Authentication and pairing of devices using a machine readable code

A readable code and machine technology, applied in branch office equipment, connection management, network topology, etc., can solve problems such as unresolved users

Active Publication Date: 2016-11-16
MICROSOFT TECH LICENSING LLC
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This doesn't address the scenario where a user may walk into a colleague's office and wish to share a document on the colleague's computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and pairing of devices using a machine readable code
  • Authentication and pairing of devices using a machine readable code
  • Authentication and pairing of devices using a machine readable code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Picture 1-1 and 1-2 (collectively referred to as FIG. 1 ) shows a block diagram of an exemplary authentication and pairing architecture 100 . Architecture 100 includes mobile device 102 , another client device 104 , a set of web-based services including MR code management system 106 , session management system 108 , and web-based remote control system 110 . A set of content services 112 is also illustratively included. In the embodiment shown in FIG. 1 , the mobile device 102 exemplarily includes a processor 114, a user interface component 116, a scanning component 118, and a client remote control system 120 (which may be a mobile application running on the mobile device 102) , and may also include other components 122 .

[0022] Architecture 100 will be described herein in connection with the example where the MR code is an optical code scanned by scanning component 118 . However, the MR code may also be other MR codes, such as codes provided using near field commu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An MR code is generated within a browser on a client device and is read by a mobile application on a mobile device. A communication channel is then established through a web-based service, between the browser and the mobile application on the mobile device. The mobile application generates a user interface display on the mobile device that allows user selection of content. The mobile application sends a link to that content to the browser, which accesses and renders the content on the client device. User input commands to control the rendered content are also received at the mobile device and sent to the browser through the communication channel.

Description

Background technique [0001] Several computer systems currently exist that allow users to register and present content on one computing device while controlling the content from another computing device. For example, some systems allow users to register and control large screen devices using the user's mobile device. [0002] Such systems typically have a user log into one or another computing device. Many users are uncomfortable using their user names and passwords, especially on computing devices that they do not own. Users worry that keystrokes are being recorded and the information will be used surreptitiously. [0003] There are also currently some systems for pairing computing devices so that they can communicate with each other in a trusted manner. One current process for accomplishing this has the user first pick a nearby device. Then, the user is prompted to enter the same code on both devices. Other processes use the proximity of the two devices to automatically ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04M1/72412
CPCH04L63/08H04L63/18H04W4/60H04W4/80H04W76/11H04W76/12H04L67/02H04L67/141H04W12/06H04W76/14H04L63/083H04W84/12H04W88/02H04M1/72412
Inventor I·米利根A·阿加瓦尔J·桑德斯J·S·博尔达克D·格雷S·康克林G·考德威尔
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products