Identity authentication method, device, medium, robot and system

An identity authentication and identity information technology, applied in the field of intelligent terminals, can solve the problems of cumbersome user operations, inability to obtain personalized data, and ineffective record protection of personalized data, so as to reduce complexity, protect privacy and data. effect of personality

Inactive Publication Date: 2019-08-16
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. Unable to obtain personalized data
And all operating users share an account, which is very likely to destroy the data personality of the logged-in user
In addition, the personalized data of each operating user who is not a logged-in user has not been effectively recorded and protected
[0006] In the existing technology, in order to protect the privacy of login user information and obtain the personalized data of each operating user to the maximum extent when realizing multi-user sharing, it is necessary for each operating user to log in and log out continuously, and frequent switching is required settings, resulting in cumbersome user operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device, medium, robot and system
  • Identity authentication method, device, medium, robot and system
  • Identity authentication method, device, medium, robot and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Such as figure 2 As shown, it is a flow chart of an identity authentication method for a shareable smart terminal provided in Embodiment 1 of the present invention. The method includes the following steps:

[0050] Step 101. Determine the operating user information corresponding to the current operating user.

[0051] In this step, when receiving the access data service request sent by the operating user of the sharable smart terminal, the operating user information corresponding to the operating user is determined, and the operating user information is information capable of identifying the characteristics of the operating user.

[0052] Since the operating users will basically use the personalized smart terminal, it is possible to establish a correspondence between the personalized smart terminal identifier and the operating user. In various embodiments of the present invention, the operating user information may include a personalized smart terminal identifier.

...

Embodiment 2

[0098] Embodiment 2 of the present invention provides an identity authentication method oriented to a shareable smart terminal, and the flow chart of the steps of the method can be as follows image 3 As shown, the method includes:

[0099] Step 201, establish a connection with a personalized smart terminal.

[0100] In this step, a connection can be established with a personalized smart terminal within a specified range.

[0101] The operation of establishing a connection with a personalized smart terminal can be performed regularly, for example, once every two hours, or it can be triggered, for example, when the user clicks a set button, it can be triggered once, or it can be continuously detected. As long as it is found that there is a personalized smart terminal that has not been connected, a connection is established with the personalized smart terminal. In this way, the operating user information can be continuously determined, the stored operating user information can...

Embodiment 3

[0148] Such as Figure 4 As shown, it is a schematic structural diagram of an identity authentication device oriented to a shareable smart terminal provided in Embodiment 3 of the present invention, and the device includes:

[0149] The first determining module 11 is used to determine the operating user information corresponding to the operating user when receiving the access data service request sent by the operating user of the sharable smart terminal, and the operating user information is information that can identify the characteristics of the operating user; the second The determining module 12 is used to determine whether the current operating user is a logged-in user according to the operating user information determined by the first determining module 11, and the operating user information corresponding to the logged-in user in the pre-stored operating user information; the third determining module 13 If the second determination module 12 determines that the current op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of intelligent terminals, in particular to an identity authentication method, device, medium, robot and system for a shareable intelligent terminal, which are used for solving the problem that when multiple users share a shareable intelligent terminal, user operation is tedious. When a shareable intelligent terminal operation user requests to access the data service, the operation user information corresponding to the operation user is compared with the pre-stored operation user information to determine whether the operation user is a login user or not. Whenit is determined that the current operation user is not the login user, directly logging is carried out in by utilizing pre-stored login information of the operation user. After logging in, the operation user is allowed to access the currently requested data service. By identifying whether the operation user is a login user and realizing automatic login of the operation user, seamless switching ofmultiple operation users can be realized without inputting login information by the operation user, so that the complexity of user operation is reduced.

Description

technical field [0001] The present invention relates to the field of intelligent terminals, in particular to an identity authentication method, device, medium, robot and system oriented to shareable intelligent terminals. Background technique [0002] At present, smart terminals are gradually moving from relatively personal products (such as mobile phones, watches, bracelets, etc., which can be called personalized smart terminals) to products that can be shared in application scenarios such as home, office, and public places (which can be called personal smart terminals). is a shareable smart terminal). Most sharable smart terminals (such as smart speakers (such as Google's Home speakers, Amazon's EchoShow, Apple HomePod, etc.), smart TVs, etc.) require users to bind an account when using it, so that the sharable smart login on the terminal. If the user also needs to access other data services (such as calendar, music, video, news, games, etc.) through the shareable smart ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0853H04L63/0861H04L63/0876H04L63/102H04L63/105
Inventor 赵振刚
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products