Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization management method and device

A technology of authorization management and authorization files, which is applied in the field of communication, can solve problems such as affecting client authorization, prone to errors, and reducing user experience.

Active Publication Date: 2021-01-08
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the data transmission process between the authorization server and the non-authorized client is prone to errors, which affects the authorization of the non-authorized client and reduces the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization management method and device
  • Authorization management method and device
  • Authorization management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, not all of them. Based on the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present application.

[0065] The authorization management method provided by the embodiment of the present invention can be applied in figure 1 In the authorization management architecture shown, the architecture may include a terminal to be authorized, an intermediate transmission terminal, and an authorization server of a target application.

[0066] Wherein, the terminal to be authorized has no communication connection with the authorization server; the intermediate tran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization management method and device. The method comprises the following steps: in a scene that no communication connection exists between a to-be-authorized terminaland an authorization server of a target application, after the to-be-authorized terminal acquires an authorization related file of the target application and equipment information of the to-be-authorized terminal, encrypting an object identifier and the equipment information by adopting an object authentication key to generate a first verification value; transmitting the address of the authorization server and the authorization verification file of the target application to an intermediate transmission terminal, so that the intermediate transmission terminal accesses the authorization server;if the authorization file sent by the authorization server and received by the intermediate transmission terminal is obtained, performing signature verification on the authorization file by adopting an authorization authentication public key; and when the signature verification succeeds, determining that the authorization of the target application is obtained. According to the method, data transmission between the to-be-authorized terminal and the authorization server is realized through the intermediate transmission terminal, so that the to-be-authorized terminal is authorized, and the user experience is improved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to an authorization management method and device. Background technique [0002] In order to implement software authorization, an application client is deployed on the device, and the application client collects device information, such as a Media Access Control Address (MAC) address, etc., and sends the device information to the application server. The application server on the service provider side uses the device information to generate a license file, and sends the license file to the application client. The application client uses the license file to run the application software, so as to realize the normal use of the software. [0003] At present, the method of authorization management for application software is mainly to control the authorized quantity of application software, that is, an authorized software only allows a specific number of clients to re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/08H04L67/06
Inventor 安晓江蒋红宇胡伯良
Owner BEIJING HAITAI FANGYUAN HIGH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products