CN104753864A - Permission validation system and permission validation method - Google Patents

Permission validation system and permission validation method Download PDF

Info

Publication number
CN104753864A
CN104753864A CN201310741208.4A CN201310741208A CN104753864A CN 104753864 A CN104753864 A CN 104753864A CN 201310741208 A CN201310741208 A CN 201310741208A CN 104753864 A CN104753864 A CN 104753864A
Authority
CN
China
Prior art keywords
authority
information
authorisation device
terminal
facility information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310741208.4A
Other languages
Chinese (zh)
Inventor
高超霖
李平立
龚健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Founder International Co Ltd
Founder International Beijing Co Ltd
Original Assignee
Peking University
Founder International Co Ltd
Founder International Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University, Founder International Co Ltd, Founder International Beijing Co Ltd filed Critical Peking University
Priority to CN201310741208.4A priority Critical patent/CN104753864A/en
Publication of CN104753864A publication Critical patent/CN104753864A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a permission validation system, which comprises a reading unit, a comparison unit, an information generation unit, and an authorization file acquisition unit, wherein the reading unit is used for reading equipment information of a terminal when an authorization file acquisition request of the terminal is received; the comparison unit is used for comparing the equipment information and authorization equipment information stored in a server and judging whether the equipment information and authorization equipment information are matched; the information generation unit is used for controlling the server to acquire the stored authorization file when the equipment information and authorization equipment information are not matched and generating new authorization equipment information matched with the equipment information according to the authorization file; and the authorization file acquisition unit is used for acquiring the authorization file from the server according to the equipment information and the new authorization equipment information and sending the authorization file to the terminal. Correspondingly, the invention also provides a permission validation method. Through the technical scheme, information security of the authorization file can be ensured, and the authorization file can be prevented from being acquired at multiple terminals at the same time.

