WEBSITE LOGIN METHOD AND APPARATUS
First Claim
1. A computer-implemented method, comprising:
- identifying, using a web browser presenting a first website, a website jump trigger indication to jump from the first web site to a second web site;
in response to identifying the website jump trigger, obtaining a first token from a cookie store of the web browser, the first token associated with a website identifier of the second website and a device fingerprint indicating a running environment at a time when the password-free proxy login was previously set;
in response to determining that a current running environment corresponds to the running environment indicated by the device fingerprint, obtaining a second token corresponding to the first token, wherein the second token comprises an access token indicating that the second web site grants password-free login permissions;
sending, via the web browser, a password-free login request to the second website, the request comprising a third token corresponding to the website identifier of the second website, where the third token includes the second token; and
in response to the second website verifying the second token, logging into the second website without a password.
3 Assignments
0 Petitions
Accused Products
Abstract
The present application provides example website login methods and apparatuses. One example method includes identifying a website jump trigger indication to jump from a first website to a second website. A first token is then obtained from a cookie store of the web browser, the first token associated with a website identifier of the second website and a device fingerprint indicating a running environment at a time when the password-free proxy login was previously set. In response to determining that a current running environment corresponds to the device fingerprint, a second token corresponding to the first token is obtained, wherein the second token comprises an access token indicating that the second website grants password-free login permissions. A password-free login request is sent to the second website including the second token. In response to the second website verifying the second token, the second website is logged into without a password.
13 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
identifying, using a web browser presenting a first website, a website jump trigger indication to jump from the first web site to a second web site; in response to identifying the website jump trigger, obtaining a first token from a cookie store of the web browser, the first token associated with a website identifier of the second website and a device fingerprint indicating a running environment at a time when the password-free proxy login was previously set; in response to determining that a current running environment corresponds to the running environment indicated by the device fingerprint, obtaining a second token corresponding to the first token, wherein the second token comprises an access token indicating that the second web site grants password-free login permissions; sending, via the web browser, a password-free login request to the second website, the request comprising a third token corresponding to the website identifier of the second website, where the third token includes the second token; and in response to the second website verifying the second token, logging into the second website without a password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
identifying, using a web browser presenting a first website, a website jump trigger indication to jump from the first web site to a second web site; in response to identifying the website jump trigger, obtaining a first token from a cookie store of the web browser, the first token associated with a website identifier of the second website and a device fingerprint indicating a running environment at a time when the password-free proxy login was previously set; in response to determining that a current running environment corresponds to the running environment indicated by the device fingerprint, obtaining a second token corresponding to the first token, wherein the second token comprises an access token indicating that the second web site grants password-free login permissions; sending, via the web browser, a password-free login request to the second website, the request comprising a third token corresponding to the website identifier of the second website, where the third token includes the second token; and in response to the second website verifying the second token, logging into the second website without a password. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-implemented system, comprising:
-
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising; identifying, using a web browser presenting a first web site, a web site jump trigger indication to jump from the first web site to a second web site; in response to identifying the website jump trigger, obtaining a first token from a cookie store of the web browser, the first token associated with a website identifier of the second website and a device fingerprint indicating a running environment at a time when the password-free proxy login was previously set; in response to determining that a current running environment corresponds to the running environment indicated by the device fingerprint, obtaining a second token corresponding to the first token, wherein the second token comprises an access token indicating that the second website grants password-free login permissions; sending, via the web browser, a password-free login request to the second website, the request comprising a third token corresponding to the website identifier of the second website, where the third token includes the second token; and in response to the second website verifying the second token, logging into the second website without a password. - View Dependent Claims (20)
-
Specification