Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application authorization verification method, device and system

A verification method and a technology of authorization documents, which are applied in computer security devices, digital data authentication, program/content distribution protection, etc., and can solve problems such as inability to apply authorization protection

Active Publication Date: 2020-01-07
ANHUI IFLYREC TECH CO LTD
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a verification method, device and client for application authorization, with the purpose of solving the problem that existing authorization methods cannot effectively authorize and protect applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application authorization verification method, device and system
  • Application authorization verification method, device and system
  • Application authorization verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0049] Such as figure 1 As shown in , it is a schematic diagram of a client architecture provided by the embodiment of this application, including:

[0050] Launcher 100 and daemon service 200 .

[0051] The launcher 100 and the guardian service 200 can be set in the client of the application (for the sake of distinction, the client is excluded from figure 1 Other parts outside the device shown are referred to as applications), therefore, figure 1 The client in also includes applic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an application authorization verification method, a device and a system. The method comprises the steps of verifying the authorization file of the application based on the starting request of the application, triggering the application to send a service request under the condition that the verification of the authorization file is passed, verifying whether the application iswithin the authorization authority or not according to the authorization file, and forbidding the application to respond to the service request if the application is determined not to be within the authorization authority. Since the service request is triggered according to the authorization file and then whether the application is within the authorization authority is further verified accordingto the authorization file, the application can respond to the service request only when the authorization file is legal and the application is within the authorization authority. Visibly, even if theapplication is started by means of a command line and the like based on the characteristics of the pseudo CS architecture, the service request sent by the application can be responded only after authority verification, so that the problem that the service request bypasses authorization verification can be effectively avoided, and the application of the pseudo CS architecture is subjected to authorization protection.

Description

technical field [0001] The present application relates to the technical field of authorization mechanism, in particular to a verification method, device and client for application authorization. Background technique [0002] With the rapid development of the Internet, the concept of software (usually in the form of applications, hereinafter collectively referred to as applications) protection becomes more and more important. Application authorization means that the producer of the application provides the user with the permission to use the application, and the permission includes the period of use and / or functions, etc. For example, if a user purchases a one-year application period, the manufacturer of the application authorizes the user to use the application until one year after registration. At present, the authorization file is usually used to record the user's authority, that is, the authorization file is sent to the client, and the application of the client runs acco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12G06F21/44
CPCG06F21/121G06F21/44
Inventor 王强
Owner ANHUI IFLYREC TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products