Stand-in authorization method and electronic equipment

A technology of electronic equipment and authorization credentials, applied in the electronic field, can solve problems such as time-consuming and complicated input steps, and achieve the effect of reducing login steps and saving login time

Active Publication Date: 2015-02-11
LENOVO (BEIJING) CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present application solves the technical problem of complex and time-consuming input steps when logging into the external network for electronic devices that are not equipped with input components in the prior art by providing a method and electronic equipment for authorization on behalf

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stand-in authorization method and electronic equipment
  • Stand-in authorization method and electronic equipment
  • Stand-in authorization method and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] In Embodiment 1, a method of authorization is provided, which is applied to a first electronic device, the first electronic device is connected to the authorized application terminal through the Internet, and the first electronic device is connected to the second electronic device through a local area network , in practical applications, the first electronic device may be an electronic device such as a smart phone, a tablet computer, a notebook, and a television set, and the second electronic device may also be an electronic device such as a smart phone, a tablet computer, a notebook, a television set, etc. , which will not be listed one by one in this embodiment.

[0057] Please refer to figure 1 , figure 1 It is a flow chart of the method of authorization in Embodiment 1 of the present application, and the method includes the following steps:

[0058] Step S101, obtaining a login request for logging into the authorized application;

[0059] Step S102, sending the l...

Embodiment 2

[0085] In the second embodiment, a method of authorization is provided, which is applied to the second electronic device, the second electronic device is connected to the first electronic device in the first embodiment through a local area network, and the second electronic device is connected to the authorized The application end is connected through the Internet. In practical applications, the first electronic device can be a smart phone, a tablet computer, a notebook, a television, etc., and the second electronic device can also be a smart phone, a tablet computer, a notebook, Electronic devices such as televisions are not listed one by one in this embodiment.

[0086] Please refer to figure 2 , figure 2 It is a flow chart of the method of authorization in Embodiment 2 of the present application, and the method includes the following steps:

[0087] Step S201, receiving a login request sent by the first electronic device for logging into the authorized application;

[00...

Embodiment 3

[0107] Embodiment 3 is an electronic device corresponding to the authorization method in Embodiment 1, specifically the first electronic device, the first electronic device is connected to the authorized application terminal through the Internet, and the first electronic device and the second electronic device Connected through a local area network, in practical applications, the first electronic device can be electronic devices such as smart phones, tablet computers, notebooks, and televisions, and the second electronic device can also be smart phones, tablet computers, notebooks, and televisions. and other electronic devices are not listed one by one in this embodiment.

[0108] Please refer to image 3 , image 3 It is a schematic structural diagram of the electronic device in Embodiment 3 of the present application, and the electronic device includes:

[0109] Obtaining module 301, configured to obtain a login request for logging into the authorized application end;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a stand-in authorization method and electronic equipment. The stand-in authorization method is applied to first electronic equipment; the first electronic equipment is connected with an authorization application client through internet and is connected with second electronic equipment through a local area network. The method comprises the following steps: acquiring a login request for logging in the authorization application client; transmitting the login request to the second electronic equipment connected with the authorization application client through the internet; receiving a first authorization certificate which is returned by the second electronic equipment based on the login request and can be used as a login certificate for the first electronic equipment to log in the authorization application client; logging in the authorization application client based on the first authorization certificate. The stand-in authorization method and the electronic equipment are used for solving the technical problems of complex input steps and time consumption during extranet login of the electronic equipment without an input component in the prior art.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a method and electronic equipment for delegated authorization. Background technique [0002] As people's requirements for the quality of life are increasing, there are more and more types of electronic devices, and the popularity of home networking has emerged. Most families have set up a home local area network, including TVs, desktop computers, notebooks , smartphones, tablet computers and other electronic products are added to the local area network, and can be connected to the external network. [0003] In addition to being connected to each other, the electronic products in the above-mentioned local area network can also realize the functions of browsing web pages, logging in to software application terminals, downloading, online video, etc., and transmitting data with the external network. [0004] However, in the process of realizing the technical solution of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/28H04L29/06
Inventor 李祎耀
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products