Description

Authority Verification system and method for verifying authority
Technical field
The present invention relates to empowerment management technical field, in particular to a kind of Authority Verification system and a kind of method for verifying authority.
Background technology
Along with the maturation of mobile Internet, based on mobile terminal carry out mobile reading be dissolved into gradually people life in, and caricature as reading content a part also accept by people.
At present, if user obtains the mandate of certain caricature, then can download in any terminal or check this caricature, be not easy to the management of distributors like this, be also unfavorable for the safety of authority.
Therefore, need a kind of new technical scheme, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously, be convenient to distributors and caricature is managed.
Summary of the invention
The present invention, just based on the problems referred to above, proposes a kind of new technical scheme, can ensure the information security of authority, avoids authority to be acquired over multiple terminals simultaneously.
In view of this, the present invention proposes a kind of Authority Verification system, comprising: reading unit, during for obtaining request in the authority receiving terminal, reading the facility information of described terminal; Contrast unit, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate; Information generating unit, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority; Transmitting element, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
In this technical scheme, when user uses terminal to when having the file reading authority to download or check, system can be compared according to the authorisation device information stored in the facility information of user terminal and server, if the facility information of this terminal (i.e. device-fingerprint) and authorisation device information (namely authorizing fingerprint) coupling, then illustrate that this terminal can be downloaded or check authority, if both do not mate, then can regenerate the authorisation device information of mating with this terminal according to authority, namely mandate fingerprint is changed, and at one time, a terminal is only allowed to be connected with server and to obtain authority, like this, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
In technique scheme, preferably, also comprise: judging unit, when described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset; Processing unit, when the judged result of described judging unit is for being, allows described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
In this technical scheme, authorisation device information there is certain effective time, therefore, when after the facility information and authorisation device information matches of terminal, need to judge current time whether within this effective time, if within this effective time, then illustrate that this authorisation device information also has activity, namely terminal can read authority, if current time has exceeded this effective time, then terminal cannot read authority.
In technique scheme, preferably, also comprise: administrative unit, when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
In this technical scheme, when the configuration information of server is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating new authorisation device file, like this, at one time, just only have an equipment to read authority, ensure the safety of authority.
In technique scheme, preferably, described contrast unit also comprises: mark generates subelement, generates the first identification code according to described facility information, generate the second identification code according to described authorisation device information, judge whether described first identification code and described second identification code can offset; Result judges subelement, when described first identification code and described second identification code can offset, be judged to be described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
In technique scheme, preferably, described facility information comprises mark and/or the NIC address of terminal.
In this technical scheme, facility information includes, but are not limited to mark and/or the NIC address of terminal, can also be the information relevant to terminal.
According to a further aspect in the invention, additionally provide a kind of method for verifying authority, comprising: step 202, when the authority receiving terminal obtains request, read the facility information of described terminal; Step 204, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate; Step 206, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority; Step 208, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
In this technical scheme, when user uses terminal to when having the file reading authority to download or check, system can be compared according to the authorisation device information stored in the facility information of user terminal and server, if the facility information of this terminal (i.e. device-fingerprint) and authorisation device information (namely authorizing fingerprint) coupling, then illustrate that this terminal can be downloaded or check authority, if both do not mate, then can regenerate the authorisation device information of mating with this terminal according to authority, namely mandate fingerprint is changed, and at one time, a terminal is only allowed to be connected with server and to obtain authority, like this, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
In technique scheme, preferably, also comprise: when described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset; When the described current request time is within the scope of described default activity time, allow described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
In this technical scheme, authorisation device information there is certain effective time, therefore, when after the facility information and authorisation device information matches of terminal, need to judge current time whether within this effective time, if within this effective time, then illustrate that this authorisation device information also has activity, namely terminal can read authority, if current time has exceeded this effective time, then terminal cannot read authority.
In technique scheme, preferably, also comprise: when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
In this technical scheme, when the configuration information of server is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating new authorisation device file, like this, at one time, just only have an equipment to read authority, ensure the safety of authority.
In technique scheme, preferably, described step 204 also comprises: generate described first identification code according to described facility information, generate the second identification code, judge whether described first identification code and described second identification code can offset according to described authorisation device information; When described first identification code and described second identification code can offset, judge described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
In technique scheme, preferably, described facility information comprises mark and/or the NIC address of terminal.
In this technical scheme, facility information includes, but are not limited to mark and/or the NIC address of terminal, can also be the information relevant to terminal.
By above technical scheme, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
Accompanying drawing explanation
Fig. 1 shows the block diagram of authority checking system according to an embodiment of the invention;
Fig. 2 shows the flow chart of authority checking method according to an embodiment of the invention;
Fig. 3 shows the particular flow sheet of authority checking method according to an embodiment of the invention;
Fig. 4 shows the functional schematic of hardware agent according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the block diagram of authority checking system according to an embodiment of the invention.
As shown in Figure 1, Authority Verification system 100 according to an embodiment of the invention, comprising: reading unit 102, during for obtaining request in the authority receiving terminal, reads the facility information of described terminal; Contrast unit 104, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate; Information generating unit 106, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority; Transmitting element 108, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
In this technical scheme, when user uses terminal to when having the file reading authority to download or check, system can be compared according to the authorisation device information stored in the facility information of user terminal and server, if the facility information of this terminal (i.e. device-fingerprint) and authorisation device information (namely authorizing fingerprint) coupling, then illustrate that this terminal can be downloaded or check authority, if both do not mate, then can regenerate the authorisation device information of mating with this terminal according to authority, namely mandate fingerprint is changed, and at one time, a terminal is only allowed to be connected with server and to obtain authority, like this, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
In technique scheme, preferably, also comprise: judging unit 110, when described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset; Processing unit 112, when the judged result of described judging unit 110 is for being, allows described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
In this technical scheme, authorisation device information there is certain effective time, therefore, when after the facility information and authorisation device information matches of terminal, need to judge current time whether within this effective time, if within this effective time, then illustrate that this authorisation device information also has activity, namely terminal can read authority, if current time has exceeded this effective time, then terminal cannot read authority.
In technique scheme, preferably, also comprise: administrative unit 114, when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
In this technical scheme, when the configuration information of server is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating new authorisation device file, like this, at one time, just only have an equipment to read authority, ensure the safety of authority.
