CN104753864A - Permission validation system and permission validation method - Google Patents
Permission validation system and permission validation method Download PDFInfo
- Publication number
- CN104753864A CN104753864A CN201310741208.4A CN201310741208A CN104753864A CN 104753864 A CN104753864 A CN 104753864A CN 201310741208 A CN201310741208 A CN 201310741208A CN 104753864 A CN104753864 A CN 104753864A
- Authority
- CN
- China
- Prior art keywords
- authority
- information
- authorisation device
- terminal
- facility information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000010200 validation analysis Methods 0.000 title abstract 4
- 238000013475 authorization Methods 0.000 claims abstract description 116
- 238000000034 method Methods 0.000 claims description 41
- 230000000694 effects Effects 0.000 claims description 18
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 230000008878 coupling Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 5
- 238000005859 coupling reaction Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000013011 mating Effects 0.000 description 4
- 241000931705 Cicada Species 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides a permission validation system, which comprises a reading unit, a comparison unit, an information generation unit, and an authorization file acquisition unit, wherein the reading unit is used for reading equipment information of a terminal when an authorization file acquisition request of the terminal is received; the comparison unit is used for comparing the equipment information and authorization equipment information stored in a server and judging whether the equipment information and authorization equipment information are matched; the information generation unit is used for controlling the server to acquire the stored authorization file when the equipment information and authorization equipment information are not matched and generating new authorization equipment information matched with the equipment information according to the authorization file; and the authorization file acquisition unit is used for acquiring the authorization file from the server according to the equipment information and the new authorization equipment information and sending the authorization file to the terminal. Correspondingly, the invention also provides a permission validation method. Through the technical scheme, information security of the authorization file can be ensured, and the authorization file can be prevented from being acquired at multiple terminals at the same time.
Description
Technical field
The present invention relates to empowerment management technical field, in particular to a kind of Authority Verification system and a kind of method for verifying authority.
Background technology
Along with the maturation of mobile Internet, based on mobile terminal carry out mobile reading be dissolved into gradually people life in, and caricature as reading content a part also accept by people.
At present, if user obtains the mandate of certain caricature, then can download in any terminal or check this caricature, be not easy to the management of distributors like this, be also unfavorable for the safety of authority.
Therefore, need a kind of new technical scheme, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously, be convenient to distributors and caricature is managed.
Summary of the invention
The present invention, just based on the problems referred to above, proposes a kind of new technical scheme, can ensure the information security of authority, avoids authority to be acquired over multiple terminals simultaneously.
In view of this, the present invention proposes a kind of Authority Verification system, comprising: reading unit, during for obtaining request in the authority receiving terminal, reading the facility information of described terminal; Contrast unit, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate; Information generating unit, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority; Transmitting element, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
In this technical scheme, when user uses terminal to when having the file reading authority to download or check, system can be compared according to the authorisation device information stored in the facility information of user terminal and server, if the facility information of this terminal (i.e. device-fingerprint) and authorisation device information (namely authorizing fingerprint) coupling, then illustrate that this terminal can be downloaded or check authority, if both do not mate, then can regenerate the authorisation device information of mating with this terminal according to authority, namely mandate fingerprint is changed, and at one time, a terminal is only allowed to be connected with server and to obtain authority, like this, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
In technique scheme, preferably, also comprise: judging unit, when described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset; Processing unit, when the judged result of described judging unit is for being, allows described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
In this technical scheme, authorisation device information there is certain effective time, therefore, when after the facility information and authorisation device information matches of terminal, need to judge current time whether within this effective time, if within this effective time, then illustrate that this authorisation device information also has activity, namely terminal can read authority, if current time has exceeded this effective time, then terminal cannot read authority.
In technique scheme, preferably, also comprise: administrative unit, when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
In this technical scheme, when the configuration information of server is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating new authorisation device file, like this, at one time, just only have an equipment to read authority, ensure the safety of authority.
