Authorization method and device, electronic equipment and storage medium

A technology for authorization files and authorization information, applied in the computer field, can solve problems such as poor data security, and achieve the effects of improving data security, improving data transmission efficiency, and reducing the number of interactions

Active Publication Date: 2021-08-10
BEIJING SENSETIME TECH DEV CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in related technologies, when HTTPS service access is limited or not availab...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method and device, electronic equipment and storage medium
  • Authorization method and device, electronic equipment and storage medium
  • Authorization method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Various exemplary embodiments, features, and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. The same reference numbers in the figures indicate functionally identical or similar elements. While various aspects of the embodiments are shown in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.

[0068] The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as superior or better than other embodiments.

[0069] The term "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and there exists alone B these three situations. In addition, the term "at least one" herein mean...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authorization method and device, electronic equipment and a storage medium, and the method is applied to a client, and comprises the steps: generating a first ciphertext and a first secret key according to an authorization file, a first encryption algorithm and a configuration parameter of the client under the condition that the client loads the authorization file of a software development kit; generating an authorization request according to the authorization file, the first ciphertext and the first key; sending the authorization request to a server; under the condition that authorization information sent by the server is received, authorizing the client according to the authorization file and the authorization information, so that the client runs the software development kit. According to the embodiment of the invention, one-time pad can be realized during data transmission, the data security is improved, the number of times of interaction between the client and the server can be reduced, and the data transmission efficiency is improved.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and in particular to an authorization method and device, electronic equipment and a storage medium. Background technique [0002] When transmitting data on the Internet, the data can usually be encrypted and protected through the HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer) based on the Secure Sockets Layer. However, in related technologies, when HTTPS service access is limited or not available, data will be transmitted in plain text on the Internet, resulting in poor data security. Contents of the invention [0003] The disclosure proposes an authorization technical solution. [0004] According to an aspect of the present disclosure, an authorization method is provided, the method is applied to a client, and the method includes: when the client loads an authorization file of a software development kit, according to the authorization file, The first encryption algo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/10H04L63/0428H04L63/08H04L9/3247H04L67/02
Inventor 闫海成周明骏周桓庄汉阳王延
Owner BEIJING SENSETIME TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products