CN107135075B - Authorization method and device for user operation - Google Patents

Authorization method and device for user operation Download PDF

Info

Publication number
CN107135075B
CN107135075B CN201610113467.6A CN201610113467A CN107135075B CN 107135075 B CN107135075 B CN 107135075B CN 201610113467 A CN201610113467 A CN 201610113467A CN 107135075 B CN107135075 B CN 107135075B
Authority
CN
China
Prior art keywords
authorization
terminal
identification information
result
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610113467.6A
Other languages
Chinese (zh)
Other versions
CN107135075A (en
Inventor
刘潮
何腾俊
王凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Jinguo Intellectual Property Co ltd
Original Assignee
Yiwu Lansi Sporting Goods Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yiwu Lansi Sporting Goods Co Ltd filed Critical Yiwu Lansi Sporting Goods Co Ltd
Priority to CN201610113467.6A priority Critical patent/CN107135075B/en
Publication of CN107135075A publication Critical patent/CN107135075A/en
Application granted granted Critical
Publication of CN107135075B publication Critical patent/CN107135075B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for authorizing user operation, wherein the method comprises the following steps: receiving an authorization request from any terminal, wherein the authorization request carries identification information of the terminal; inquiring whether the identification information of the terminal exists in a preset trusted device list to obtain an inquiry result; and generating an authorization result according to the query result, and returning the authorization result to the terminal. The method for authorizing the user operation provided by the invention enables the hardware equipment to automatically complete the authorization of the user operation without manually inputting verification information by the user, thereby improving the access efficiency of the user to the hardware equipment.

