing user logs in adds new user circle to client user's presentation
Face, third party's account number service that client user's selection is and guided to be desirable for.
Further, when non-initial start system, the module that processing user logs in then is judged in system with the presence or absence of it
Preceding logged user information if so, login interface then is presented to client user, and guides and has logged in client user's input
Login password;
If nothing, addition new user interface is presented to user, third party's account that user's selection is and guided to be desirable for
Number service, until client user complete New Account establishment.
Further, after the client user inputs login password, user management module is monitored third party's account and is carried
User account legitimacy is verified for the return information of quotient, if legal, allows client user's login system;
The judgement user account legitimacy includes:User is in the page or module safeguarded by third party's account provider
Password is inputted, the verification of password is completed by third party;If password input by user meets the number of third party's account provider preservation
According to then third party's account provider can return to a correct signal to the user management module.
The present invention also provides a kind of third party login system of cloud operating system, it is improved in that the method packet
It includes:
Add module, for adding third party login authentication module in cloud drive system client, and by the third
Square login authentication module is connected with the service of third party's account;
Login module, for when needing to log in cloud operating system, logging in cloud described in third party's account service login
Operating system.
Further, the add module, including:
Promoter module, for when the cloud drive system client call handles the module that user logs in, starting cloud
Drive system;
Judging implementation sub-module, the module for handling user's login determines whether to start cloud drive system for the first time, and
It is acted accordingly to starting cloud drive system and non-initial start cloud drive system for the first time.
Further, the judgement implementation sub-module includes:
Judging unit, the module for handling user's login determine whether to start cloud drive system for the first time;
Execution unit, for being moved accordingly to starting cloud drive system and non-initial start cloud drive system for the first time
Make.
Further, the execution unit, including:
First performs subelement, for when being to start cloud drive system for the first time, then presenting to client user and starting for the first time
Welcome interface;Cut off it is original with Google servers distribution of machine information flow, and guide client user and internet into
Row connection;After user obtains internet connection, the module that processing user logs in adds new user circle to client user's presentation
Face, third party's account number service that client user's selection is and guided to be desirable for;
Second performs subelement, for when non-initial start system, the module that processing user logs in then to be judged in system
With the presence or absence of user information logged before, if so, login interface then is presented to client user, and guides and logged in client
End subscriber inputs login password;
If nothing, addition new user interface is presented to user, third party's account that user's selection is and guided to be desirable for
Number service, until client user complete New Account establishment.
Further, further include authentication unit, for the client user input login password after, user management mould
Block monitors the return information verification user account legitimacy of third party's account provider, if legal, client user is allowed to step on
Recording system;
The judgement user account legitimacy includes:User is in the page or module safeguarded by third party's account provider
Password is inputted, the verification of password is completed by third party;If password input by user meets the number of third party's account provider preservation
According to then third party's account provider can return to a correct signal to the user management module.
Compared with the immediate prior art, the advantageous effect that technical solution provided by the invention reaches is:
Compared to rising through " guest mode " using Chromium OS operating systems, the present invention can make user's real meaning
On the facility brought using the cloud operating system, including but not limited to:User can synchronously operating system setting preference, save file
All data and partially can be synchronized in the operating system of another use invention to local storage space, using same account
It is good.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart using Google's account number initial activation or login system;
Fig. 2 is the schematic diagram using Google's account number initial activation or login system;
Fig. 3 is the flow chart using third party's account number service login;
Fig. 4 is in Flint OS, uses the initial activation of third party's account number or the schematic diagram of login system;
The illustraton of model that Fig. 5 is FAIA to be followed with the communication of third party's account number service;
Fig. 6 is the flow chart of the third party login method of cloud operating system.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, technical scheme of the present invention will be carried out below
Detailed description.Obviously, described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Base
Embodiment in the present invention, those of ordinary skill in the art are obtained all under the premise of creative work is not made
Other embodiment belongs to the range that the present invention is protected.
Embodiment one,
The present invention provides a kind of third party login method of cloud operating system, and flow chart is as shown in fig. 6, the method packet
It includes:
S11, third party login authentication module is added in cloud drive system client, and the third party login is verified
Module is connected with the service of third party's account;
S12, when need log in cloud operating system when, log in cloud operating system described in third party's account service login.
Further, it is described third party login authentication module to be added in cloud drive system client, and by the third
Square login authentication module is connected with the service of third party's account, including:
When the module that cloud drive system client call processing user logs in, start cloud drive system;
The module that processing user logs in determines whether to start cloud drive system for the first time, and to starting cloud drive system for the first time
It is acted accordingly with non-initial start cloud drive system.
