Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

143 results about "Authorization documentation" patented technology

System for sharing and distributing reliable data in multiple internet of vehicles

InactiveCN108322488AEnsure secure interconnectionAchieve sharingTransmissionPrivacy protectionThe Internet
The invention provides a system for sharing and distributing reliable data in multiple internet of vehicles and belongs to the field of internet of vehicles. The system comprises a reliable data sharing and distributing server, an internet of vehicles terminal agency, a certification and authentication system and a content management system, wherein the certification and authentication system is used for carrying out access control of the internet of vehicles and generating access authorization files; the content management system is used for defining processes, defining message and file interfaces and controlling data types and formats, forwarding rate, secure transfer protocols, privacy protection protocols and communication interface requirements; the internet of vehicles terminal agency is installed on an internet of vehicles terminal access gateway and is used for receiving data submitted by users or devices of a source internet of vehicles, generating forwarding data packets andsending the forwarding data packets to the reliable data sharing and distributing server; a reliable data counting server is used for checking, storing, converting and forwarding the received data toa target internet of vehicles. The system is capable of sharing and distributing the reliable data in multiple internet of vehicles as well as ensuring secure interconnection among the multiple internet of vehicles.
Owner:广州市联奥信息科技有限公司

Application usage policy enforcement

Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application distributor creates a unique proof of purchase receipt. This receipt can be bundled with the application and delivered to the purchaser. Each machine can maintain an authorization file that lists the users authorized to use applications on that machine. A system configured to practice the method verifies that a user is authorized to use an application on a machine based on an application proof of purchase receipt and the authorization file. If the application proof of purchase receipt and the authorization file are both valid, the system checks if the user account identifier in the receipt is contained in the authorization file. If so, the user can be considered authorized to use the application on the machine.
Owner:APPLE INC

Software authorization method and device, authorization server and terminal equipment

The invention discloses a software authorization method and device, an authorization server and terminal equipment, and relates to the technical field of computers. The software authorization method comprises the steps that: under the condition that USBkey equipment access is detected, the authorization server acquires identification information of to-be-authorized terminal equipment; wherein theUSBkey equipment comprises authorization information of target software; signing the identification information by using private key information in the authorization information to generate an authorization file of the terminal equipment; and sending the generated authorization file and public key information in the authorization information to the terminal equipment. According to the scheme provided by the invention, the authorization of the authorization server to the target software of the plurality of terminal equipment is realized, and the problems that a local software authorization modeis poor in flexibility and an online authorization mode is not suitable for the terminal equipment which are not allowed to be networked are solved.
Owner:DATANG GAOHONG XINAN ZHEJIANG INFORMATION TECH CO LTD

Authorization control method and device, authorization method and device and computing equipment

The invention discloses an authorization control method, which comprises the steps of receiving an authorization request sent by a client based on an application file, and obtaining an application ciphertext, first signature information and a first public key from the application file; verifying the first signature information based on the first public key; decrypting the application ciphertext based on the second private key to obtain a device identifier of the client, and generating corresponding device information based on the device identifier; establishing association between the authorization configuration information and the equipment information to generate an authorization file; sending the authorization file to the client, so that the client activates the application program based on the authorization file; and regularly obtaining the actual running duration of the client, and judging whether the actual running duration exceeds the preset running duration of the application program or not so as to determine whether the application program authorization expires or not. The invention also discloses a corresponding authorization method, an authorization device and computing equipment. The authorization scheme provided by the invention can be used for an intranet environment, and can prevent leakage and reuse of authorization information.
Owner:UNIONTECH SOFTWARE TECH CO LTD

File storage and access method and system based on block chain

The invention discloses a file storage and access method and system based on a block chain, and the method comprises the steps: carrying out file partitioning, carrying out file encryption signature,carrying out file information chaining, carrying out file access authorization, carrying out file reconstruction and sharing, and finally transmitting a reconstruction target file to an access user inan encrypted manner for related reading or writing operation. Separated file storage and a file management mechanism based on a blockchain smart contract are adopted, the file access permission management module utilizes the main characteristics of openness, transparency, tamper resistance and the like of a blockchain, and the security and traceability of file access are effectively enhanced. Bydividing the file into a plurality of sub-files and encrypting the sub-files with different private keys, the file can be prevented from being operated unidirectionally. Meanwhile, the sub-file related information is encrypted and stored in the block chain and cannot be tampered, so that the security of the file information is greatly enhanced.
Owner:深圳市乾数科技有限公司

System and method for counting digital content

The invention discloses a digital content counting system and a method thereof for building the believable dealing counting mechanism between the copyright owner and the seller to make the two parties recognize the dealing information of the digital content. The system includes a selling subsystem, an authorization subsystem and a dealing reckoning subsystem, wherein the selling subsystem and the dealing reckoning subsystem are authenticated with the authorization subsystem each other; the dealing reckoning subsystem certificates the selling subsystem; the selling subsystem is used to generate the dealing request information and transmit to the authorization subsystem by authentication according to the purchase list, record the dealing success information; the authorization subsystem is used to receive and affirm the dealing request information to transmit the dealing success information to the client-end device, the selling subsystem and the dealing reckoning subsystem by authentication, and transmit the acquisition path of the authorization file to the client-end device, record the dealing request information, grant the authorization file; the dealing reckoning subsystem is used to record the dealing success information.
Owner:PEKING UNIV +2