Description

Authorization method and device for user operation
Technical Field
The invention relates to the field of data processing, in particular to a method and a device for authorizing user operation.
Background
At present, when a terminal needs to access any hardware device, such as a video playing terminal, a picture browsing terminal, and the like, a user generally needs to manually input authentication information, such as a user name, a password, and the like, so as to complete authorization of the hardware device to the user operation. However, for hardware frequently accessed by a user, the authentication information still needs to be manually input each time, which makes the authorization of the hardware device for the user operation cumbersome and easy, and reduces the access efficiency of the user to the hardware device.
Disclosure of Invention
In order to solve the above problems, the present invention provides a method and an apparatus for authorizing a user operation, so that a hardware device can automatically complete the authorization of the user operation, and the access efficiency of the user to the hardware device is improved.
The invention provides an authorization method for user operation, which comprises the following steps:
receiving an authorization request from any terminal, wherein the authorization request carries identification information of the terminal;
inquiring whether the identification information of the terminal exists in a preset trusted device list to obtain an inquiry result;
and generating an authorization result according to the query result, and returning the authorization result to the terminal.
Preferably, the generating an authorization result according to the query result includes:
and if the inquiry result is that the identification information of the terminal exists, generating an authorization result for confirming the authorization.
Preferably, the method further comprises:
if the query result indicates that the identification information of the terminal is not queried, displaying information requesting authorization on a display screen, wherein the information requesting authorization comprises the identification information of the terminal;
and after the user triggers the operation of confirming the authorization according to the displayed information requesting the authorization, adding the identification information of the terminal into the trusted device list and generating an authorization result of confirming the authorization.
Preferably, the method further comprises:
if the inquiry result indicates that the identification information of the terminal is not inquired, judging whether the terminal belongs to a preset authorization type according to the identification information of the terminal;
if the terminal is determined to belong to the preset authorization type, adding the identification information of the terminal into the trusted device list, and generating an authorization result for confirming authorization;
and if the terminal is determined not to belong to the preset authorization type, generating an authorization result of refusing authorization.
Preferably, the method further comprises:
and if the user triggers the operation of refusing the authorization according to the displayed information of requesting the authorization, generating an authorization result of refusing the authorization.
The invention also provides an authorization device for user operation, the device comprising:
a receiving module, configured to receive an authorization request from any terminal, where the authorization request carries identification information of the terminal;
the query module is used for querying whether the identification information of the terminal exists in a preset trusted device list to obtain a query result;
the generating module is used for generating an authorization result according to the query result;
and the return module is used for returning the authorization result to the terminal.
Preferably, the generating module includes:
and the generation sub-module is used for generating an authorization result for confirming the authorization when the identification information of the terminal exists in the inquiry result.
Preferably, the apparatus further comprises:
the display module is used for displaying information requesting authorization on a display screen when the inquiry result indicates that the identification information of the terminal is not inquired, wherein the information requesting authorization comprises the identification information of the terminal;
and the first adding module is used for adding the identification information of the terminal into the trusted device list and generating an authorization result for confirming the authorization after the user triggers the operation for confirming the authorization according to the displayed information for requesting the authorization.
Preferably, the apparatus further comprises:
the judging module is used for judging whether the terminal belongs to a preset authorization type according to the identification information of the terminal when the inquiry result indicates that the identification information of the terminal is not inquired;
the second adding module is used for adding the identification information of the terminal into the trusted device list and generating an authorization result for confirming authorization when the terminal is determined to belong to a preset authorization type;
and the first generation module is used for generating an authorization result of refusing authorization when the terminal is determined not to belong to the preset authorization type.
Preferably, the apparatus further comprises:
and the second generation module is used for generating an authorization result of the authorization rejection when the user triggers the authorization rejection operation according to the displayed information of the authorization request.
The authorization method for user operation provided by the invention firstly receives an authorization request from any terminal, wherein the authorization request carries identification information of the terminal. Secondly, whether the identification information of the terminal exists is inquired in a preset trusted device list, and an inquiry result is obtained. And finally, generating an authorization result according to the query result, and returning the authorization result to the terminal. The method for authorizing the user operation provided by the invention enables the hardware equipment to automatically complete the authorization of the user operation without manually inputting verification information by the user, thereby improving the access efficiency of the user to the hardware equipment.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a flowchart of an authorization method for user operation according to an embodiment of the present invention;