Further, when to start cloud drive system for the first time, then to client user's presentation, interface is welcome in startup for the first time;It cuts
Disconnected original flow with Google servers distribution of machine information, and guides client user to be attached with internet;
After user obtains internet connection, the module that processing user logs in adds new user circle to client user's presentation
Face, third party's account number service that client user's selection is and guided to be desirable for.
Further, when non-initial start system, the module that processing user logs in then is judged in system with the presence or absence of it
Preceding logged user information if so, login interface then is presented to client user, and guides and has logged in client user's input
Login password;
If nothing, addition new user interface is presented to user, third party's account that user's selection is and guided to be desirable for
Number service, until client user complete New Account establishment.
Further, after the client user inputs login password, the module that processing user logs in calls user's pipe
Password legitimacy described in managing module verification, if legal, allows client user's login system.
Verification legitimacy includes:It is to transfer third party's account provider to perform that whether judgement password is legal for the first time.Tool
It says to body, user is actually the input that password is completed in the page or module safeguarded by third party's account provider, pure
Essence is completed the verification of password by third party.If password input by user meets the data of third party's account provider preservation, the
Tripartite's account provider can return to the user management module that a correct signal is safeguarded to us.So our user management
Module only needs the return information for monitoring third party's account provider to can determine whether user account legitimacy.
The present invention also provides a kind of third party login system of cloud operating system, the method includes:
Add module, for adding third party login authentication module in cloud drive system client, and by the third
Square login authentication module is connected with the service of third party's account;
Login module, for when needing to log in cloud operating system, logging in cloud described in third party's account service login
Operating system.
Further, the add module, including:
Promoter module, for when the cloud drive system client call handles the module that user logs in, starting cloud
Drive system;
Judging implementation sub-module, the module for handling user's login determines whether to start cloud drive system for the first time, and
It is acted accordingly to starting cloud drive system and non-initial start cloud drive system for the first time.
Further, the judgement implementation sub-module includes:
Judging unit, the module for handling user's login determine whether to start cloud drive system for the first time;
Execution unit, for being moved accordingly to starting cloud drive system and non-initial start cloud drive system for the first time
Make.
Further, the execution unit, including:
First performs subelement, for when being to start cloud drive system for the first time, then presenting to client user and starting for the first time
Welcome interface;Cut off it is original with Google servers distribution of machine information flow, and guide client user and internet into
Row connection;After user obtains internet connection, the module that processing user logs in adds new user circle to client user's presentation
Face, third party's account number service that client user's selection is and guided to be desirable for;
Second performs subelement, for when non-initial start system, the module that processing user logs in then to be judged in system
With the presence or absence of user information logged before, if so, login interface then is presented to client user, and guides and logged in client
End subscriber inputs login password;
If nothing, addition new user interface is presented to user, third party's account that user's selection is and guided to be desirable for
Number service, until client user complete New Account establishment.
Further, authentication unit is further included, for after the client user inputs login password, processing user to step on
The module of record calls user management module to verify the password legitimacy, if legal, allows client user's login system.
Cloud operating system described above is using Google's operating system open source code exploitation version.
Embodiment two,
Explanation of technical terms:
Login:The module that processing reason user logs in;
GAIA:Google's account number authentication module;
FAIA:Third party's account number authentication module;
UserManager:User management manages module;
User:User object;
AccountId:User type identifies object.The effect of the object of user type identification in the accompanying drawings is that we are opening
While opening the login of third party's account type, user is still allowed for be logged in using Google's account, retains the usage experience of script;
User is allowed to create entirely local account, can also be used in the case where not networking.So system need to know it is listed
Class of subscriber, such as Google's accounting number users, wechat accounting number users, local accounting number users etc..User type identification object
Effect is just being available to the mark that operating system identifies user's login account classification.
1. in primary Chromium OS, Google's account number initial activation or 1 institute of flow below figure of login system are used
Show.
2. in primary Chromium OS, structure is managed and designed using the principle of Google's account number initial activation or login system
It makes as shown in Figure 2.
