Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager

A mobile communication device, temporary authorization technology, applied in the direction of user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of rigid authorization content, long waiting time, user inconvenience, etc., to reduce temporary authorization time, reduce waiting time, the effect of reducing workload

Inactive Publication Date: 2013-11-20
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can guarantee security, there are still some problems: First, the operation is cumbersome, which brings a lot of inconvenience to the user. Authorization content, etc.), the authorizing party cannot directly send authorization information to the authorized party, and needs to wait for the authorized party to send a request to the management party, and then the management party will send an inquiry. At this time, the authorization can be confirmed. For the management party, other The steps that need to be performed include receiving the request from the authorized party, sending an inquiry to the authorizing party, receiving the reply from the authorizing party, and responding to the request from the authorized party according to the reply, which is generally extremely cumbersome
Secondly, the content of the authorization is relatively rigid. The authorized party needs to send a request to the management party and wait for the authorizing party to authorize each time the authorization is used. That is, one authorization can only be used by the authorized party once. If the authorized party is in urgent need of temporary permissions, it will cause more trouble, and because of the relatively long waiting time during each use of the authorized party's permissions, both the authorized party and the authorizing party may have unexpected Things cannot be operated manually, resulting in temporary authorization failure
Again, since every operation must go through the management side, this puts a huge load on the management side’s server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0041] Such as figure 1 As shown, a specific embodiment of a temporary authorization method for a mobile communication device in the present invention includes:

[0042] Step A: The authorized party sends the authorization request information including the authorized party identification code to the authorizing party;

[0043] Step B: The authorizing party associates the temporary authorization information, the authorizing party identification code and the authorized party identification code, encrypts and generates a temporary authorization code, and then sends the temporary authorization code to the authorized party;

[0044] Step C: The authorized party verifies and decodes the temporary authorization code according to the pre-stored authorizing party identification code and authorized party identification code to obtain the temporary authorization information;

[0045] Step D: The authorizing party sends receipt confirmation information after successfully obtaining the te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of permission use of mobile communication equipment, in particular to a temporary authentication method of mobile communication equipment. The method comprises the following steps that the authenticating party generates temporary authentication information and performs information confirmation between the authenticating party and the authenticated party by adopting an encryption communication way; the authenticating party automatically transmits authentication information to the manager after the authenticating party and the authenticated party confirm the information; and the manager records and confers the temporary permission of the authenticated party. Due to the adoption of the authentication method, the authentication safety can be ensured, the manager is not required to perform each operation, convenience is brought to the operation, the temporary authentication time is shortened effectively, and the authentication contents can be adjusted flexibly. According to the method, a functional module framework is established, and a computer system is controlled to complete operation via computer program instructions. Moreover, the invention further provides specific methods based on the authenticating party, the authenticated party and the manager respectively for the method.

Description

technical field [0001] The present invention relates to the technical field of use of mobile communication device rights, in particular to a temporary authorization method for mobile communication devices and specific methods based on an authorizing party, an authorized party and a managing party respectively. The method is accomplished by establishing a functional module framework and controlling the computer system by computer program instructions. Background technique [0002] With the popularization of mobile communication devices and the improvement of related technologies, the functions of mobile communication devices are becoming more and more powerful, almost becoming an indispensable part of people's lives. In many applications of mobile communication devices, a permission issue is also involved, such as the field of mobile instant payment, mobile phone access control system, etc. Account) binding, so that mobile devices have certain payment, access and other permi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 岳闯侯位移
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products