An encryption authorization scheme of an algorithm library
An algorithm library and authorization request technology, applied in the field of encryption authorization method of algorithm library, can solve the problems of difficult to set charging price, loss of algorithm supplier, falsely reported authorization quantity, etc. The effect of authorization management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] see figure 1 , an algorithm library encryption authorization method, the algorithm library is installed on a client device, and when the client device enables the algorithm library, the following steps are performed:
[0030] Detect whether the authentication file is stored in the client device, if there is, execute the decoding step; if not, send an authorization request: collect the identification information of the client device, and then together with the account information and token of the client device (Chinese translation: order card) to the background server, the background server verifies the validity of the authorization request by verifying the account information and token, after the verification is passed, calls the core parameters corresponding to the algorithm library from the background server, and then combines the device identification information to create an authentication file , and then sent to the client device; the client device saves the receiv...
Embodiment 2
[0041] An encryption authorization system for an algorithm library, including a client device and a background server, the client device is loaded with an algorithm library;
[0042] see figure 1 , when the client device enables the algorithm library, it detects whether the authentication file is stored in the client device, and if so, decodes it; if not, sends an authorization request: collect the identification information of the client device, and then together with the client device account The information and the token are sent to the backend server together; the backend server confirms the legitimacy of the authorization request by verifying the account information and the token, and after the verification is passed, calls the core parameters corresponding to the algorithm library from the backend server, and then combines the device identification information making an authentication file, and then sending it to the client device; the client device saves the received au...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com