An authorization method, client, server and system

A client and server technology, applied in the Internet field, can solve the problems of complicated and complicated operation process

Active Publication Date: 2019-02-26
BEIJING SENSESHIELD TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the main purpose of the authorization method, client, server and system provided by the present invention is to solve the problem of cumbersome and complicated operation process when authorizing the authorization object (control lock) in the prior art, and realize the simplification of authorization object. Authorization steps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authorization method, client, server and system
  • An authorization method, client, server and system
  • An authorization method, client, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0103] An embodiment of the present invention provides an authorization method, which is applied to the server side, such as figure 1 As shown, the method includes:

[0104] 101. The server generates authorization identification information according to the registration information of the client.

[0105] It should be noted that the authorization object described in the embodiment of the present invention is a control lock, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authorization method, a client-side, a server and a system, relates to the technical field of internet and mainly aims at solving the problem that the operating process is complicated during authorization of an authorization object (control lock) in the prior art and achieving the authorization step of the authorization object. According to the main technical scheme, the authorization method comprises the steps that server generates authorization identification information according to registration information on the client-side; request information for acquiring the authorization identification information sent by the client-side is received; responding to the request information, the authorization identification information is sent to the client-side so that the client-side conducts authorization on the authorization object according to the authorization identification information.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an authorization method, a client, a server and a system. Background technique [0002] With the rapid development and popularization of Internet technology, more and more users are more inclined to use the Internet for daily work. With the use of the Internet in daily work, there are more and more requirements for private data in the Internet. For example, Software programmers ensure software application security by using hardware control locks. [0003] At present, the control lock can provide a relatively safe programming environment for software programmers, wherein the control lock is provided by a third-party lock mechanism. If the user needs to use the control lock, it is necessary to provide personal identity information to the third-party lock mechanism. After the third-party lock mechanism obtains the user's personal identity information, it will customize the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/0815H04L63/10
Inventor 孙吉平刘荣华
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products