Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service authorization method, equipment and system

A technology for authorizing equipment and services, applied in transmission systems, user identity/authority verification, electrical components, etc., to achieve flexible and changeable communication methods

Active Publication Date: 2015-02-11
ADVANCED NEW TECH CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of this application is to provide a business authorization method, device and system to solve the problem existing in the prior art that the business server must authenticate the user and authorize information interaction through the real-time online client, wherein:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service authorization method, equipment and system
  • Service authorization method, equipment and system
  • Service authorization method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0046] (The process of applying for offline authorization business)

[0047] Such as Figure 2A As shown, in step S201, the application information of the service authorization application from the client is received through the first communication link. In other words, an application for an offline authorization service is issued from the client, and application information related to the application is sent to the authorization core device through a near-field communication link such as a sound wave.

[0048] Specifically, step S201 includes such as figure 1 Issuing Offline Authorization Requests is shown in this section.

[0049] [Issue Offline Authorization Request]

[0050] In security scenarios such as identity confirmation and authorization, whenever the client generates an offline authorization application, it will generate a unique business serial number to be authorized, and send the waiting list to the real-time online authorized verification device through a nea...

Embodiment approach 2

[0070] In Embodiment 1, the procedure of service authorization of a common authorization level that does not require high security is described. When high security requirements are required, offline service authorization with a higher authorization level can be realized by setting an offline authorization password.

[0071] Below, refer to figure 1 , Figure 2A and Figure 2B To illustrate the use of offline authorization passwords. In this embodiment, differences from Embodiment 1 will be described in detail, and the same points as Embodiment 1 will be omitted. For the points in the second embodiment that are the same as those in the first embodiment, the same reference numerals as those in the first embodiment are used.

[0072] Figure 2B It is a schematic flow chart of a high authorization level service authorization method according to an embodiment of the present application. Specifically, in Embodiment 2, using Figure 2B In step S212 to replace Figure 2A Step ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a service authorization method, equipment and system. The service authorization method includes: receiving application information of a service authorization application from a client; sending the application information to a service server, and receiving from the service server information to be signed which is obtained based on the application information; sending the information to be signed to the client, and receiving from the client countersign information obtained based on the information to be signed; and sending the countersign information to the service server, receiving a signature verification result of the countersign information from the service server, and deciding whether to approve the service authorization application according to the signature verification result. A communication link with the client is a first communication link, and a communication link with the service server is a second communication link. By adoption of the technical scheme of the service authorization method, an off-line authorization service between the client and the service server can be realized.

Description

technical field [0001] The present application relates to the technical field of mobile communication security, in particular to a service authorization method, device and system. Background technique [0002] In traditional offline or Internet scenarios, when information is exchanged between the user's client and the service server, the service server needs to authenticate the user and authorize the information exchange. In this case, the requirements for the use of the user's client are relatively high, that is, the user's client is required to be online in real time, so as to realize the identity authentication of the user and the authorization of information interaction by the service server. [0003] However, whether using a wired network or a wireless network to access the Internet, there are situations where the signal is interrupted due to a hardware or software device failure, which will inevitably affect the information interaction between the client and the servic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04L9/32H04L29/06
CPCH04L63/0892
Inventor 曹恺
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products