In technique scheme, preferably, described contrast unit also comprises: mark generates subelement, generates the first identification code according to described facility information, generate the second identification code according to described authorisation device information, judge whether described first identification code and described second identification code can offset; Result judges subelement, when described first identification code and described second identification code can offset, be judged to be described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
In technique scheme, preferably, described facility information comprises mark and/or the NIC address of terminal.
In this technical scheme, facility information includes, but are not limited to mark and/or the NIC address of terminal, can also be the information relevant to terminal.
According to a further aspect in the invention, additionally provide a kind of method for verifying authority, comprising: step 202, when the authority receiving terminal obtains request, read the facility information of described terminal; Step 204, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate; Step 206, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority; Step 208, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
In this technical scheme, when user uses terminal to when having the file reading authority to download or check, system can be compared according to the authorisation device information stored in the facility information of user terminal and server, if the facility information of this terminal (i.e. device-fingerprint) and authorisation device information (namely authorizing fingerprint) coupling, then illustrate that this terminal can be downloaded or check authority, if both do not mate, then can regenerate the authorisation device information of mating with this terminal according to authority, namely mandate fingerprint is changed, and at one time, a terminal is only allowed to be connected with server and to obtain authority, like this, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
In technique scheme, preferably, also comprise: when described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset; When the described current request time is within the scope of described default activity time, allow described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
In this technical scheme, authorisation device information there is certain effective time, therefore, when after the facility information and authorisation device information matches of terminal, need to judge current time whether within this effective time, if within this effective time, then illustrate that this authorisation device information also has activity, namely terminal can read authority, if current time has exceeded this effective time, then terminal cannot read authority.
In technique scheme, preferably, also comprise: when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
In this technical scheme, when the configuration information of server is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating new authorisation device file, like this, at one time, just only have an equipment to read authority, ensure the safety of authority.
In technique scheme, preferably, described step 204 also comprises: generate described first identification code according to described facility information, generate the second identification code, judge whether described first identification code and described second identification code can offset according to described authorisation device information; When described first identification code and described second identification code can offset, judge described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
In technique scheme, preferably, described facility information comprises mark and/or the NIC address of terminal.
In this technical scheme, facility information includes, but are not limited to mark and/or the NIC address of terminal, can also be the information relevant to terminal.
By above technical scheme, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
Accompanying drawing explanation
Fig. 1 shows the block diagram of authority checking system according to an embodiment of the invention;
Fig. 2 shows the flow chart of authority checking method according to an embodiment of the invention;
Fig. 3 shows the particular flow sheet of authority checking method according to an embodiment of the invention;
Fig. 4 shows the functional schematic of hardware agent according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the block diagram of authority checking system according to an embodiment of the invention.
As shown in Figure 1, Authority Verification system 100 according to an embodiment of the invention, comprising: reading unit 102, during for obtaining request in the authority receiving terminal, reads the facility information of described terminal; Contrast unit 104, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate; Information generating unit 106, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority; Transmitting element 108, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
In this technical scheme, when user uses terminal to when having the file reading authority to download or check, system can be compared according to the authorisation device information stored in the facility information of user terminal and server, if the facility information of this terminal (i.e. device-fingerprint) and authorisation device information (namely authorizing fingerprint) coupling, then illustrate that this terminal can be downloaded or check authority, if both do not mate, then can regenerate the authorisation device information of mating with this terminal according to authority, namely mandate fingerprint is changed, and at one time, a terminal is only allowed to be connected with server and to obtain authority, like this, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
In technique scheme, preferably, also comprise: judging unit 110, when described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset; Processing unit 112, when the judged result of described judging unit 110 is for being, allows described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
In this technical scheme, authorisation device information there is certain effective time, therefore, when after the facility information and authorisation device information matches of terminal, need to judge current time whether within this effective time, if within this effective time, then illustrate that this authorisation device information also has activity, namely terminal can read authority, if current time has exceeded this effective time, then terminal cannot read authority.
