Unlock instant, AI-driven research and patent intelligence for your innovation.

Wearable device based authorization method, device and system

A wearable device and subsystem technology, applied in the field of communication, can solve problems such as malware theft and identity theft, and achieve the effects of improving security, flexible use, and not easy to lose.

Inactive Publication Date: 2014-01-22
祝贺
View PDF2 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional unified identity authentication and authorization service needs to enter the user name and password during use, and there is a risk of being stolen by malicious software.
The latest unified identity authentication technology put into use is usually bound to the user's smart mobile phone. Although it simplifies the operation of entering the user name and password to a certain extent, once the mobile phone used for identity authentication is lost, there is a risk of identity theft.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wearable device based authorization method, device and system
  • Wearable device based authorization method, device and system
  • Wearable device based authorization method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] see figure 1 , the embodiment of the present invention provides a wearable device-based authorization method, including the following steps:

[0031] Step 101: the wearable device is connected to the system running the authorization method;

[0032] Step 102: The system running the authorization method receives and parses the authorization request sent by the third-party application;

[0033] Step 103: Generate a corresponding unique feature code according to the third-party application session request, and send the feature code to the wearable device;

[0034] Step 104: Receive an authorization message generated and sent by the wearable device according to the unique feature code, and authorize the third-party application.

[0035] Further, see figure 2 , in step 101, the wearable device 201 is directly or indirectly connected to the authorization server 202 running the authorization method, including:

[0036] The wearable device 201 can be connected to the Inter...

Embodiment 2

[0049] see image 3 , an embodiment of the present invention is an authorization device 301 based on a wearable device, the device includes:

[0050] The input and output module 311 receives the authorization request of the third-party application, and receives the user identification code submitted by the user;

[0051] The processing module 312 is configured to generate a unique feature code corresponding to the third-party application session after receiving the authorization request of the third-party application and the user identification code, and distribute the feature code to the wearable device bound to the user identification code;

[0052] The authorization module 313 is configured to receive an authorization message sent by the wearable device according to the feature code, and determine whether to authorize the third-party application session according to the authorization message.

[0053] Further, the input and output module 311 includes:

[0054] The wearabl...

Embodiment 3

[0063] join Figure 4 , the embodiment of the present invention provides an authorization system based on a wearable device, the system includes: an authorization subsystem 401 , a third-party application subsystem 402 and a wearable device subsystem 403 .

[0064] Wherein, the authorization subsystem 401 includes:

[0065] The input and output module 411 receives the authorization request of the third-party application, and receives the user identification code submitted by the user;

[0066] The processing module 412 is configured to generate a unique feature code corresponding to the session of the third-party application after receiving the authorization request of the third-party application and the user identification code, and distribute the feature code to the wearable device bound to the user identification code;

[0067] The authorization module 413 is configured to receive an authorization message sent by the wearable device according to the feature code, and deter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wearable device based authorization method, device and system, and belongs to the technical field of communication. The method comprises the steps as follows: a wearable device is connected with a system for operating the authorization method; an authorization request dispatched by a third-party application is received and analyzed; corresponding unique feature code is generated according to a third-party application conversation request and sent to the wearable device; and authorization information which is generated and sent by the wearable device according to the unique feature code is received, and the third-party application is authorized. The device comprises an input and output module, a processing module and an authorization module. The system comprises an authorization subsystem, a third-party application subsystem and a wearable device subsystem. With the adoption of the wearable device based authorization method, device and system, the wearable device not only can be taken as an authorization certificate independently, but also can form an authorization certificate with other intelligent combination, and the use is flexible.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and system based on wearable device authorization. Background technique [0002] With the vigorous development of the Internet industry, more and more computers and smart mobile devices can be connected to the Internet. Thousands of Internet-based applications have also emerged, including browser / server-side applications accessed through browsers, and client-side / server-side applications accessed through client computer programs or mobile apps. If each application uses separate account information, such as username and password, the user not only has to go through a cumbersome and repetitive registration process before using each application, but also needs to remember the account information for each application separately. The management of rapidly increasing account information is undoubtedly difficult. In order to solve the above problems, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 祝贺
Owner 祝贺