Systems and methods for login and authorization
First Claim
1. A method for login and authorization, the method comprising:
- receiving, at a third-party terminal executing a first third-party application, a login request from a user;
in response to the login request, sending an authorization request from the third-party terminal to a network server to trigger the network server to generate first two-dimensional-barcode information, wherein the authorization request includes authorization parameters to be validated by the network server, and the authorization parameters include an application identifier, authorization scope information indicating allowed types of operations associated with a user account to be performed after a third-party server corresponding to the first third-party application receives validation from the network server, an application callback address indicating an address at which the third-party terminal receives login state information, anti-disguise information and an application key;
generating, by the network server, the first two-dimensional-barcode information according to the authorization request;
sending the first two-dimensional-barcode information to the third-party terminal;
displaying, at the third-party terminal, a first two-dimensional-barcode image;
extracting, by a mobile terminal, the first two-dimensional-barcode information from the first two-dimensional-barcode image;
sending, by the mobile terminal, first user account information and the first two-dimensional-barcode information to the network server;
validating, by the network server, the first user account information and the first two-dimensional-barcode information based on at least information associated with stored second user account information and second two-dimensional-barcode information generated by the network server;
in response to the first user account information and the first two-dimensional-barcode information being validated, sending, by the network server, an authorization and a predetermined user identifier to the third-party server;
setting, by the third-party server, the user account associated with the user identifier to a logged-in state;
acquiring, by the third-party terminal, information related to the logged-in state from the third-party server; and
setting an interface of the first third-party application to a user-logged-in state.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for login and authorization. For example, a third-party terminal receives a login request from a user and sends an authorization request from the third-party terminal to a network server; the network server generates first two-dimensional-barcode information and sends the first two-dimensional-barcode information to the third-party terminal; the third-party terminal displays a first two-dimensional-barcode image; a mobile terminal extracts the first two-dimensional-barcode information from the first two-dimensional-barcode image and sends first user account information and the first two-dimensional-barcode information to the network server; the network server validates the first user account information and the first two-dimensional-barcode information based on at least information associated with stored second user account information and second two-dimensional-barcode information generated by the network server.
10 Citations
21 Claims
-
1. A method for login and authorization, the method comprising:
-
receiving, at a third-party terminal executing a first third-party application, a login request from a user; in response to the login request, sending an authorization request from the third-party terminal to a network server to trigger the network server to generate first two-dimensional-barcode information, wherein the authorization request includes authorization parameters to be validated by the network server, and the authorization parameters include an application identifier, authorization scope information indicating allowed types of operations associated with a user account to be performed after a third-party server corresponding to the first third-party application receives validation from the network server, an application callback address indicating an address at which the third-party terminal receives login state information, anti-disguise information and an application key; generating, by the network server, the first two-dimensional-barcode information according to the authorization request; sending the first two-dimensional-barcode information to the third-party terminal; displaying, at the third-party terminal, a first two-dimensional-barcode image; extracting, by a mobile terminal, the first two-dimensional-barcode information from the first two-dimensional-barcode image; sending, by the mobile terminal, first user account information and the first two-dimensional-barcode information to the network server; validating, by the network server, the first user account information and the first two-dimensional-barcode information based on at least information associated with stored second user account information and second two-dimensional-barcode information generated by the network server; in response to the first user account information and the first two-dimensional-barcode information being validated, sending, by the network server, an authorization and a predetermined user identifier to the third-party server; setting, by the third-party server, the user account associated with the user identifier to a logged-in state; acquiring, by the third-party terminal, information related to the logged-in state from the third-party server; and setting an interface of the first third-party application to a user-logged-in state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A third-party terminal comprising:
-
a computer-readable storage medium; and one or more data processors configured to; receive, at a third-party application, a login request from a user; in response to the login request, send an authorization request to a network server to trigger the network server to generate first two-dimensional-barcode information, wherein the authorization request includes authorization parameters to be validated by the network server, and the authorization parameters include an application identifier, authorization scope information indicating allowed types of operations associated with a user account to be performed after a third-party server corresponding to the third-party application receives validation from the network server, an application callback address indicating an address at which the third-party terminal receives login state information, anti-disguise information and an application key; receive the two-dimensional-barcode information from the network server according to the authorization request; display a two-dimensional-barcode image; receive information related to a logged-in state of the user account from the third-party server; set an interface of a third-party application to a user-logged-in state based on at least information associated with the information related to the logged-in state of the user account; wherein the third-party server sets the user account to the logged-in state and sends the information related to the logged-in state of the user account after the network server validates user account information sent from a mobile terminal and the two-dimensional-barcode information extracted from the first two-dimensional-barcode image. - View Dependent Claims (13, 14)
-
-
15. A non-transitory computer readable storage medium comprising programming instructions for login, the programming instructions configured to cause one or more data processors to execute operations comprising:
-
receiving, at a third-party application, a login request from a user; in response to the login request, sending an authorization request to a network server to trigger the network server to generate first two-dimensional-barcode information, wherein the authorization request includes authorization parameters to be validated by the network server, and the authorization parameters include an application identifier, authorization scope information indicating allowed types of operations associated with a user account to be performed after a third-party server corresponding to the third-party application receives validation from the network server, an application callback address indicating an address at which the third-party terminal receives login state information, anti-disguise information and an application key; receiving the two-dimensional-barcode information from the network server, the two-dimensional-barcode information being generated by the network server according to the authorization request; displaying a two-dimensional-barcode image; acquiring information related to a logged-in state of the user account from the third-party server; and setting an interface of the third-party application to a user-logged-in state; wherein the third-party server sets the user account to the logged-in state and sends the information related to the logged-in state of the user account after the network server validates user account information sent from a mobile terminal and the two-dimensional-barcode information extracted from the first two-dimensional-barcode image. - View Dependent Claims (16, 17)
-
-
18. A non-transitory computer readable storage medium comprising programming instructions for authorization, the programming instructions configured to cause one or more data processors to execute operations comprising:
-
receiving an authorization request from a third-party terminal executing a first third-party application, to trigger the one or more data processors to generate first two-dimensional-barcode information, wherein the authorization request includes authorization parameters to be validated by the network server, and the authorization parameters include an application identifier, authorization scope information indicating allowed types of operations associated with a user account to be performed after a third-party server corresponding to the first third-party application receives validation from the network server, an application callback address indicating an address at which the third-party terminal receives login state information, anti-disguise information and an application key; generating the first two-dimensional-barcode information according to the authorization request; sending the first two-dimensional-barcode information to the third-party terminal so that the third-party terminal displays a first two-dimensional-barcode image; validating first user account information and the first two-dimensional-barcode information sent from a mobile terminal based on at least information associated with stored second user account information and second two-dimensional-barcode information, wherein the first two-dimensional-barcode information sent from the mobile terminal is extracted by the mobile terminal from the first two-dimensional-barcode image displayed on the third-party terminal; and in response to the first user account information and the first two-dimensional-barcode information being validated, sending an authorization and a predetermined user identifier to the third-party server. - View Dependent Claims (19, 20, 21)
-
Specification