Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and authentication device for unlocking administration authority

A technology for authenticating equipment and managing authority, applied in user identity/authority verification, digital data authentication, electronic digital data processing, etc., can solve the problems of inability to unlock management authority, poor processing flexibility, etc., to achieve the effect of improving processing flexibility

Active Publication Date: 2015-04-29
XIAOMI INC
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Use the above processing method to unlock the system management authority. If an administrator forgets the password, the management authority cannot be unlocked. In this way, the processing flexibility for unlocking the management authority is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and authentication device for unlocking administration authority
  • Method and authentication device for unlocking administration authority
  • Method and authentication device for unlocking administration authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] The embodiment of the present disclosure provides a method for unlocking management rights, such as figure 1 As shown, the processing flow of the method may include the following steps:

[0067] In step 101, the authentication device receives authentication information sent by multiple member devices, where the member devices include mobile terminals or wearable devices.

[0068] In step 102, matching authentication is performed on the authentication information.

[0069] In step 103, the distance between the authenticated member device and the authentication device is detected; wherein the authenticated member device is a member device whose authentication information sent matches the authentication information in the pre-stored authorized authentication information list.

[0070] In step 104, when the detected number of authenticated member devices whose distance to the authentication device is smaller than the preset distance threshold reaches the preset number thre...

Embodiment 2

[0073] The embodiment of the present disclosure provides a method for unlocking management rights, which can be used in any device with data management capabilities (called an authentication device), where the authentication device can be a desktop computer, or can be a mobile phone or a tablet computer Such as mobile terminal, also can be server group etc. The member devices in this method may be mobile terminals (such as mobile phones), wearable devices, etc., and wearable devices are electronic devices that can be worn, such as smart bracelets, smart watches, smart collars, and the like. In this embodiment, the authentication device is a management terminal of a company as an example, and the member device is a smart bracelet as an example for detailed description of the solution. Other situations are similar, and this embodiment will not repeat them.

[0074] The following will be combined with the implementation mode, and the figure 1 The processing flow shown is describ...

Embodiment 3

[0104] Based on the same technical idea, the embodiment of the present disclosure also provides an authentication device, such as image 3 As shown, the authentication device includes: a receiving module 310 , a matching module 320 , a detecting module 330 and an unlocking module 340 .

[0105] The receiving module 310 is configured to receive authentication information sent by multiple member devices; wherein the member devices include mobile terminals or wearable devices;

[0106] A matching module 320, configured to perform matching authentication on the authentication information;

[0107] A detection module 330, configured to detect a distance between an authenticated member device and the authenticated device; wherein the authenticated member device is a member device whose authentication information sent matches the authentication information in the pre-stored authorized authentication information list;

[0108] The unlocking module 340 is configured to unlock the loca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to a method and an authentication device for unlocking administration authority, and belongs to the technical field of the information safety of a computer. The method comprises the steps: receiving authentication information transmitted by a plurality of member devices by virtue of the authentication device, wherein each member device comprises a mobile terminal or a wearable device; carrying out matching authentication for the authentication information; detecting the distance from an authenticated member device to the authentication device, wherein the authenticated member device is the member device with the transmitted authentication information being matched with the authentication information prestored in an authority authentication information list; unlocking the local administration authority when the detected distance to the authentication device is less than a preset distance threshold value and the quantity of the authenticated member devices reaches a preset quantity threshold value. By adopting the method and the authentication device, the processing flexibility for unlocking the administration authority can be improved.

Description

technical field [0001] The present disclosure relates to the technical field of computer information security, and in particular to a method for unlocking management rights and an authentication device. Background technique [0002] With the rapid development of computer technology, computers have been widely used and have become an indispensable tool in people's work and life. People pay more and more attention to the data security of the computer system, and set the function of locking and unlocking for the management authority of the system. [0003] Generally, when the management authority is locked, the user cannot operate the system. The system will set up a management authority unlocking page (such as the system identity authentication page), where the user can enter the account number and password, and the management authority can be unlocked after the verification is correct. , and then the user can perform corresponding operations on the system. For some systems ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/40H04L9/32H04B5/00H04W4/80
CPCG06F21/35G06F21/44G06F2221/2141H04W12/33H04W12/64G06F21/40H04L9/085H04W4/023H04W4/80H04W12/06H04W12/71G06F21/34H04L63/0876H04L63/083H04L63/0853H04W4/02H04L63/0492H04L9/0872
Inventor 史大龙林锦滨马坤
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products