Flow describes:
Login process calls Login modules to initiate when Chromium OS start by system;
Login modules determine whether activation system for the first time, if activation system for the first time, then the service specified to Google
Device device initiates system information verification;
If activation system for the first time, Login modules, which then present to start for the first time to user, welcomes interface, and user is and guided to obtain
Obtain internet connection;
Obtain internet connection after, Login modules so to user present addition new user interface, and guide user defeated
Enter Google's account information;
After obtaining user login information, Login modules call GAIA modules, are responsible for and high in the clouds Google account by GAIA modules
Number communication for service simultaneously verifies account number legitimacy;
If account is legal, Login modules call UserManager modules, create new User objects, and assign
Type identification codes of the AccountId as the user is given, finally allows logging in system by user;
If not activation system for the first time, Login modules then judge user information logged with the presence or absence of before in system,
If so, login interface then is presented to user, logged-in user is and guided to input login password;
After obtaining user password, Login modules call the UserManager module verifications password legitimacy, if legal,
Then allow logging in system by user
If not activation system for the first time, Login modules then judge user information logged with the presence or absence of before in system,
If nothing, addition new user interface is presented to user, user is and guided to input Google's account information, and repeat the above steps
Until user completes the establishment of New Account
3. in Flint OS, the flow using third party's account number service login is as shown in Figure 3.
4. in Flint OS, the initial activation of third party's account number or the principle of login system and design construction below figure are used
Shown in 4:
Flow describes:
Login process calls Login modules to initiate when Flint OS start by system
Login modules determine whether activation system for the first time, if activation system for the first time, then present to user and open for the first time
It is dynamic to welcome interface;Cut off original and Google servers distribution of machine information flow;
If activation system for the first time, user is instructed to obtain internet connection;
Obtain internet connection after, Login modules so to user present addition new user interface, user is and guided to select
Select the third party's account number service (such as wechat, the easy account number of Netease, Sina weibo etc.) being desirable for;
After obtaining third party's account number service that user specifies, Login modules call FAIA modules, are born by FAIA modules
The third party's account number service verification user information legitimacy blamed and specified;
If account is legal, Login modules call UserManager modules, create new User objects, and assign
Type identification codes of the AccountId as the user is given, finally allows logging in system by user;
If not activation system for the first time, Login modules then judge user information logged with the presence or absence of before in system,
If so, login interface then is presented to user, logged-in user is and guided to input login password;
After obtaining user password, Login modules call the UserManager module verifications password legitimacy, if legal,
Then allow logging in system by user
If not activation system for the first time, Login modules then judge user information logged with the presence or absence of before in system,
If nothing, addition new user interface is presented to user, and guides third party's account number service that user's selection is desirable for (such as
Wechat, Netease's account number, Sina weibo etc.), and repeat the above steps until user completes the establishment of New Account.
5. wherein, the communication of FAIA and third party's account number service is followed with drag, as shown in Figure 5.
6. particular technique embodiment:
A. object is extended:AccountId
>Add in AccountType:FLINT_ACCOUNT
B. object is extended:User
>Add in UserType:USER_TYPE_FLINT
C. object is extended:UserManager
D. object is extended:SignIn
>Signin_switches objects are extended, are added in " flint-account-support "
E. object OobeScreen objects are extended, are added in " SCREEN_FLINT_SIGNIN "
F. FAIA objects are established, for logging in and user information update.
The dependence that technical solution provided by the invention services Google by removing original Chromium OS so that modification
The Chromium OS crossed freer can easily be used in CONTINENTAL AREA OF CHINA
Technical solution provided by the invention is used as connection control with third party's account number service by adding new module (FAIA)
Device processed so that Chromium OS systems can pass through third party's account number service login this system.
Technical solution provided by the invention is by extending original module so that Chromium OS systems, which can be compatible with, to be passed through
The user of third party's account number establishment simultaneously allows it to enjoy with experience is similarly used using Google's account number login system.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in change or replacement, should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (10)
- A kind of 1. third party login method of cloud operating system, which is characterized in that the method includes:Add third party login authentication module in cloud drive system client, and by the third party login authentication module and the The service connection of tripartite's account;When needing to log in cloud operating system, cloud operating system described in third party's account service login is logged in.
- 2. third party login method as described in claim 1, which is characterized in that described to be added in cloud drive system client Third party login authentication module, and the third party login authentication module and the service of third party's account are connected, including:When the module that cloud drive system client call processing user logs in, start cloud drive system;The module that processing user logs in determines whether to start cloud drive system for the first time, and to starting cloud drive system and non-for the first time Start cloud drive system for the first time to be acted accordingly.
- 3. third party login method as claimed in claim 2, which is characterized in that when to start cloud drive system for the first time, then to Client user, which presents to start for the first time, welcomes interface;Original and Google servers distribution of machine information flow is cut off, and is referred to Client user is led to be attached with internet;After user obtains internet connection, addition new user interface is presented to client user in the module that processing user logs in, Third party's account number service that client user's selection is and guided to be desirable for.