FIG. 2 is a flowchart of another method for authorizing a user operation according to an embodiment of the present invention;
FIG. 3 is a flowchart of another method for authorizing a user operation according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an authorization apparatus for user operation according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another authorization apparatus for user operation according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of another authorization apparatus for user operation according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example one
Referring to fig. 1, fig. 1 is a flowchart of an authorization method for user operation according to an embodiment of the present invention, where the method specifically includes:
s101: receiving an authorization request from any terminal, wherein the authorization request carries identification information of the terminal.
In practical application, the authorization method for user operation is applied to hardware devices, such as a video playing terminal, a picture browsing terminal, and the like. The hardware device first establishes a connection relationship with a user terminal before receiving an authorization request from the user terminal. Specifically, the method includes establishing a connection relationship between the hardware device and the user terminal in a wired or wireless manner.
And after the connection relation is established, the user sends an authorization request to the hardware equipment through a terminal. In one implementation, when a user opens an application installed in the terminal for requesting authorization, sending of the authorization request is triggered; or, the user may trigger a preset operation in the application program to complete sending of the authorization request; or other embodiments, will not be described in detail herein.
In practical application, a terminal used by a user for sending an authorization request can be a smart phone, and correspondingly, the authorization request carries information such as an International Mobile Equipment Identity (IMEI) of the smart phone, a mobile phone model, a mobile phone number and the like as identification information of the smart phone; or, the terminal used by the user to send the authorization request may also be a tablet computer, and correspondingly, the authorization request carries information such as a brand and a model of the tablet computer.
S102: and inquiring whether the identification information of the terminal exists in a preset trusted device list to obtain an inquiry result.
The hardware device is pre-stored with a trusted device list for storing identification information of the terminal that can be trusted. And after the hardware equipment receives the identification information of the portable terminal, extracting the identification information of the terminal, inquiring whether the identification information of the terminal exists in the trust equipment list, and obtaining a final inquiry result.
S103: and generating an authorization result according to the query result, and returning the authorization result to the terminal.
And after the hardware equipment obtains the query result, generating an authorization result according to the query result. Specifically, if the hardware device queries that the identification information of the terminal exists in the trusted device list, an authorization result for confirming authorization is generated. That is, the terminal has been authorized, and an authorization result confirming the authorization is fed back to the terminal. At this time, the user of the terminal may perform authorized operations on the hardware device, such as accessing video, files, pictures, and other contents in the hardware device.
Referring to fig. 2, fig. 2 is a flowchart of another authorization method for user operation according to an embodiment of the present invention, where the method further specifically includes, on the basis of each step included in fig. 1:
s201: and if the inquiry result indicates that the identification information of the terminal is not inquired, displaying information requesting authorization on a display screen, wherein the information requesting authorization comprises the identification information of the terminal.
S202: and after the user triggers the operation of confirming the authorization according to the displayed information requesting the authorization, adding the identification information of the terminal into the trusted device list and generating an authorization result of confirming the authorization.
S203: and if the user triggers the operation of refusing the authorization according to the displayed information of requesting the authorization, generating an authorization result of refusing the authorization.
Referring to fig. 3, fig. 3 is a flowchart of another authorization method for user operation according to an embodiment of the present invention, where the method further specifically includes, on the basis of each step included in fig. 1:
s301: and if the inquiry result is that the identification information of the terminal is not inquired, judging whether the terminal belongs to a preset authorization type according to the identification information of the terminal.
S302: and if the terminal is determined to belong to the preset authorization type, adding the identification information of the terminal into the trusted device list, and generating an authorization result for confirming authorization.
S303: and if the terminal is determined not to belong to the preset authorization type, generating an authorization result of refusing authorization.
And if the hardware equipment does not inquire the identification information of the terminal in the trusted equipment list, the terminal is not authorized. In one embodiment, the hardware device displays information requesting authorization by using its own display screen, where the information requesting authorization includes identification information of the terminal. And the manager of the hardware equipment selects whether to authorize the terminal according to the information requesting authorization displayed on the display screen.
