An authorization method, device, terminal and system

A terminal and authorized user technology, applied in the security field, can solve problems such as user inconvenience, and achieve the effect of safe authorization process, flexible authorization, and avoiding illegal authorization

Active Publication Date: 2019-01-11
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, for some security devices such as access control equipment, safes or payment equipment, it is usually opened by a designated authorized user or authorized device. However, once the authorization is bound to the designated authorized user, it must be opened by the designated authorized user. , causing inconvenience to users to a certain extent
For example, the safe needs to be opened by the authorized user in person to be successful, and for the non-authorized user who needs to open the safe temporarily, he can only turn to the authorized user for help, and then the authorized user can help to open it. At this time, if the authorized user is not around, will cause a lot of inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authorization method, device, terminal and system
  • An authorization method, device, terminal and system
  • An authorization method, device, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0067] It should be noted that the terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. It should be understood that although terms first, second, etc. are used herein to describe terminals or modules, these terminals or modules should not be limited by these terms, and these terms are only used to distinguish each other. It should also be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authentication method, device, terminal and system. The method can comprise the following steps: receiving identity information of an unauthorized user transmitted by a first terminal; transmitting the identity information of the unauthorized user to a second terminal in order that an authorized user judges whether the unauthorized user is a temporarily-authorized user or not according to the identity information of the unauthorized user; receiving identity authentication information transmitted by the first terminal; and when a judgment result indicates that acquired biological feature information is consistent with pre-stored biological feature information of the authorized user, determining to authorize the temporarily-authorized user. Through adoption of the authentication method, device, terminal and system, security authorization of the temporarily-authorized user by the authorized user is realized.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to an authorization method, device, terminal and system. Background technique [0002] At present, for some security devices such as access control equipment, safes or payment equipment, it is usually opened by a designated authorized user or authorized device. However, once the authorization is bound to the designated authorized user, it must be opened by the designated authorized user. , causing inconvenience to users to a certain extent. For example, the safe needs to be opened by the authorized user in person to be successful, and for the non-authorized user who needs to open the safe temporarily, he can only turn to the authorized user for help, and then the authorized user can help to open it. At this time, if the authorized user is not around, It will cause a lot of inconvenience. Contents of the invention [0003] The technical problem to be solved by the embod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0861
Inventor 田永胜路雄博朱孟波
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products