- 4. third party login method as claimed in claim 2, which is characterized in that when non-initial start system, handle user The module of login then judges user information logged with the presence or absence of before in system, is stepped on if so, then being presented to client user Interface is recorded, and guides and has logged in client user's input login password;If nothing, addition new user interface is presented to user, third party's account number clothes that user's selection is and guided to be desirable for Business, until client user completes the establishment of New Account.
- 5. third party login method as claimed in claim 4, which is characterized in that input login password in the client user Afterwards, user management module monitors the return information verification user account legitimacy of third party's account provider, if legal, allows Client user's login system;The judgement user account legitimacy includes:User inputs in the page or module safeguarded by third party's account provider Password is completed the verification of password by third party;If password input by user meets the data of third party's account provider preservation, Third party's account provider can return to a correct signal to the user management module.
- 6. a kind of third party login system of cloud operating system, which is characterized in that the method includes:Add module for adding third party login authentication module in cloud drive system client, and the third party is stepped on Authentication module is recorded to connect with the service of third party's account;Login module operates for when needing to log in cloud operating system, logging in cloud described in third party's account service login System.
- 7. third party login system as claimed in claim 6, which is characterized in that the add module, including:Promoter module, for when the cloud drive system client call handles the module that user logs in, starting cloud driving System;Judge implementation sub-module, the module for handling user's login determines whether to start cloud drive system for the first time, and to head Secondary startup cloud drive system and non-initial start cloud drive system are acted accordingly.
- 8. third party login system as claimed in claim 7, which is characterized in that the judgement implementation sub-module includes:Judging unit, the module for handling user's login determine whether to start cloud drive system for the first time;Execution unit, for being acted accordingly to starting cloud drive system and non-initial start cloud drive system for the first time.
- 9. third party login system as claimed in claim 8, which is characterized in that the execution unit, including:First performs subelement, is welcome for when being to start cloud drive system for the first time, then presenting to start for the first time to client user Interface;Original and Google servers distribution of machine information flow is cut off, client user is and guided to be connected with internet It connects;After user obtains internet connection, addition new user interface is presented to client user in the module that processing user logs in, and Third party's account number service that client user's selection is instructed to be desirable for;Second performs subelement, for the module that when non-initial start system, processing user logs in then judge in system whether In the presence of user information logged before, if so, login interface then is presented to client user, and guides and logged in client use Family inputs login password;If nothing, addition new user interface is presented to user, third party's account number clothes that user's selection is and guided to be desirable for Business, until client user completes the establishment of New Account.
- 10. third party login system as claimed in claim 9, which is characterized in that authentication unit is further included, in the visitor After the end subscriber input login password of family, user management module monitors the return information verification user account of third party's account provider Legitimacy if legal, allows client user's login system;The judgement user account legitimacy includes:User inputs in the page or module safeguarded by third party's account provider Password is completed the verification of password by third party;If password input by user meets the data of third party's account provider preservation, Third party's account provider can return to a correct signal to the user management module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711390928.5A CN108134788B (en) | 2017-12-20 | 2017-12-20 | Third party login method and system of cloud operating system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711390928.5A CN108134788B (en) | 2017-12-20 | 2017-12-20 | Third party login method and system of cloud operating system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108134788A true CN108134788A (en) | 2018-06-08 |
CN108134788B CN108134788B (en) | 2021-02-26 |
Family
ID=62391030
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711390928.5A Active CN108134788B (en) | 2017-12-20 | 2017-12-20 | Third party login method and system of cloud operating system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108134788B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109819020A (en) * | 2019-01-03 | 2019-05-28 | 福建天泉教育科技有限公司 | Third-party platform based on configurationization logs in interconnection method, storage medium |
CN113111328A (en) * | 2021-04-30 | 2021-07-13 | Tcl通讯(宁波)有限公司 | User identity authentication method, system, terminal and computer readable storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179164A (en) * | 2011-12-23 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal of storing page information |
