Operation authorization method and device

An authorization device and predetermined operation technology, applied in the field of network security, can solve the problems of complex acquisition and leakage of dynamic authorization passwords

Inactive Publication Date: 2015-01-14
XIAOMI INC
View PDF4 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem in the related art that the acquisition operation of the dynamic authorization password in the SMS mode is complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation authorization method and device
  • Operation authorization method and device
  • Operation authorization method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0116] The exemplary embodiments will be described in detail here, and examples thereof are shown in the accompanying drawings. When the following description refers to the accompanying drawings, unless otherwise indicated, the same numbers in different drawings represent the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present disclosure. Rather, they are only examples of devices and methods consistent with some aspects of the present disclosure as detailed in the appended claims.

[0117] Please refer to figure 1 , Which shows a schematic structural diagram of an implementation environment involved in the operation authorization method provided by each embodiment of the present disclosure. The implementation environment includes: a wearable device 120, a mobile terminal 140, and a server 160.

[0118] Among them, the wearable device 120 may be connected to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an operation authorization method and device, and belongs to the field of network security. The method includes the steps that motion data collected by a wearable device are obtained; whether the motion data are motion data matched with verification physical motion or not is detected; if yes, the preset operation corresponding to the verification physical motion is authorized to be executed. According to the method, the user identification is verified through the motion data collected by the wearable device, and the problems of complex operation of obtaining a dynamic authorization password in a short message mode and the possibility of leakage are solved; the authorization verification process is simplified, and the authorization execution of the preset operation can be finished only through the wearable device, so that the user property and user privacy are effectively protected, and the safety in using the mobile internet is improved for users.

Description

technical field [0001] The present disclosure relates to the field of network security, in particular to an operation authorization method and device. Background technique [0002] At present, there are more and more types of services provided by the mobile Internet, many of which involve user property and user privacy. [0003] When performing these operations, related technologies usually use mobile phone verification codes to authenticate users. The general process is as follows: the user applies for a reservation operation to the server on the mobile phone. On the one hand, the server displays a verification interface through the mobile phone, and on the other hand, sends a 6-digit dynamic authorization password to the mobile phone bound to the user; Enter the 6-digit dynamic authorization password into the verification interface displayed on the mobile phone and submit it to the server. When the server detects that the 6-digit dynamic authorization password is correct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04W12/02H04W12/06G06F1/163G06F3/017H04L63/0853H04W12/08H04W12/68H04W12/065H04W12/33G06F21/00H04L69/00
Inventor 丁亮黄柏林尹家进
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products