Authorization authentication method, device and system

An authentication device and digital authentication technology, applied in the electronic field, can solve problems such as user property and information loss, and achieve the effect of ensuring relevance, unity, and security

Inactive Publication Date: 2016-10-05
李明
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that with this authorization method in the prior art, other people can use other people's electronic devices to obtain authorization, and then perform illegal operations, resulting in loss of user's property, information, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization authentication method, device and system
  • Authorization authentication method, device and system
  • Authorization authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] The present invention provides an authorization authentication method, such as figure 1 shown, including:

[0040] Step S101, after the biological limb enters the preset range of the first device, the first device establishes a communication connection with the second device through the biological limb.

[0041] In a specific implementation manner, the first device has a biological feature collection function, and can communicate with the second device through biological limbs. The first device can be used to manage the access or use rights of places (office areas, confidential areas), website logins, personal items (cars, safes, etc.), dangerous items, etc., and the first device can also be used to execute transactions, For example, it can be access control card reader, smart car lock, safe lock, dangerous goods manager, computer with biometric function, ATM machine and POS machine, etc.

[0042] The second device is placed outside the living body (including the huma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authorization authentication method, device and system. The authorization authentication method comprises the steps that first equipment establishes communication connection with second equipment through a biological limb after the biological limb enters the preset range of the first equipment; the first equipment receives information under authorization transmitted by the second equipment through communication connection, wherein the information under authorization includes digital authentication information; the first equipment acquires biological characteristic information of the biological limb in time duration when the biological limb enters the preset range of the first equipment; and the first equipment acquires an authentication result of the digital authentication information and the biological characteristic information, and the first equipment performs authorization operation if the authentication result of authentication of the digital authentication information and the biological characteristic information indicates passing of authentication. With application of the authorization authentication method, the behavior of other people of pretending to be the user to pass authorization through wristwatches and other electronic equipment can be prevented so that the security of information and property can be guaranteed.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to an authorization authentication method, device and system. Background technique [0002] When users use electronic devices to obtain authorization for certain specific places (such as office areas, confidential areas, etc.), website logins, personal items (cars, safes, etc.), dangerous goods, etc. The electronic system on the article or dangerous goods establishes a communication link, then sends the stored key to the electronic system, and the electronic system authenticates the key. It can be seen that, with this authorization method in the prior art, other people can use other people's electronic devices to obtain authorization, and then perform illegal operations, resulting in loss of property and information of the user. Contents of the invention [0003] The present invention aims to solve one of the above-mentioned problems. [0004] The main purpose of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0861
Inventor 李明
Owner 李明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products