In technique scheme, preferably, described contrast unit 104 also comprises: mark generates subelement 1042, generates the first identification code according to described facility information, generate the second identification code according to described authorisation device information, judge whether described first identification code and described second identification code can offset; Result judges subelement 1044, when described first identification code and described second identification code can offset, be judged to be described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
In technique scheme, preferably, described facility information comprises mark and/or the NIC address of terminal.
In this technical scheme, facility information includes, but are not limited to mark and/or the NIC address of terminal, can also be the information relevant to terminal.
Fig. 2 shows the flow chart of authority checking method according to an embodiment of the invention.
As shown in Figure 2, method for verifying authority according to an embodiment of the invention, comprising: step 202, when the authority receiving terminal obtains request, reads the facility information of described terminal; Step 204, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate; Step 206, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority; Step 208, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
In this technical scheme, when user uses terminal to when having the file reading authority to download or check, system can be compared according to the authorisation device information stored in the facility information of user terminal and server, if the facility information of this terminal (i.e. device-fingerprint) and authorisation device information (namely authorizing fingerprint) coupling, then illustrate that this terminal can be downloaded or check authority, if both do not mate, then can regenerate the authorisation device information of mating with this terminal according to authority, namely mandate fingerprint is changed, and at one time, a terminal is only allowed to be connected with server and to obtain authority, like this, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
In technique scheme, preferably, also comprise: when described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset; When the described current request time is within the scope of described default activity time, allow described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
In this technical scheme, authorisation device information there is certain effective time, therefore, when after the facility information and authorisation device information matches of terminal, need to judge current time whether within this effective time, if within this effective time, then illustrate that this authorisation device information also has activity, namely terminal can read authority, if current time has exceeded this effective time, then terminal cannot read authority.
In technique scheme, preferably, also comprise: when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
In this technical scheme, when the configuration information of server is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating new authorisation device file, like this, at one time, just only have an equipment to read authority, ensure the safety of authority.
In technique scheme, preferably, described step 204 also comprises: generate described first identification code according to described facility information, generate the second identification code, judge whether described first identification code and described second identification code can offset according to described authorisation device information; When described first identification code and described second identification code can offset, judge described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
In technique scheme, preferably, described facility information comprises mark and/or the NIC address of terminal.
In this technical scheme, facility information includes, but are not limited to mark and/or the NIC address of terminal, can also be the information relevant to terminal.
Wherein, in Authority Verification system, comprise hardware agent, below in conjunction with Fig. 3 and Fig. 4, describe technical scheme of the present invention in detail.
Fig. 3 shows the particular flow sheet of authority checking method according to an embodiment of the invention.
As shown in Figure 3, the idiographic flow of authority checking method is according to an embodiment of the invention as follows:
Step 302, fetch equipment fingerprint from terminal.
Step 304, if stored device-fingerprint, then judged that whether the device-fingerprint stored was consistent with the device-fingerprint just read, and when judged result is for being, entering step 306, when judged result is no, entering step 308.
Step 306, generate an equipment according to device-fingerprint and offset code, the mandate fingerprint of storage is obtained from server, and offset code according to authorizing fingerprint to generate an authorisation device, judgment device offsets code and authorisation device and offsets code and whether can offset coupling, when judged result is for being, enters step 312, when judged result is no, enter step 310.
Step 308, regenerates a hardware agent.Wherein, as shown in Figure 4, the major function of hardware agent comprises: hardware fingerprint reads, hardware fingerprint offsets (server feedback), hardware agent activity record, fingerprint storage.Wherein, activity is determined jointly by server and mandate.
Step 310, regenerates a hardware agent.
Step 312, judges whether terminal also has activity, and whether the access time that namely terminal is current is within effective time.
Step 314, when judging that terminal has activity, allows terminal to read authority.
Step 316, when terminal does not have activity, reads authority failure.
More than be described with reference to the accompanying drawings technical scheme of the present invention, by technical scheme of the present invention, the information security of authority can have been ensured, avoid authority to be acquired over multiple terminals simultaneously.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the flow chart of the method for the embodiment of the present invention, equipment (system) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
Although describe the preferred embodiments of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the scope of the invention.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. an Authority Verification system, is characterized in that, comprising:
Reading unit, during for obtaining request in the authority receiving terminal, reads the facility information of described terminal;
Contrast unit, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate;
Information generating unit, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority;
Transmitting element, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
2. Authority Verification system according to claim 1, is characterized in that, also comprise:
Judging unit, when described facility information and described authorisation device information match, judges current time whether within the scope of the activity time preset;
Processing unit, when the judged result of described judging unit is for being, allows described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
3. Authority Verification system according to claim 1, is characterized in that, also comprise:
Administrative unit, when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
4. Authority Verification system according to claim 1, is characterized in that, described contrast unit also comprises:
Mark generates subelement, generates the first identification code, generates the second identification code according to described authorisation device information, judge whether described first identification code and described second identification code can offset according to described facility information;
Result judges subelement, when described first identification code and described second identification code can offset, be judged to be described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
5. Authority Verification system according to any one of claim 1 to 4, is characterized in that, described facility information comprises mark and/or the NIC address of terminal.
6. a method for verifying authority, is characterized in that, comprising:
Step 202, when the authority receiving terminal obtains request, reads the facility information of described terminal;
Step 204, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate;
Step 206, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority;
Step 208, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
7. method for verifying authority according to claim 6, is characterized in that, also comprises:
When described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset;
When the described current request time is within the scope of described default activity time, allow described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
8. method for verifying authority according to claim 6, is characterized in that, also comprises:
When described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
9. method for verifying authority according to claim 6, is characterized in that, described step 204 also comprises:
Generate described first identification code according to described facility information, generate the second identification code according to described authorisation device information, judge whether described first identification code and described second identification code can offset;
When described first identification code and described second identification code can offset, judge described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
10. the method for verifying authority according to any one of claim 6 to 9, is characterized in that, described facility information comprises mark and/or the NIC address of terminal.
CN201310741208.4A 2013-12-26 2013-12-26 Permission validation system and permission validation method Pending CN104753864A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310741208.4A CN104753864A (en) 2013-12-26 2013-12-26 Permission validation system and permission validation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310741208.4A CN104753864A (en) 2013-12-26 2013-12-26 Permission validation system and permission validation method