In technique scheme, preferably, also comprise: administrative unit 114, when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
In this technical scheme, when the configuration information of server is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating new authorisation device file, like this, at one time, just only have an equipment to read authority, ensure the safety of authority.
In technique scheme, preferably, described contrast unit 104 also comprises: mark generates subelement 1042, generates the first identification code according to described facility information, generate the second identification code according to described authorisation device information, judge whether described first identification code and described second identification code can offset; Result judges subelement 1044, when described first identification code and described second identification code can offset, be judged to be described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
In technique scheme, preferably, described facility information comprises mark and/or the NIC address of terminal.
In this technical scheme, facility information includes, but are not limited to mark and/or the NIC address of terminal, can also be the information relevant to terminal.
Fig. 2 shows the flow chart of authority checking method according to an embodiment of the invention.
As shown in Figure 2, method for verifying authority according to an embodiment of the invention, comprising: step 202, when the authority receiving terminal obtains request, reads the facility information of described terminal; Step 204, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate; Step 206, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority; Step 208, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
In this technical scheme, when user uses terminal to when having the file reading authority to download or check, system can be compared according to the authorisation device information stored in the facility information of user terminal and server, if the facility information of this terminal (i.e. device-fingerprint) and authorisation device information (namely authorizing fingerprint) coupling, then illustrate that this terminal can be downloaded or check authority, if both do not mate, then can regenerate the authorisation device information of mating with this terminal according to authority, namely mandate fingerprint is changed, and at one time, a terminal is only allowed to be connected with server and to obtain authority, like this, the information security of authority can be ensured, avoid authority to be acquired over multiple terminals simultaneously.
In technique scheme, preferably, also comprise: when described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset; When the described current request time is within the scope of described default activity time, allow described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
In this technical scheme, authorisation device information there is certain effective time, therefore, when after the facility information and authorisation device information matches of terminal, need to judge current time whether within this effective time, if within this effective time, then illustrate that this authorisation device information also has activity, namely terminal can read authority, if current time has exceeded this effective time, then terminal cannot read authority.
In technique scheme, preferably, also comprise: when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
In this technical scheme, when the configuration information of server is not for allowing to use multiple terminal to obtain described authority simultaneously, forbid generating new authorisation device file, like this, at one time, just only have an equipment to read authority, ensure the safety of authority.
In technique scheme, preferably, described step 204 also comprises: generate described first identification code according to described facility information, generate the second identification code, judge whether described first identification code and described second identification code can offset according to described authorisation device information; When described first identification code and described second identification code can offset, judge described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
In technique scheme, preferably, described facility information comprises mark and/or the NIC address of terminal.
In this technical scheme, facility information includes, but are not limited to mark and/or the NIC address of terminal, can also be the information relevant to terminal.
Wherein, in Authority Verification system, comprise hardware agent, below in conjunction with Fig. 3 and Fig. 4, describe technical scheme of the present invention in detail.
Fig. 3 shows the particular flow sheet of authority checking method according to an embodiment of the invention.
As shown in Figure 3, the idiographic flow of authority checking method is according to an embodiment of the invention as follows:
Step 302, fetch equipment fingerprint from terminal.
Step 304, if stored device-fingerprint, then judged that whether the device-fingerprint stored was consistent with the device-fingerprint just read, and when judged result is for being, entering step 306, when judged result is no, entering step 308.
Step 306, generate an equipment according to device-fingerprint and offset code, the mandate fingerprint of storage is obtained from server, and offset code according to authorizing fingerprint to generate an authorisation device, judgment device offsets code and authorisation device and offsets code and whether can offset coupling, when judged result is for being, enters step 312, when judged result is no, enter step 310.
Step 308, regenerates a hardware agent.Wherein, as shown in Figure 4, the major function of hardware agent comprises: hardware fingerprint reads, hardware fingerprint offsets (server feedback), hardware agent activity record, fingerprint storage.Wherein, activity is determined jointly by server and mandate.