Digital resource copyright protection method, opening method and device, and hardware storage device

The invention provides a digital resource copyright protection method and device. Digital resource content encryption is carried out to a digital resource by means of a first secret key; the first secret key is encrypted by means of a second secret key, and an encryption certificate is generated in dependence on encrypted information; the encrypted digital resource and the encryption certificate are sent to each hardware storage device; the second secret key is bound with a unique identification of the hardware storage devices, and an authorization file of the hardware storage devices is generated. According to the scheme, when the digital resource is licensed to a plurality of mobile terminals in a batch manner, only two times of encryption work are needed, one authorization certificate is made for each hardware storage device, encryption in a batch manner is achieved, time spending on binding the hardware storage devices with the digital resource is greatly reduced, the production efficiency of massive copyright protection resources based on bound storage devices is improved, the production cost is reduced, at the same time, resource copyright protection is guaranteed, the resource is prevented from being copied and embezzled, and dependence of hardware resource protection on hardware equipment is avoided.
Owner:PEKING UNIV FOUNDER GRP CO LTD +1

Method and device for preventing unauthorized use of software, equipment and storage medium

InactiveCN111159656AAuthorization verification implementationSolve the problem that the software cannot be verifiedProgram/content distribution protectionSoftware engineeringVerification
The embodiment of the invention relates to the technical field of information safety, in particular to a method and device for preventing software from being used in an unauthorized mode, equipment and a storage medium. The invention discloses a method capable of preventing unauthorized use of software. The method comprises the following steps: acquiring a related authorization file of the software; obtaining the deadline and the effective equipment recognition information of the software from the authorization file; acquiring current time and hardware recognition information of hardware equipment to be operated by software; identifying information according to the current time and hardware; and judging whether the software is allowed to run or not according to the deadline of the softwareand the effective equipment information. Whether the software is allowed to run or not can be judged according to the current time, the hardware recognition information of the hardware equipment to be run by the software, the deadline and the effective equipment information; according to the method and the device, networking is not needed, authorization verification of the software can be completed locally, and the problem that in the prior art, if equipment cannot be networked, the software cannot be authenticated is solved.
Owner:核芯互联科技(青岛)有限公司

Access system, access device and access method for accessing health information

An access system, an access device and an access method for accessing health information are disclosed. The access system includes a decentralized database for recording an authorization file corresponding to health information and a public key corresponding to the authorization file, a centralized database for using the public key corresponding to the authorization file to encrypt and store the health information corresponding to the authorization file into an access space, and an access device for issuing an access request of health information to the decentralized database based on user identification, for the decentralized database to identify and authorize the user identification based on the authorization file corresponding to the health information and ratify the access request and provide an instruction after identifying and authorizing the user identification, and for acquiring the encrypted health information from the access space based on the instruction.
Owner:IND TECH RES INST

Billing point verification method and system

The invention discloses a billing point verification method and system. The system comprises a mobile phone terminal, a security billing server and an authorization server. The mobile phone terminal comprises an application and a proxy billing module. The method comprises the steps that S1, when the application runs to a billing point, the proxy billing module is called; S2, the proxy billing module generates a query data packet and sends the query data packet to the authorization server; S3, the authorization server returns a query result data packet; S4, the security billing server sends an unauthorized message packet to the application or generates an authorization document summary according to the query result data packet; S5, the security billing server acquires a timestamp; S6, the security billing server sets authorization document generation and effective time; S7, the security billing server generates an authorization document and sends the authorization document to the proxy billing module; and S8, the proxy billing module saves the authorization document. A user actively initiates service billing. The billing point of the application has the characteristics of faking prevention, repudiation prevention and the like.
Owner:卓望数码技术(深圳)有限公司

Application program authentication method and system

The invention is suitable for the technical field of software, and provides an application program authentication method and system. The method comprises the steps: receiving an authentication requestof an application program; wherein the authentication request is generated by calling an authorization file package when the application program is started or operated; obtaining an authorization code and authorization request time according to the authentication request; if the authorization code is consistent with the bound authorization code and the authorization request time meets a preset time condition, sending the authorization request to a server; if so, passing the authentication request; centralized authorization management is provided for a large number of application programs; when an application program is started or operated, an assigned authorization file package is called to realize authorization verification when a service is started and timing authorization verificationwhen the service is operated; and verifying whether the application program is a service program in an authorization period or not based on the verification request, thereby realizing the purposes ofremotely performing authorization management and timed use management on the service program.
Owner:深圳智链物联科技有限公司

