Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization method, device and system for sensitive data

A sensitive data and database technology, applied in the field of communication, can solve the problems of frequent user participation, unable to solve the cumbersome operation of user registration and user privacy information, and achieve the effect of improving convenience, security, and simplifying operations

Active Publication Date: 2017-11-21
邱彼特
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method avoids the steps of users frequently entering identity verification information by scanning the QR code, and simplifies the verification process to a certain extent, but it still cannot solve the cumbersome operations of user registration and user privacy information filling process
[0005] The inventor found in the research that there is a problem of frequent user participation in sensitive data operations in existing communications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method, device and system for sensitive data
  • Authorization method, device and system for sensitive data
  • Authorization method, device and system for sensitive data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0033] Considering that users often need to register...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a sensitive data authorization method, device, and system, wherein the method includes: a third-party server receiving a request for sensitive data from a client, wherein the request for sensitive data carries a content request identifier; the third-party server After passing the legitimacy check on the client, a sensitive data request list is generated according to the content request ID; the third-party server notifies the user terminal of the sensitive data request list through the client; the third-party server receives the sensitive data and session ID from the cloud storage server ; Wherein, the sensitive data is obtained by the cloud storage server according to the sensitive data request list uploaded by the user terminal; the third-party server performs corresponding operations on the sensitive data according to the session identifier, and sends the operation results to the client and / or the user terminal. Through the present invention, the user's operation is simplified, and the convenience and safety of sensitive operations are improved.

Description

technical field [0001] The present invention relates to the communication field, and in particular, relates to a sensitive data authorization method, device (such as a server, a cloud storage server, and a user terminal) and a system. Background technique [0002] With the development of network technology, there are more and more websites with various application functions. Usually, the application functions of these websites are only open to registered users. There is also more and more information. [0003] When registering, you need to fill in a lot of personal information, and every time you log in, you need to enter the correct user name and password. Some websites even need to enter other authentication information. These steps involve frequent keyboard operations and high learning costs. Many Internet users (especially elderly Internet users) do not have the ability to complete these steps independently so far. Secondly, logging in, registering, and filling in pers...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
CPCG06F21/6218H04L63/0281H04L63/08H04L9/40
Inventor 邱彼特
Owner 邱彼特