Wearable device based authorization method, device and system
A wearable device and subsystem technology, applied in the field of communication, can solve problems such as malware theft and identity theft, and achieve the effects of improving security, flexible use, and not easy to lose.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] see figure 1 , the embodiment of the present invention provides a wearable device-based authorization method, including the following steps:
[0031] Step 101: the wearable device is connected to the system running the authorization method;
[0032] Step 102: The system running the authorization method receives and parses the authorization request sent by the third-party application;
[0033] Step 103: Generate a corresponding unique feature code according to the third-party application session request, and send the feature code to the wearable device;
[0034] Step 104: Receive an authorization message generated and sent by the wearable device according to the unique feature code, and authorize the third-party application.
[0035] Further, see figure 2 , in step 101, the wearable device 201 is directly or indirectly connected to the authorization server 202 running the authorization method, including:
[0036] The wearable device 201 can be connected to the Inter...
Embodiment 2
[0049] see image 3 , an embodiment of the present invention is an authorization device 301 based on a wearable device, the device includes:
[0050] The input and output module 311 receives the authorization request of the third-party application, and receives the user identification code submitted by the user;
[0051] The processing module 312 is configured to generate a unique feature code corresponding to the third-party application session after receiving the authorization request of the third-party application and the user identification code, and distribute the feature code to the wearable device bound to the user identification code;
[0052] The authorization module 313 is configured to receive an authorization message sent by the wearable device according to the feature code, and determine whether to authorize the third-party application session according to the authorization message.
[0053] Further, the input and output module 311 includes:
[0054] The wearabl...
Embodiment 3
[0063] join Figure 4 , the embodiment of the present invention provides an authorization system based on a wearable device, the system includes: an authorization subsystem 401 , a third-party application subsystem 402 and a wearable device subsystem 403 .
[0064] Wherein, the authorization subsystem 401 includes:
[0065] The input and output module 411 receives the authorization request of the third-party application, and receives the user identification code submitted by the user;
[0066] The processing module 412 is configured to generate a unique feature code corresponding to the session of the third-party application after receiving the authorization request of the third-party application and the user identification code, and distribute the feature code to the wearable device bound to the user identification code;
[0067] The authorization module 413 is configured to receive an authorization message sent by the wearable device according to the feature code, and deter...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 