×

Systems and methods for login and authorization

  • US 10,462,118 B2
  • Filed: 12/18/2017
  • Issued: 10/29/2019
  • Est. Priority Date: 06/25/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for login and authorization, the method comprising:

  • receiving, at a third-party terminal executing a first third-party application, a login request from a user;

    in response to the login request, sending an authorization request from the third-party terminal to a network server to trigger the network server to generate first two-dimensional-barcode information, wherein the authorization request includes authorization parameters to be validated by the network server, and the authorization parameters include an application identifier, authorization scope information indicating allowed types of operations associated with a user account to be performed after a third-party server corresponding to the first third-party application receives validation from the network server, an application callback address indicating an address at which the third-party terminal receives login state information, anti-disguise information and an application key;

    generating, by the network server, the first two-dimensional-barcode information according to the authorization request;

    sending the first two-dimensional-barcode information to the third-party terminal;

    displaying, at the third-party terminal, a first two-dimensional-barcode image;

    extracting, by a mobile terminal, the first two-dimensional-barcode information from the first two-dimensional-barcode image;

    sending, by the mobile terminal, first user account information and the first two-dimensional-barcode information to the network server;

    validating, by the network server, the first user account information and the first two-dimensional-barcode information based on at least information associated with stored second user account information and second two-dimensional-barcode information generated by the network server;

    in response to the first user account information and the first two-dimensional-barcode information being validated, sending, by the network server, an authorization and a predetermined user identifier to the third-party server;

    setting, by the third-party server, the user account associated with the user identifier to a logged-in state;

    acquiring, by the third-party terminal, information related to the logged-in state from the third-party server; and

    setting an interface of the first third-party application to a user-logged-in state.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×