Authorization access method

A technology of authorized access and access password, which is applied in the field of authorized access and can solve problems such as inability to securely access smart devices

Active Publication Date: 2016-07-27
SHANGHAI MXCHIP INFORMATION TECHN
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an authorized access method to solve the problem of inability to safely access smart devices in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization access method
  • Authorization access method
  • Authorization access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] see figure 1 , which shows a flowchart of an authorized access method provided by an embodiment of the present invention, which may include the following steps:

[0046] S11: The first user terminal uses a key generation algorithm to calculate the device ID (Identity, identity mark), the access password, and the first user ID corresponding to the first user terminal to obtain the first key; wherein, the device ID is the first key. A user terminal sends...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authorization access method. The method mainly comprises the steps that a first user terminal activates a smart device and uses a key generation algorithm to calculate the device ID, an access password and the first user ID to acquire a first key; first authorization information carrying the device ID, the first user ID and the first key is sent to cloud; if the first authorization information is the same as second authorization information pre-stored by the cloud, the first user terminal is allowed to indirectly access the smart device through the cloud; and the second authorization information is sent by the smart device. According to the invention, the first user terminal activates the smart device to acquire the authorization information; the smart device stores the authorization information to the cloud; when the first user terminal needs to access the smart device through the cloud, the authorization information is sent to the cloud; the cloud does not store the access password which has direct access to the smart device; the password is prevented from being stolen in the cloud; and the operation of the authorization access method is simple and convenient.

Description

technical field [0001] The present invention relates to the technical field of authorization authentication, and more specifically, relates to an authorization access method. Background technique [0002] With the rapid development of science and technology, more and more smart devices are applied to human life. [0003] Smart devices are high-tech devices that include many types, mainly including wearable smart devices and home smart devices. Users can access smart devices through mobile terminals, and control smart devices to perform related operations as needed. Under different network conditions, mobile terminals have different access methods to smart devices, mainly including direct access to smart devices and indirect access to smart devices through the cloud. However, there is a lack of a method for safely accessing smart devices in the prior art. [0004] To sum up, there is a problem in the prior art that smart devices cannot be safely accessed. Contents of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 张伟
Owner SHANGHAI MXCHIP INFORMATION TECHN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products