Step 310, regenerates a hardware agent.
Step 312, judges whether terminal also has activity, and whether the access time that namely terminal is current is within effective time.
Step 314, when judging that terminal has activity, allows terminal to read authority.
Step 316, when terminal does not have activity, reads authority failure.
More than be described with reference to the accompanying drawings technical scheme of the present invention, by technical scheme of the present invention, the information security of authority can have been ensured, avoid authority to be acquired over multiple terminals simultaneously.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the flow chart of the method for the embodiment of the present invention, equipment (system) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
Although describe the preferred embodiments of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the scope of the invention.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. an Authority Verification system, is characterized in that, comprising:
Reading unit, during for obtaining request in the authority receiving terminal, reads the facility information of described terminal;
Contrast unit, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate;
Information generating unit, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority;
Transmitting element, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
2. Authority Verification system according to claim 1, is characterized in that, also comprise:
Judging unit, when described facility information and described authorisation device information match, judges current time whether within the scope of the activity time preset;
Processing unit, when the judged result of described judging unit is for being, allows described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
3. Authority Verification system according to claim 1, is characterized in that, also comprise:
Administrative unit, when described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
4. Authority Verification system according to claim 1, is characterized in that, described contrast unit also comprises:
Mark generates subelement, generates the first identification code, generates the second identification code according to described authorisation device information, judge whether described first identification code and described second identification code can offset according to described facility information;
Result judges subelement, when described first identification code and described second identification code can offset, be judged to be described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
5. Authority Verification system according to any one of claim 1 to 4, is characterized in that, described facility information comprises mark and/or the NIC address of terminal.
6. a method for verifying authority, is characterized in that, comprising:
Step 202, when the authority receiving terminal obtains request, reads the facility information of described terminal;
Step 204, obtains the authorisation device information stored in server, described facility information and described authorisation device information is contrasted, judge whether described facility information and described authorisation device information mate;
Step 206, obtains the authority stored from described server, when described facility information and described authorisation device information do not mate, generate the new authorisation device information matched with described facility information according to described authority;
Step 208, is sent to described terminal according to described facility information and described new authorisation device information by described authority.
7. method for verifying authority according to claim 6, is characterized in that, also comprises:
When described facility information and described authorisation device information match, judge current time whether within the scope of the activity time preset;
When the described current request time is within the scope of described default activity time, allow described authority to be sent to described terminal, otherwise, do not allow described authority to be sent to described terminal.
8. method for verifying authority according to claim 6, is characterized in that, also comprises:
When described facility information and described authorisation device information do not mate, obtain the configuration information of described server, when described configuration information is not for allowing multiple terminal to obtain described authority simultaneously, forbid generating described new authorisation device file, otherwise, allow to generate described new authority.
9. method for verifying authority according to claim 6, is characterized in that, described step 204 also comprises:
Generate described first identification code according to described facility information, generate the second identification code according to described authorisation device information, judge whether described first identification code and described second identification code can offset;
When described first identification code and described second identification code can offset, judge described facility information and described authorisation device information match, when described first identification code and described second identification code can not offset, be judged to be that described facility information and described authorisation device information are not mated.