CN103530547A (en) * | 2012-07-02 | 2014-01-22 | 爱思爱(天津)高科技有限公司 | Method for logging into third-party application program through integrated authentication function based on Windows operating system |
CN103686225A (en) * | 2012-08-31 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Remote control method, client side and server side |
CN103856446A (en) * | 2012-11-30 | 2014-06-11 | 腾讯科技(深圳)有限公司 | Login method and device, and open platform system |
CN104348612A (en) * | 2013-07-23 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Third-party website login method based on mobile terminal and mobile terminal |
CN104348777A (en) * | 2013-07-24 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Method and system for controlling access of mobile terminal to third party server |
CN104486318A (en) * | 2014-12-08 | 2015-04-01 | 西安电子科技大学 | Identity authentication method for single sign-on in Android operating system |
CN105553972A (en) * | 2015-12-14 | 2016-05-04 | 苏州天平先进数字科技有限公司 | Method of using third-party account to log in to screen locking APP community |
US20160337340A1 (en) * | 2014-12-01 | 2016-11-17 | Intermedia.Net, Inc. | Native application single sign-on |
US20170109380A1 (en) * | 2015-10-16 | 2017-04-20 | Microsoft Technology Licensing, Llc | Telemetry request system |
-
2017
- 2017-12-20 CN CN201711390928.5A patent/CN108134788B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179164A (en) * | 2011-12-23 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal of storing page information |
CN103530547A (en) * | 2012-07-02 | 2014-01-22 | 爱思爱(天津)高科技有限公司 | Method for logging into third-party application program through integrated authentication function based on Windows operating system |
CN103686225A (en) * | 2012-08-31 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Remote control method, client side and server side |
CN103856446A (en) * | 2012-11-30 | 2014-06-11 | 腾讯科技(深圳)有限公司 | Login method and device, and open platform system |
CN104348612A (en) * | 2013-07-23 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Third-party website login method based on mobile terminal and mobile terminal |
CN104348777A (en) * | 2013-07-24 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Method and system for controlling access of mobile terminal to third party server |
US20160337340A1 (en) * | 2014-12-01 | 2016-11-17 | Intermedia.Net, Inc. | Native application single sign-on |
CN104486318A (en) * | 2014-12-08 | 2015-04-01 | 西安电子科技大学 | Identity authentication method for single sign-on in Android operating system |
US20170109380A1 (en) * | 2015-10-16 | 2017-04-20 | Microsoft Technology Licensing, Llc | Telemetry request system |
CN105553972A (en) * | 2015-12-14 | 2016-05-04 | 苏州天平先进数字科技有限公司 | Method of using third-party account to log in to screen locking APP community |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109819020A (en) * | 2019-01-03 | 2019-05-28 | 福建天泉教育科技有限公司 | Third-party platform based on configurationization logs in interconnection method, storage medium |
CN109819020B (en) * | 2019-01-03 | 2021-09-07 | 福建天泉教育科技有限公司 | Third-party platform login and docking method based on configuration and storage medium |
CN113111328A (en) * | 2021-04-30 | 2021-07-13 | Tcl通讯(宁波)有限公司 | User identity authentication method, system, terminal and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108134788B (en) | 2021-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103607385B (en) | Method and apparatus for security detection based on browser | |
CN103955405B (en) | A kind of application management method and its device | |
WO2019232825A1 (en) | Information customization transmission method, device, computer device and storage medium | |
WO2017084290A1 (en) | Public account two-dimensional code generation method and server, and public account following method, server and terminal | |
US20230403307A1 (en) | Secure network device management in a telecommunications network | |
CN102932341B (en) | A kind of cipher processing method, device and equipment | |
CN104869099A (en) | Multi-network-account login method and system based on fingerprint account | |
CN107147647A (en) | A kind of webpage authorization method and device | |
CN104935558A (en) | Network user rapid registration and login method and system | |
CN109981664A (en) | Website logging method, device and the realization device of page end | |
CN111539775B (en) | Application management method and device | |
CN110213113B (en) | WEB configuration management method of base station and base station | |
CN105959276A (en) | Application control method, device, and terminal device based on third party account login | |
CN108134788A (en) | A kind of third party login method and system of cloud operating system | |
CN106161475A (en) | The implementation method of subscription authentication and device | |
CN102347964B (en) | Log in the method for website, system, information aggregation platform and website | |
CN113271299B (en) | Login method and server | |
CN109714345A (en) | A kind of character fort machine method and system of user's unaware | |
CN106582013B (en) | Game service system, method and device for updating data to online game | |
CN104750463A (en) | A plug-in developing method and system | |
CN105184559B (en) | A kind of payment system and method | |
CN106789930A (en) | A kind of single-point logging method of (SuSE) Linux OS | |
CN109714208A (en) | A kind of equipment is included in method, storage medium and the electronic equipment of network management | |
CN106339623A (en) | Login method and login device | |
CN110427310B (en) | Script log processing method and device and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |