Method, device and system of access authentication

An authentication method and an authentication device technology, applied in the computer field, can solve problems such as poor security

Active Publication Date: 2014-12-10
XIAOMI INC
View PDF5 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of relatively poor security in related technologies, since the user needs to manually input the access password on the mobile app, illegal users can easily obtain the access password and use the access password to access the Wi-Fi smart device, The disclosure provides an access authentication method, device and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system of access authentication
  • Method, device and system of access authentication
  • Method, device and system of access authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0123] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0124] figure 1 is a schematic diagram of an implementation environment involved in an access authentication method shown according to some exemplary embodiments, as shown in figure 1 As shown, the implementation environment may include the accessed device 120 , the accessed device 140 , the third-party device 160 and the login terminal 180 .

[0125] The visited device 120 may be a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system of access authentication, belonging to the field of computer technologies. The method of access authentication comprises the following steps that a device identification of a visited device is obtained; the device identification and a user account of an access device are transmitted to a third-party device, and the third-party device is used for transmitting an authentication request to a login end when the device identification is bound with a user account and the user account is different from the user account of the access device, and transmitting an access password of the visited device to the access device after the access allowed response fed back by the login end is received; and the visited device is visited by the received access password. Through carrying out authentication on the login end in the third-party device, after authentication is successful, the access password is transmitted to the access device, and the access device visits the visited device according to the access password; the problems that a user needs to manually input the access password on a mobile phone App to cause an illegal user to obtain the access password easily and have worse safety are solved; the effect of improving safety of the visited device is achieved.

Description

technical field [0001] The present disclosure relates to the field of computer technology, in particular to an access authentication method, device and system. Background technique [0002] With the popularization of Wi-Fi (Wireless-Fidelity, wireless fidelity), there are more and more smart devices with Wi-Fi. Generally, after Wi-Fi smart devices are connected to the network, they need to cooperate with mobile phone App (Application, application program) To use, the mobile app can view the status and results of the smart device, and can send instructions to control the smart device. It is particularly important for smart devices to authenticate mobile apps so that mobile apps can safely access and control smart devices. [0003] An access authentication method provided in the related technology is: when the user accesses the Wi-Fi smart device through the mobile App, the user needs to manually enter the access password on the mobile App, and the mobile App sends the access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/35
CPCH04L63/083H04L63/0853H04W12/06G06F21/35
Inventor 李飞云高自光任桥
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products