10. the method for verifying authority according to any one of claim 6 to 9, is characterized in that, described facility information comprises mark and/or the NIC address of terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310741208.4A CN104753864A (en) | 2013-12-26 | 2013-12-26 | Permission validation system and permission validation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310741208.4A CN104753864A (en) | 2013-12-26 | 2013-12-26 | Permission validation system and permission validation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104753864A true CN104753864A (en) | 2015-07-01 |
Family
ID=53592983
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310741208.4A Pending CN104753864A (en) | 2013-12-26 | 2013-12-26 | Permission validation system and permission validation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104753864A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701398A (en) * | 2015-12-30 | 2016-06-22 | 北京金山安全软件有限公司 | Method and device for opening auxiliary function permission and electronic equipment |
CN106485099A (en) * | 2016-09-28 | 2017-03-08 | 上海奕瑞光电子科技有限公司 | The method and system that flat panel detector authorizes on demand |
CN106571926A (en) * | 2016-10-31 | 2017-04-19 | 深圳市证通金信科技有限公司 | Authorization management method and authorization management system based on dynamic password |
CN106599621A (en) * | 2016-11-16 | 2017-04-26 | 深圳市异度信息产业有限公司 | Permission activation method and apparatus |
CN112861114A (en) * | 2021-02-07 | 2021-05-28 | 新大陆(福建)公共服务有限公司 | Equipment authorization method based on authorization device |
-
2013
- 2013-12-26 CN CN201310741208.4A patent/CN104753864A/en active Pending
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701398A (en) * | 2015-12-30 | 2016-06-22 | 北京金山安全软件有限公司 | Method and device for opening auxiliary function permission and electronic equipment |
CN105701398B (en) * | 2015-12-30 | 2019-06-21 | 北京金山安全软件有限公司 | Method and device for opening auxiliary function permission and electronic equipment |
CN106485099A (en) * | 2016-09-28 | 2017-03-08 | 上海奕瑞光电子科技有限公司 | The method and system that flat panel detector authorizes on demand |
CN106571926A (en) * | 2016-10-31 | 2017-04-19 | 深圳市证通金信科技有限公司 | Authorization management method and authorization management system based on dynamic password |
CN106599621A (en) * | 2016-11-16 | 2017-04-26 | 深圳市异度信息产业有限公司 | Permission activation method and apparatus |
CN112861114A (en) * | 2021-02-07 | 2021-05-28 | 新大陆(福建)公共服务有限公司 | Equipment authorization method based on authorization device |
CN112861114B (en) * | 2021-02-07 | 2023-02-17 | 新大陆(福建)公共服务有限公司 | Equipment authorization method based on authorization device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112771826B (en) | Application program login method, application program login device and mobile terminal | |
CN107743115B (en) | Identity authentication method, device and system for terminal application | |
CN105678192B (en) | A kind of key application method and application apparatus based on smart card | |
CN104901925A (en) | End-user identity authentication method, device and system and terminal device | |
CN104917749A (en) | Account registration method and device | |
CN104753864A (en) | Permission validation system and permission validation method | |
CN113038451B (en) | Machine-card binding method and device, communication module and storage medium | |
CN104601324A (en) | Verification method specific to applications, terminal and system | |
CN110674475B (en) | Authorization control method and device and trusted computing terminal | |
JP5805874B2 (en) | Apparatus and method for connecting a removable module to an access terminal | |
CN107484152B (en) | Management method and device for terminal application | |
CN104322005A (en) | Function for the challenge derivation for protecting components in a challenge response authentication protocol | |
SG188688A1 (en) | Method and system for remote access to data stored on a host system | |
CN104751105A (en) | Fingerprint data verification method, fingerprint data verification device, related equipment and system | |
CN112398824A (en) | Authority verification method, storage medium and electronic equipment | |
CN104683299A (en) | Control method for software registration, authentication server and terminal | |
CN112202747A (en) | Target device binding method and device, storage medium and electronic device | |
CN109086578A (en) | A kind of method that soft ware authorization uses, equipment and storage medium | |
KR20230110613A (en) | Virtual key sharing system and method | |
CN103714017B (en) | A kind of authentication method, authentication device and authenticating device | |
CN112689285B (en) | Authorization authentication method and system for mobile terminal SDK | |
CN103559430A (en) | Application account management method and device based on android system | |
KR102702681B1 (en) | Electronic device and certification method in electronic device | |
CN112887099A (en) | Data signature method, electronic device and computer readable storage medium | |
CN103841120A (en) | Data security management method, mobile terminal and system based on digital watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150701 |
|
WD01 | Invention patent application deemed withdrawn after publication |