SYSTEMS AND METHODS FOR LOGIN AND AUTHORIZATION
First Claim
1. A method for login and authorization, the method comprising:
- receiving, at a third-party terminal, a login request from a user;
sending an authorization request from the third-party terminal to a network server;
generating, by the network server, first two-dimensional-barcode information;
sending the first two-dimensional-barcode information to the third-party terminal;
displaying, at the third-party terminal, a first two-dimensional-barcode image;
extracting, by a mobile terminal, the first two-dimensional-barcode information from the first two-dimensional-barcode image;
sending first user account information and the first two-dimensional-barcode information to the network server;
validating, by the network server, the first user account information and the first two-dimensional-barcode information based on at least information associated with stored second user account information and second two-dimensional-barcode information generated by the network server;
in response to the first user account information and the first two-dimensional-barcode information being validated, sending, by the network server, an authorization and a predetermined user identifier to a third-party server;
setting, by the third-party server, a user account associated with the user identifier to a logged-in state;
acquiring, by the third-party terminal, information related to the logged-in state from the third-party server; and
setting an interface of a first third-party application to a user-logged-in state.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for login and authorization. For example, a third-party terminal receives a login request from a user and sends an authorization request from the third-party terminal to a network server; the network server generates first two-dimensional-barcode information and sends the first two-dimensional-barcode information to the third-party terminal; the third-party terminal displays a first two-dimensional-barcode image; a mobile terminal extracts the first two-dimensional-barcode information from the first two-dimensional-barcode image and sends first user account information and the first two-dimensional-barcode information to the network server; the network server validates the first user account information and the first two-dimensional-barcode information based on at least information associated with stored second user account information and second two-dimensional-barcode information generated by the network server.
-
Citations
38 Claims
-
1. A method for login and authorization, the method comprising:
-
receiving, at a third-party terminal, a login request from a user; sending an authorization request from the third-party terminal to a network server; generating, by the network server, first two-dimensional-barcode information; sending the first two-dimensional-barcode information to the third-party terminal; displaying, at the third-party terminal, a first two-dimensional-barcode image; extracting, by a mobile terminal, the first two-dimensional-barcode information from the first two-dimensional-barcode image; sending first user account information and the first two-dimensional-barcode information to the network server; validating, by the network server, the first user account information and the first two-dimensional-barcode information based on at least information associated with stored second user account information and second two-dimensional-barcode information generated by the network server; in response to the first user account information and the first two-dimensional-barcode information being validated, sending, by the network server, an authorization and a predetermined user identifier to a third-party server; setting, by the third-party server, a user account associated with the user identifier to a logged-in state; acquiring, by the third-party terminal, information related to the logged-in state from the third-party server; and setting an interface of a first third-party application to a user-logged-in state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11-22. -22. (canceled)
-
23. A third-party terminal comprising:
-
a login-request-receiving unit configured to receive a login request from a user; a login-request-sending unit configured to send an authorization request to a network server; a two-dimensional-barcode-information-receiving unit configured to receive two-dimensional-barcode information from the network server; a display unit configured to display a two-dimensional-barcode image; a login-information-receiving unit configured to receive information related to a logged-in state of a user account from a third-party server; a control unit configured to set an interface of a third-party application to a user-logged-in state based on at least information associated with the information related to the logged-in state of the user account; wherein the third-party server sets the user account to the logged-in state and sends the information related to the logged-in state of the user account after the network server validates user account information sent from a mobile terminal and the two-dimensional-barcode information extracted from the first two-dimensional-barcode image. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29-36. -36. (canceled)
-
37. A non-transitory computer readable storage medium comprising programming instructions for login, the programming instructions configured to cause one or more data processors to execute operations comprising:
-
receiving a login request from a user; sending an authorization request to a network server; receiving two-dimensional-barcode information from the network server; displaying a two-dimensional-barcode image; acquiring information related to a logged-in state of a user account from a third-party server; and setting an interface of a third-party application to a user-logged-in state; wherein the third-party server sets the user account to the logged-in state and sends the information related to the logged-in state of the user account after the network server validates user account information sent from a mobile terminal and the two-dimensional-barcode information extracted from the first two-dimensional-barcode image.
-
-
38. A non-transitory computer readable storage medium comprising programming instructions for authorization, the programming instructions configured to cause one or more data processors to execute operations comprising:
-
receiving an authorization request from a third-party terminal; generating first two-dimensional-barcode information; sending the first two-dimensional-barcode information to the third-party terminal so that the third-party terminal displays a first two-dimensional-barcode image; validating user account information and the first two-dimensional-barcode information sent from a mobile terminal based on at least information associated with stored user account information and second two-dimensional-barcode information, wherein the first two-dimensional-barcode information sent from the mobile terminal is extracted by the mobile terminal from the first two-dimensional-barcode image displayed on the third-party terminal; and in response to the user account information and the first two-dimensional-barcode information being validated, sending an authorization and a predetermined user identifier to the third-party server.
-
Specification