In another embodiment, if the hardware device does not inquire the identification information of the terminal in the trusted device list, it is determined whether the terminal belongs to a preset authorization type according to the identification information of the terminal, for example, a manager of the hardware device sets a terminal corresponding to a mobile phone number with the first seven digits being 1382149 as an authorized type in advance. And after determining that the identification information of the terminal carries the mobile phone number with the first seven digits being 1382149, the hardware equipment determines the terminal as an authorized terminal.
And after the hardware equipment authorizes the terminal, adding the identification information of the terminal into the trusted equipment list so that the terminal can be trusted when accessing the hardware equipment again later. And meanwhile, the hardware equipment generates an authorization result for confirming authorization and feeds the authorization result back to the terminal.
And if the user triggers the operation of refusing the authorization according to the displayed information requesting the authorization, or the hardware equipment determines that the terminal does not belong to the preset authorization type, the hardware equipment directly generates an authorization result of refusing the authorization and feeds the authorization result back to the terminal. At this time, the user of the terminal cannot perform an operation such as access to the hardware device.
In the embodiment of the invention, an authorization request from any terminal is received firstly, and the authorization request carries identification information of the terminal. Secondly, whether the identification information of the terminal exists is inquired in a preset trusted device list, and an inquiry result is obtained. And finally, generating an authorization result according to the query result, and returning the authorization result to the terminal. The method for authorizing the user operation provided by the embodiment of the invention enables the hardware equipment to automatically complete the authorization of the user operation without manually inputting verification information by the user, thereby improving the access efficiency of the user to the hardware equipment.
An embodiment of the present invention further provides an authorization apparatus for user operation, referring to fig. 4, where fig. 4 is a schematic structural diagram of an authorization apparatus for user operation provided in an embodiment of the present invention, where the apparatus includes:
a receiving module 401, configured to receive an authorization request from any terminal, where the authorization request carries identification information of the terminal;
an inquiry module 402, configured to inquire whether the identifier information of the terminal exists in a preset trusted device list, to obtain an inquiry result;
a generating module 403, configured to generate an authorization result according to the query result;
a returning module 404, configured to return the authorization result to the terminal.
Specifically, the generating module 403 includes:
and the generation sub-module is used for generating an authorization result for confirming the authorization when the identification information of the terminal exists in the inquiry result.
Referring to fig. 5, fig. 5 is a schematic structural diagram of another authorization apparatus for user operation according to an embodiment of the present invention. The device further comprises, on the basis of including each module in fig. 4:
a display module 501, configured to display information requesting authorization on a display screen when the query result indicates that the identification information of the terminal is not queried, where the information requesting authorization includes the identification information of the terminal;
a first adding module 502, configured to add the identifier information of the terminal to the trusted device list and generate an authorization result of the authorization confirmation after the user triggers an authorization confirmation operation according to the displayed information of requesting the authorization.
The device further comprises:
a second generating module 503, configured to generate an authorization result of rejecting authorization when the user triggers an operation of rejecting authorization according to the displayed information of requesting authorization.
Referring to fig. 6, fig. 6 is a schematic structural diagram of another authorization apparatus for user operation according to an embodiment of the present invention. The device further comprises, on the basis of including each module in fig. 4:
the judging module 601 is configured to judge whether the terminal belongs to a preset authorization type according to the identification information of the terminal when the inquiry result indicates that the identification information of the terminal is not inquired;
a second adding module 602, configured to add, when it is determined that the terminal belongs to a preset authorization type, the identifier information of the terminal to the trusted device list, and generate an authorization result for confirming authorization;
a first generating module 603, configured to generate an authorization result of rejecting authorization when it is determined that the terminal does not belong to a preset authorization type.
The authorization device for user operation provided by the embodiment of the invention can realize the following functions: receiving an authorization request from any terminal, wherein the authorization request carries identification information of the terminal; inquiring whether the identification information of the terminal exists in a preset trusted device list to obtain an inquiry result; generating an authorization result according to the query result; and returning the authorization result to the terminal. The embodiment of the invention enables the hardware equipment to automatically finish the authorization of the user operation without manually inputting the verification information by the user, thereby improving the access efficiency of the user to the hardware equipment.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The authorization method and device for user operation provided by the embodiment of the present invention are described in detail above, and a specific example is applied in the description to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (8)

