Authorization method and device and authorization requesting method and device
An authentication request, a part of the technology, applied in the computer field, can solve the problem of low efficiency in the authorization process, and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] Embodiment 1 provides an authorization method, the specific flowchart of the method is as follows figure 1 shown, including the following steps:
[0039] Step 11, the server device receives the user identity authentication information stored in the identity authentication auxiliary device related to the user end device.
[0040] In Embodiment 1, the "user identity authentication information" may include user name and password, and may also include other information uniquely representing the user.
[0041] The auxiliary device for identity authentication can be a mobile phone, a desktop computer, a notebook computer or a tablet computer and the like. The specific implementation of saving the user identity authentication information can be: after the user successfully registers to the server device, the server device sends the user identity authentication information to the identity authentication auxiliary device for storage; or the user end device directly The user id...
Embodiment 2
[0070] Embodiment 2 provides a method for requesting authorization, and the specific implementation flow chart of the method is as follows figure 2 shown, including the following steps:
[0071] In step 21, the identity authentication auxiliary device obtains an auxiliary authentication request from a client device related to the identity authentication auxiliary device.
[0072] There are many ways to obtain the auxiliary authentication request. For example, it may be receiving an auxiliary authentication request broadcast by the client device; it may also be scanning a two-dimensional code image displayed by the client device to obtain the auxiliary authentication request represented by the two-dimensional code image; and so on.
[0073] Step 22, locally obtain user identity authentication information from the identity authentication auxiliary device.
[0074] Step 23: Send the user identity authentication information to the server device, so that the server device can ju...
Embodiment 3
[0079] Embodiment 3 provides two methods for requesting authorization.
[0080] The first method for requesting authorization includes the steps: the user end device provides an auxiliary authentication request to an identity authentication auxiliary device related to the user end device, so as to trigger the identity authentication auxiliary device to send the user identity authentication information stored locally in the identity authentication auxiliary device to server device.
[0081] Wherein, the auxiliary authentication request provided by the user end device to the identity authentication auxiliary device may include the identity authentication service serial number obtained by the user end device and sent by the server device.
[0082] The second method of requesting authorization includes, for example, image 3 The following steps are shown:
[0083] Step 31, the client device obtains the user identity authentication information provided by the identity authenticat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


