Unlock instant, AI-driven research and patent intelligence for your innovation.

An authorization method for a cloud mobile phone

A cloud mobile phone and mobile phone technology, applied in the network field, can solve problems such as affecting the privacy of cloud mobile phones

Active Publication Date: 2020-09-08
湖南微算互联信息技术有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this strict privacy control is inconvenient for users to share cloud phones with friends. When sharing cloud phones, users need to provide user account numbers and passwords, which will seriously affect the privacy of cloud phone users using cloud phones.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authorization method for a cloud mobile phone
  • An authorization method for a cloud mobile phone
  • An authorization method for a cloud mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] In the scenario where a user wants to share his own cloud phone with his friends, in order to ensure a certain degree of privacy, the user can be regarded as an authorized user, and the user's friends can be regarded as authorized users. The problem to be solved is how safe and convenient The legitimate connection between the authorized user's cloud phone and the authorized user's account can be established in an accurate manner. The legality here means that it conforms to the server's authority verification rule.

[0051] see figure 1 , figure 1 It is a schematic flowchart of an authorization method for a cloud mobile phone according to an embodiment of the present invention. The cloud mobile phone usually includes a client and a server. The client where the cloud mobile phone is located can be installed on the user's terminal, and the server where the cloud mobile phone is located can be set in the cloud. The server on the cloud includes a control server, and the con...

Embodiment 2

[0094] like image 3 as shown, image 3 It is a schematic diagram of system communication of another cloud mobile phone authorization method according to the embodiment of the present invention. The cloud phone includes a client and a server. The client where the cloud phone is located can be installed on the user's terminal. The server where the cloud phone is located can be set in the cloud. The server on the cloud includes a control server and an authentication server. The control server can communicate with the client. The connection is established through a communication connection, and the control server communicates with the authentication server. The authentication server is provided with a database that can store the mapping relationship between the cloud mobile phone and the user account information.

[0095] In this embodiment, in the scenario where the user wants to share his own cloud phone with his friends, in order to ensure a certain degree of privacy, the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of network technology, and in particular to an authorization method for a cloud mobile phone, comprising the following steps: receiving an authorization request containing the account information of the authorized user sent by the authorized user's cloud mobile phone; receiving authorization confirmation information input by the authorized user; Send the authorization confirmation information and authorization request to the control server; receive the authority verification result fed back by the control server; determine whether to grant the authorization permission to the account information of the authorized user according to the authority verification result. The invention also proposes another authorization method for the cloud mobile phone. In the cloud mobile phone authorization method of the present invention, the cloud mobile phone of the authorized user sends relevant information to the server, receives the authority verification result of the control server, and then determines whether to grant the authorization license to the account information of the authorized user according to the authority verification result. That is, the privacy of the cloud mobile phone is controlled and the convenience of sharing the cloud mobile phone with friends can be satisfied.

Description

technical field [0001] The invention relates to the field of network technology, in particular to an authorization method for a cloud mobile phone. Background technique [0002] Cloud Phone is a smart phone application cloud platform based on powerful virtual applications of cloud computing and mobile Internet. Based on the outstanding advantages of cloud computing in large-scale computing, powerful storage capacity, and virtualized applications, the cloud platform provides smartphone users with diversified and comprehensive virtual mobile applications and services, and fully supports the display of various mobile applications. , download, application and management services, and excellently realize all-weather cloud intelligent hosting applications, allowing users to host various applications to the cloud even when they are out of mobile terminals, keeping online 24 / 7, and fully realizing smartphone application virtualization . [0003] If the user wants to control his ow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06
CPCH04L63/10H04W12/06
Inventor 王崴陈振青陈斯韦崔巍崧黄代良黄坚
Owner 湖南微算互联信息技术有限公司