Publications (1)

Publication Number Publication Date
CN104753864A true CN104753864A (en) 2015-07-01

Family

ID=53592983

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310741208.4A Pending CN104753864A (en) 2013-12-26 2013-12-26 Permission validation system and permission validation method

Country Status (1)

Country Link
CN (1) CN104753864A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701398A (en) * 2015-12-30 2016-06-22 北京金山安全软件有限公司 Method and device for opening auxiliary function permission and electronic equipment
CN106485099A (en) * 2016-09-28 2017-03-08 上海奕瑞光电子科技有限公司 The method and system that flat panel detector authorizes on demand
CN106571926A (en) * 2016-10-31 2017-04-19 深圳市证通金信科技有限公司 Authorization management method and authorization management system based on dynamic password
CN106599621A (en) * 2016-11-16 2017-04-26 深圳市异度信息产业有限公司 Permission activation method and apparatus
CN112861114A (en) * 2021-02-07 2021-05-28 新大陆(福建)公共服务有限公司 Equipment authorization method based on authorization device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701398A (en) * 2015-12-30 2016-06-22 北京金山安全软件有限公司 Method and device for opening auxiliary function permission and electronic equipment
CN105701398B (en) * 2015-12-30 2019-06-21 北京金山安全软件有限公司 Method and device for opening auxiliary function permission and electronic equipment
CN106485099A (en) * 2016-09-28 2017-03-08 上海奕瑞光电子科技有限公司 The method and system that flat panel detector authorizes on demand
CN106571926A (en) * 2016-10-31 2017-04-19 深圳市证通金信科技有限公司 Authorization management method and authorization management system based on dynamic password
CN106599621A (en) * 2016-11-16 2017-04-26 深圳市异度信息产业有限公司 Permission activation method and apparatus
CN112861114A (en) * 2021-02-07 2021-05-28 新大陆(福建)公共服务有限公司 Equipment authorization method based on authorization device
CN112861114B (en) * 2021-02-07 2023-02-17 新大陆(福建)公共服务有限公司 Equipment authorization method based on authorization device

Similar Documents

Publication Publication Date Title
CN112771826B (en) Application program login method, application program login device and mobile terminal
CN107743115B (en) Identity authentication method, device and system for terminal application
CN105678192B (en) A kind of key application method and application apparatus based on smart card
CN104901925A (en) End-user identity authentication method, device and system and terminal device
CN104917749A (en) Account registration method and device
CN104753864A (en) Permission validation system and permission validation method
CN113038451B (en) Machine-card binding method and device, communication module and storage medium
CN104601324A (en) Verification method specific to applications, terminal and system
CN110674475B (en) Authorization control method and device and trusted computing terminal
JP5805874B2 (en) Apparatus and method for connecting a removable module to an access terminal
CN107484152B (en) Management method and device for terminal application
CN104322005A (en) Function for the challenge derivation for protecting components in a challenge response authentication protocol
SG188688A1 (en) Method and system for remote access to data stored on a host system
CN104751105A (en) Fingerprint data verification method, fingerprint data verification device, related equipment and system
CN112398824A (en) Authority verification method, storage medium and electronic equipment
CN104683299A (en) Control method for software registration, authentication server and terminal
CN112202747A (en) Target device binding method and device, storage medium and electronic device
CN109086578A (en) A kind of method that soft ware authorization uses, equipment and storage medium
KR20230110613A (en) Virtual key sharing system and method
CN103714017B (en) A kind of authentication method, authentication device and authenticating device
CN112689285B (en) Authorization authentication method and system for mobile terminal SDK
CN103559430A (en) Application account management method and device based on android system
KR102702681B1 (en) Electronic device and certification method in electronic device
CN112887099A (en) Data signature method, electronic device and computer readable storage medium
CN103841120A (en) Data security management method, mobile terminal and system based on digital watermarking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150701

WD01 Invention patent application deemed withdrawn after publication