Authorization management method and device

The invention discloses an authorization management method and device. The method comprises the following steps: in a scene that no communication connection exists between a to-be-authorized terminaland an authorization server of a target application, after the to-be-authorized terminal acquires an authorization related file of the target application and equipment information of the to-be-authorized terminal, encrypting an object identifier and the equipment information by adopting an object authentication key to generate a first verification value; transmitting the address of the authorization server and the authorization verification file of the target application to an intermediate transmission terminal, so that the intermediate transmission terminal accesses the authorization server;if the authorization file sent by the authorization server and received by the intermediate transmission terminal is obtained, performing signature verification on the authorization file by adopting an authorization authentication public key; and when the signature verification succeeds, determining that the authorization of the target application is obtained. According to the method, data transmission between the to-be-authorized terminal and the authorization server is realized through the intermediate transmission terminal, so that the to-be-authorized terminal is authorized, and the user experience is improved.
Owner:BEIJING HAITAI FANGYUAN HIGH TECH

Application software authority management method and device, server and storage medium

The invention discloses an authority management method and device for application software, a server and a storage medium, the method is applied to the server, and the method comprises the following steps: acquiring MAC address information of terminal equipment installed with the application software; inquiring whether a special permission file corresponding to the MAC address information exists or not in a database, wherein the special permission file is an authorization file corresponding to the application software and generated according to record information after the server receives therecord information of the application software; if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file; and if the special permission file of the MAC address information exists in the database, controlling the terminal equipment to configure a corresponding special permission for the application software according to the special permission file.
Owner:LAUNCH TECH CO LTD

License authorization method and device

The invention provides a permission authorization method and device, and the method comprises the steps: obtaining an equipment identifier based on salting encryption and an information abstract algorithm; sending an authorization request to an authorization service center based on the equipment identifier, and receiving an authorization file returned by the authorization service center based on the authorization request; the authorization file is decrypted and verified, and authorization is carried out based on verification success; storing authorization information and activation time based on authorization, and recording system time based on a time iterator; and obtaining a permission expiration result based on the system time and the activation time, and judging whether to re-authorize according to the permission expiration result. According to the method and the device, the obtained equipment identifier is sent to the authorization service center to obtain the authorization file, so that the authorization file is used for authorizing the corresponding product, the leakage risk is further reduced, the safety is further improved, and the use copyright of the system and the rights and interests of developers are more effectively protected.
Owner:北京安帝科技有限公司

Application authorization verification method, device and system

ActiveCN110659457AAvoid issues with bypassing authorization verificationDigital data authenticationProgram/content distribution protectionEngineeringAuthorization
The invention provides an application authorization verification method, a device and a system. The method comprises the steps of verifying the authorization file of the application based on the starting request of the application, triggering the application to send a service request under the condition that the verification of the authorization file is passed, verifying whether the application iswithin the authorization authority or not according to the authorization file, and forbidding the application to respond to the service request if the application is determined not to be within the authorization authority. Since the service request is triggered according to the authorization file and then whether the application is within the authorization authority is further verified accordingto the authorization file, the application can respond to the service request only when the authorization file is legal and the application is within the authorization authority. Visibly, even if theapplication is started by means of a command line and the like based on the characteristics of the pseudo CS architecture, the service request sent by the application can be responded only after authority verification, so that the problem that the service request bypasses authorization verification can be effectively avoided, and the application of the pseudo CS architecture is subjected to authorization protection.
Owner:ANHUI IFLYREC TECH CO LTD

Cross-platform terminal authorization management method and system

InactiveCN110737884AImprove securitySafe and efficient authorization issuanceDigital data authenticationTransmissionTerminal equipmentEngineering
The embodiment of the invention provides a cross-platform terminal authorization management method and a system, and the method comprises the steps: obtaining business code information and terminal management information through an authorization management platform, and storing the business code information and the terminal management information of terminal equipment; generating an authorizationcode with a preset digit through an authorization service unit based on the service code information; establishing an authorization file database in the authorization service unit, wherein the authorization file database is used for storing all authorization files; wherein the service code information is in one-to-one correspondence with the authorization files; and receiving the authorization code by using terminal equipment, extracting a corresponding authorization file from an authorization file database by using the authorization code, and finishing authorization authentication of the terminal in combination with the terminal management information. According to the method of the invention, safe and efficient authorization issuing and management are directly carried out on various terminals, so that unified management of terminal software authorization is achieved.
Owner:武汉普利商用机器有限公司 +1

Software authorization method and system and storage medium

The embodiment of the invention discloses a software authorization method and system and a storage medium. The method comprises the steps that a software authorization party generates an authorization file according to received equipment information and corresponding authorization information; the software authorization party returns the authorization file and the software version to an equipment manufacturer; The equipment manufacturer integrates the software version and the authorization file according to requirements; and after the equipment runs, the software loads an authentication module and performs authorization verification, the equipment runs normally if the authorization verification succeeds, and otherwise, the equipment stops running. The authorization file can be preset, a user does not need to manually input an activation code, and the method is more suitable for equipment without key input or interface; off-line authorization simplifies the server authorization link and reduces the development and maintenance cost of the server. Batch authorization can be performed on equipment models, manufacturers, software versions and the like, and independent authorization can also be performed on a chip ID, a network card address and the like of single equipment; multiple signature verification and multiple encryption algorithms are used in authorization and authentication, and cracking is not prone to occurring.
Owner:北京朝歌数码科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products