1. An authorization method for user operation is characterized in that the authorization method is applied to hardware equipment, and the hardware equipment is a video playing terminal or a picture browsing terminal; the method comprises the following steps:
receiving an authorization request from any terminal, wherein the authorization request carries identification information of the terminal;
inquiring whether the identification information of the terminal exists in a preset trusted device list to obtain an inquiry result; the trusted device list is used for storing identification information of terminals which can be trusted;
generating an authorization result according to the query result, and returning the authorization result to the terminal so that a user of the terminal can execute authorized operation on the hardware equipment;
if the query result indicates that the identification information of the terminal is not queried, displaying information requesting authorization on a display screen of the hardware equipment, wherein the information requesting authorization comprises the identification information of the terminal;
and after the manager of the hardware equipment triggers the operation of confirming the authorization according to the displayed information requesting the authorization, adding the identification information of the terminal into the trusted equipment list and generating an authorization result of confirming the authorization.
2. The method of claim 1, wherein generating authorization results based on the query results comprises:
and if the inquiry result is that the identification information of the terminal exists, generating an authorization result for confirming the authorization.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
if the inquiry result indicates that the identification information of the terminal is not inquired, judging whether the terminal belongs to a preset authorization type according to the identification information of the terminal;
if the terminal is determined to belong to the preset authorization type, adding the identification information of the terminal into the trusted device list, and generating an authorization result for confirming authorization;
and if the terminal is determined not to belong to the preset authorization type, generating an authorization result of refusing authorization.
4. The method of claim 1, further comprising:
and if the user triggers the operation of refusing the authorization according to the displayed information of requesting the authorization, generating an authorization result of refusing the authorization.
5. An authorization device for user operation is characterized in that the authorization device is applied to hardware equipment, and the hardware equipment is a video playing terminal or a picture browsing terminal; the device comprises:
a receiving module, configured to receive an authorization request from any terminal, where the authorization request carries identification information of the terminal;
the query module is used for querying whether the identification information of the terminal exists in a preset trusted device list to obtain a query result; the trusted device list is used for storing identification information of terminals which can be trusted;
a generating module, configured to generate an authorization result according to the query result, so that a user of the terminal performs an authorized operation on the hardware device;
a return module, configured to return the authorization result to the terminal;
a display module, configured to display information requesting authorization on a display screen of the hardware device when the query result indicates that the identification information of the terminal is not queried, where the information requesting authorization includes the identification information of the terminal;
and the first adding module is used for adding the identification information of the terminal into the trusted device list and generating an authorization result of the authorization confirmation after the manager of the hardware device triggers the authorization confirmation operation according to the displayed information of requesting the authorization.
6. The apparatus of claim 5, wherein the generating module comprises:
and the generation sub-module is used for generating an authorization result for confirming the authorization when the identification information of the terminal exists in the inquiry result.
7. The apparatus of claim 5 or 6, further comprising:
the judging module is used for judging whether the terminal belongs to a preset authorization type according to the identification information of the terminal when the inquiry result indicates that the identification information of the terminal is not inquired;
the second adding module is used for adding the identification information of the terminal into the trusted device list and generating an authorization result for confirming authorization when the terminal is determined to belong to a preset authorization type;
and the first generation module is used for generating an authorization result of refusing authorization when the terminal is determined not to belong to the preset authorization type.
8. The apparatus of claim 5, further comprising:
and the second generation module is used for generating an authorization result of the authorization rejection when the user triggers the authorization rejection operation according to the displayed information of the authorization request.
CN201610113467.6A 2016-02-29 2016-02-29 Authorization method and device for user operation Active CN107135075B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610113467.6A CN107135075B (en) 2016-02-29 2016-02-29 Authorization method and device for user operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610113467.6A CN107135075B (en) 2016-02-29 2016-02-29 Authorization method and device for user operation

