Binding method of intelligent equipment, identity authentication platform and storage medium

An identity authentication and smart device technology, applied in the field of information processing, can solve problems such as low security and achieve the effect of improving security

Active Publication Date: 2018-11-06
TENCENT TECH (BEIJING) CO LTD
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the security of the existing identity auth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binding method of intelligent equipment, identity authentication platform and storage medium
  • Binding method of intelligent equipment, identity authentication platform and storage medium
  • Binding method of intelligent equipment, identity authentication platform and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0044] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than thos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a binding method of intelligent equipment, an identity authentication platform and a storage medium applied to the technical field of the information processing. When a user initiates a binding request to to-be-bound equipment through a third-party application client, the third-party application client sends an equipment identifier of the to-be-bound equipment, a user identifier and an application identifier of a third-party application to the identity authentication platform through a third-party application server; when the third-party application client receives a registration request returned by the identity authentication platform, first identity verification information in the registration request is sent to the to-be-bound equipment to verify, and then the first verification result of the first identity verification information is sent to the identity authentication platform, thereby binding the equipment identifier, the application identifier and the user identifier of the third-party application client. Therefore, the binding between the equipment identifier and the user of the third-party application is realized through the transmission among the identity authentication platform, the third-party application client and the to-be-bound equipment.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to a binding method of an intelligent device, an identity authentication platform and a storage medium. Background technique [0002] Identity authentication refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to certain resources, so that the access strategy of the computer and network system can be executed reliably and effectively. Prevent attackers from impersonating legitimate users to gain access to resources, ensure system and data security, and legitimate interests of authorized visitors. [0003] The existing binding methods for smart devices are generally based on the authentication of user identification and password, that is, the user identification and password of a certain application terminal are first bound in the background. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/321H04L63/0876H04L65/1073H04L63/10Y02P90/02
Inventor 崔冉申子熹
Owner TENCENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products