An authorization method for a cloud mobile phone
A cloud mobile phone and mobile phone technology, applied in the network field, can solve problems such as affecting the privacy of cloud mobile phones
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] In the scenario where a user wants to share his own cloud phone with his friends, in order to ensure a certain degree of privacy, the user can be regarded as an authorized user, and the user's friends can be regarded as authorized users. The problem to be solved is how safe and convenient The legitimate connection between the authorized user's cloud phone and the authorized user's account can be established in an accurate manner. The legality here means that it conforms to the server's authority verification rule.
[0051] see figure 1 , figure 1 It is a schematic flowchart of an authorization method for a cloud mobile phone according to an embodiment of the present invention. The cloud mobile phone usually includes a client and a server. The client where the cloud mobile phone is located can be installed on the user's terminal, and the server where the cloud mobile phone is located can be set in the cloud. The server on the cloud includes a control server, and the con...
Embodiment 2
[0094] like image 3 as shown, image 3 It is a schematic diagram of system communication of another cloud mobile phone authorization method according to the embodiment of the present invention. The cloud phone includes a client and a server. The client where the cloud phone is located can be installed on the user's terminal. The server where the cloud phone is located can be set in the cloud. The server on the cloud includes a control server and an authentication server. The control server can communicate with the client. The connection is established through a communication connection, and the control server communicates with the authentication server. The authentication server is provided with a database that can store the mapping relationship between the cloud mobile phone and the user account information.
[0095] In this embodiment, in the scenario where the user wants to share his own cloud phone with his friends, in order to ensure a certain degree of privacy, the use...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


