Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization method and device and authorization requesting method and device

An authentication request, a part of the technology, applied in the computer field, can solve the problem of low efficiency in the authorization process, and achieve the effect of improving efficiency

Pending Publication Date: 2020-12-25
ADVANCED NEW TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The disadvantage of the above process is that the user needs to manually enter the account number and password into the client device every time the business authorization is performed, resulting in low efficiency of the authorization process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method and device and authorization requesting method and device
  • Authorization method and device and authorization requesting method and device
  • Authorization method and device and authorization requesting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Embodiment 1 provides an authorization method, the specific flowchart of the method is as follows figure 1 shown, including the following steps:

[0039] Step 11, the server device receives the user identity authentication information stored in the identity authentication auxiliary device related to the user end device.

[0040] In Embodiment 1, the "user identity authentication information" may include user name and password, and may also include other information uniquely representing the user.

[0041] The auxiliary device for identity authentication can be a mobile phone, a desktop computer, a notebook computer or a tablet computer and the like. The specific implementation of saving the user identity authentication information can be: after the user successfully registers to the server device, the server device sends the user identity authentication information to the identity authentication auxiliary device for storage; or the user end device directly The user id...

Embodiment 2

[0070] Embodiment 2 provides a method for requesting authorization, and the specific implementation flow chart of the method is as follows figure 2 shown, including the following steps:

[0071] In step 21, the identity authentication auxiliary device obtains an auxiliary authentication request from a client device related to the identity authentication auxiliary device.

[0072] There are many ways to obtain the auxiliary authentication request. For example, it may be receiving an auxiliary authentication request broadcast by the client device; it may also be scanning a two-dimensional code image displayed by the client device to obtain the auxiliary authentication request represented by the two-dimensional code image; and so on.

[0073] Step 22, locally obtain user identity authentication information from the identity authentication auxiliary device.

[0074] Step 23: Send the user identity authentication information to the server device, so that the server device can ju...

Embodiment 3

[0079] Embodiment 3 provides two methods for requesting authorization.

[0080] The first method for requesting authorization includes the steps: the user end device provides an auxiliary authentication request to an identity authentication auxiliary device related to the user end device, so as to trigger the identity authentication auxiliary device to send the user identity authentication information stored locally in the identity authentication auxiliary device to server device.

[0081] Wherein, the auxiliary authentication request provided by the user end device to the identity authentication auxiliary device may include the identity authentication service serial number obtained by the user end device and sent by the server device.

[0082] The second method of requesting authorization includes, for example, image 3 The following steps are shown:

[0083] Step 31, the client device obtains the user identity authentication information provided by the identity authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization method, which is used for improving the efficiency of an authorization process. The method comprises the steps that a server device receives user identity authentication information stored in an identity authentication auxiliary device related to a client device, wherein the user identity authentication information is directly sent to the server device by the identity authentication auxiliary device, and at least one part of the user identity authentication information does not belong to the information of the client device; and according to the user identity authentication information, determining whether the client device meets an authorization condition or not.

Description

[0001] This document is a divisional application of "an authorization method, a method for requesting authorization, and a device". The application number of the parent application is "201410150396.8", and the application date is "April 15, 2014". technical field [0002] The present application relates to the field of computer technology, and in particular to an authorization method, a method and a device for requesting authorization. Background technique [0003] The traditional Internet-based business authorization (such as remote payment authorization) process generally includes the following steps: [0004] The client device obtains the account number and password entered by the user, and submits it to the server device for verification; [0005] After the server device passes the verification of the account and password submitted by the client device, it authorizes the client device; [0006] After being authorized, the client device initiates a service application ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/321H04L9/3228H04L9/3234H04L63/0853G06F21/34G06F21/44H04L63/083H04L9/3226H04L63/18H04L9/30H04L63/04H04L63/10H04L63/123
Inventor 曹恺
Owner ADVANCED NEW TECH CO LTD