Operation right authentication method and device

A technology of operation authority and verification method, applied in the network field, can solve problems such as poor security, cumbersome login process, and low login efficiency

Active Publication Date: 2014-03-12
XIAOMI INC
View PDF3 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventors found that there are defects in related technologies, such as: the login process is cumbersome, the input of account number and password takes too long, resulting in low login efficiency, and because the display screen of the smart TV is larger than that of the general terminal The display screen is large, it is easy to cause the leakage of the password, and the security is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation right authentication method and device
  • Operation right authentication method and device
  • Operation right authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0124] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be described in further detail below in conjunction with the implementation manners and accompanying drawings. Here, the exemplary embodiments of the present disclosure and their descriptions are used to explain the present disclosure, but not to limit the present disclosure.

[0125] Embodiments of the present disclosure provide a method and device for verifying operation authority, and the present disclosure will be described in detail below with reference to the accompanying drawings.

[0126] In one embodiment, figure 1 is an exemplary flow chart of the operation authority verification method, see figure 1 , the method includes:

[0127] In step 101, the feature code generated by the second terminal is obtained, the feature code carries at least the second terminal identifier, and the method of this embodiment is used in the first termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an operation right authentication method and an operation right authentication device and belongs to the technical field of networks. The method comprises the steps that a first terminal obtains a characteristic code generated by a second terminal; the identity of the second terminal is obtained according to the characteristic code; the account information of the first terminal and information to be authenticated are obtained; a right authentication request is transmitted to a server to enable the server to perform authentication, and when the authentication is passed, a right corresponding to the right authentication request is provided for the second terminal. Since the operation right authentication is performed to the second terminal according to the account information of the first terminal and the information to be authenticated and the information input process of the second terminal is transferred to the first terminal, the information input process is enabled to become simpler and more convenient, the operation right authentication process is simplified, the information input time is saved and the authentication efficiency is improved; since a display screen of the second terminal is obviously smaller than a display screen of the first terminal, the information is not apt to disclose and the security is improved.

Description

technical field [0001] The present disclosure relates to the field of network technology, in particular to a method and device for verifying operation authority. Background technique [0002] With the development of smart TVs, users can install a variety of application software on smart TVs to achieve a variety of intelligent functions, but when using smart TVs, it may be necessary to log in to the account information of smart TVs to confirm the user's access rights . [0003] When the user logs in on the smart TV, he can use the remote control to enter the account number and password. However, the keyboard of the remote control is generally set relatively simple, and only numbers can be entered, but characters cannot be entered. A virtual full keyboard is provided on the smart TV, and the user controls the cursor by clicking the direction buttons on the remote control, and selects characters in the full keyboard for input by clicking the confirmation button. [0004] In t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/62
Inventor 金凡高应军李创奇吴廷彬张军
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products