Publications (2)

Publication Number Publication Date
CN107135075A CN107135075A (en) 2017-09-05
CN107135075B true CN107135075B (en) 2020-12-04

Family

ID=59721790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610113467.6A Active CN107135075B (en) 2016-02-29 2016-02-29 Authorization method and device for user operation

Country Status (1)

Country Link
CN (1) CN107135075B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830048A (en) * 2018-06-14 2018-11-16 沈阳东软医疗系统有限公司 A kind of display control method, device and the equipment of the display screen terminal of CT machine
CN111143658A (en) * 2019-12-31 2020-05-12 长城汽车股份有限公司 Method and device for inquiring vehicle state information and vehicle

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102421098A (en) * 2010-09-27 2012-04-18 中国移动通信集团公司 User authentication method, device and system
CN103249045A (en) * 2013-05-13 2013-08-14 华为技术有限公司 Identification method, device and system
CN103415014A (en) * 2013-08-28 2013-11-27 北京网秦天下科技有限公司 Method and device for authenticating mobile terminal
CN104202744A (en) * 2014-08-14 2014-12-10 腾讯科技(深圳)有限公司 Operation authentication method for intelligent terminal, terminal and system
CN104468464A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Authentication method, device and system
CN105100022A (en) * 2014-05-20 2015-11-25 阿里巴巴集团控股有限公司 Cipher processing method, server and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102421098A (en) * 2010-09-27 2012-04-18 中国移动通信集团公司 User authentication method, device and system
CN103249045A (en) * 2013-05-13 2013-08-14 华为技术有限公司 Identification method, device and system
CN103415014A (en) * 2013-08-28 2013-11-27 北京网秦天下科技有限公司 Method and device for authenticating mobile terminal
CN104468464A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Authentication method, device and system
CN105100022A (en) * 2014-05-20 2015-11-25 阿里巴巴集团控股有限公司 Cipher processing method, server and system
CN104202744A (en) * 2014-08-14 2014-12-10 腾讯科技(深圳)有限公司 Operation authentication method for intelligent terminal, terminal and system

Also Published As

Publication number Publication date
CN107135075A (en) 2017-09-05

Similar Documents

Publication Publication Date Title
CN109246604B (en) Intelligent device safety binding method, server, intelligent device and user side device
US20180041893A1 (en) Method and system of multi-terminal mapping to a virtual sim card
CN113132973B (en) Equipment network distribution method and system and computer readable storage medium
CN108293181B (en) Processing method for binding communication identifier and terminal
US11075895B2 (en) Cloud operation interface sharing method, related device, and system
CN104967997A (en) Wireless network accessing method, Wi-Fi equipment, terminal equipment and system
US20140310741A1 (en) System for sharing data via cloud server and method thereof
CN105306320B (en) A kind of method and device for binding client for smart machine
CN108093277B (en) Method for accessing broadcast television system
CN108234257B (en) Household appliance pairing method, household appliance and mobile terminal
CN106301772A (en) Cipher set-up method, device and for arranging the device of password
CN105744517A (en) Information authentication method and network side device
CN104486417A (en) Account security management system and method based on cloud service
CN105743844A (en) Information processing method and electronic device
CN112929224A (en) Network distribution method and device of equipment, server and computer readable storage medium
WO2017084456A1 (en) Wifi hotspot processing method, device and system
CN104850971B (en) Correlation method and device of order information and logistics information
CN109726545B (en) Information display method, equipment, computer readable storage medium and device
CN106453349A (en) An account number login method and apparatus
CN106534349B (en) Method and device for associating Internet of things equipment with user account
CN109858235B (en) Portable equipment and password obtaining method and device thereof
CN107135075B (en) Authorization method and device for user operation
CN110198540B (en) Portal authentication method and device
CN110855750B (en) Downloading method of software development kit and related equipment
CN106921629A (en) Application program login method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200918

Address after: No. 181, erbatou, taimuyang village, Qinyu Town, Fuding City, Ningde City, Fujian Province

Applicant after: Chen Ximei

Address before: 1, building A, No. 201, front Bay Road, Qianhai, Shenzhen Shenzhen cooperation zone, Guangdong 518052, China

Applicant before: SHENZHEN SHOWBOOM TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201113

Address after: 322000 1st floor, No.3, building 20, Qiyi village, Chengxi street, Yiwu City, Jinhua City, Zhejiang Province

Applicant after: Yiwu Lansi sporting goods Co.,Ltd.

Address before: No. 181, erbatou, taimuyang village, Qinyu Town, Fuding City, Ningde City, Fujian Province

Applicant before: Chen Ximei

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240507

Address after: Room 2A, Science and Technology Building, No. 968 Xuefeng West Road, Beiyuan Street, Yiwu City, Jinhua City, Zhejiang Province, 322000

Patentee after: Zhejiang Jinguo Intellectual Property Co.,Ltd.

Country or region after: China

Address before: 322000 1st floor, No.3, building 20, Qiyi village, Chengxi street, Yiwu City, Jinhua City, Zhejiang Province

Patentee before: Yiwu Lansi sporting goods Co.,Ltd.

Country or region before: China