Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation authorization method and device

An authorization device and predetermined operation technology, applied in the field of network security, can solve the problems of complex acquisition and leakage of dynamic authorization passwords

Inactive Publication Date: 2015-01-14
XIAOMI INC
View PDF4 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem in the related art that the acquisition operation of the dynamic authorization password in the SMS mode is complicated and may be leaked, an embodiment of the present disclosure provides an operation authorization method and device, and the technical solution is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation authorization method and device
  • Operation authorization method and device
  • Operation authorization method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0116] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0117] Please refer to figure 1 , which shows a schematic structural diagram of an implementation environment involved in the operation authorization method provided by various embodiments of the present disclosure. The implementation environment includes: a wearable device 120 , a mobile terminal 140 and a server 160 .

[0118] Wherein, the wearable device 120 may be connected with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operation authorization method and device, and belongs to the field of network security. The method includes the steps that motion data collected by a wearable device are obtained; whether the motion data are motion data matched with verification physical motion or not is detected; if yes, the preset operation corresponding to the verification physical motion is authorized to be executed. According to the method, the user identification is verified through the motion data collected by the wearable device, and the problems of complex operation of obtaining a dynamic authorization password in a short message mode and the possibility of leakage are solved; the authorization verification process is simplified, and the authorization execution of the preset operation can be finished only through the wearable device, so that the user property and user privacy are effectively protected, and the safety in using the mobile internet is improved for users.

Description

technical field [0001] The present disclosure relates to the field of network security, in particular to an operation authorization method and device. Background technique [0002] At present, there are more and more types of services provided by the mobile Internet, many of which involve user property and user privacy. [0003] When performing these operations, related technologies usually use mobile phone verification codes to authenticate users. The general process is as follows: the user applies for a reservation operation to the server on the mobile phone. On the one hand, the server displays a verification interface through the mobile phone, and on the other hand, sends a 6-digit dynamic authorization password to the mobile phone bound to the user; Enter the 6-digit dynamic authorization password into the verification interface displayed on the mobile phone and submit it to the server. When the server detects that the 6-digit dynamic authorization password is correct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04W12/02H04W12/06G06F1/163G06F3/017H04L63/0853H04W12/08H04W12/68H04W12/065H04W12/33G06F21/00H04L69/00
Inventor 丁亮黄柏林尹家进
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products