CN108023727B - Authorization method and system thereof - Google Patents

Authorization method and system thereof Download PDF

Info

Publication number
CN108023727B
CN108023727B CN201711205512.1A CN201711205512A CN108023727B CN 108023727 B CN108023727 B CN 108023727B CN 201711205512 A CN201711205512 A CN 201711205512A CN 108023727 B CN108023727 B CN 108023727B
Authority
CN
China
Prior art keywords
authorization
ciphertext
service
authentication terminal
duration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711205512.1A
Other languages
Chinese (zh)
Other versions
CN108023727A (en
Inventor
张宁
王冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Naxiang Technology Co ltd
Original Assignee
Shenzhen Naxiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Naxiang Technology Co ltd filed Critical Shenzhen Naxiang Technology Co ltd
Priority to CN201711205512.1A priority Critical patent/CN108023727B/en
Publication of CN108023727A publication Critical patent/CN108023727A/en
Application granted granted Critical
Publication of CN108023727B publication Critical patent/CN108023727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The invention is suitable for the technical field of data encryption, and provides an authorization method and a system thereof, wherein the authorization method comprises the following steps: the user terminal sends an authorization ciphertext acquisition request to an authorization server; the authorization server generates an authorization ciphertext corresponding to the authorization ciphertext acquisition request according to a preset random ciphertext generation algorithm and sends the authorization ciphertext to the user terminal; the authentication terminal receives an authorization ciphertext input by the user terminal, and identifies whether the authorization ciphertext is legal or not through a preset ciphertext decryption algorithm; if the authorization message is legal, the authentication terminal extracts the effective duration and the service identifier contained in the authorization message; and the authentication terminal updates the effective service duration of the service corresponding to the service identifier according to the effective duration. The invention solves the problems that the renewal operation can be carried out only after the effective service period of the product expires, so that the service interruption is possibly caused by the service expiration during the service using period of the user, the use experience of the user is reduced, and the difficulty of the renewal operation of the user is increased.

Description

Authorization method and system thereof
Technical Field
The invention belongs to the technical field of data encryption, and particularly relates to an authorization method and an authorization system.
Background
The existing products are sold by renting, namely each product has a certain service time limit, and during the effective service time limit, a user can normally use all or part of functions of the product; and when the service time limit is expired, the product stops responding to the service request of the user until the user authorizes the product again. However, the existing authorization method needs to perform the renewal operation only after the valid service period of the product expires, so that the service may be interrupted due to the expiration of the service during the service using period of the user, the use experience of the user is reduced, and the difficulty of the renewal operation of the user is also increased.
Disclosure of Invention
In view of this, embodiments of the present invention provide an authorization method and a system thereof, so as to solve the problems that an existing authorization method may require that a valid service period of a product is expired before a renewal operation is performed, so that a service interruption may be caused by the expiration of the service during a service using period of a user, a user experience is reduced, and difficulty in the renewal operation of the user is increased.
A first aspect of an embodiment of the present invention provides an authorization method, which is applied to an authorization system, and is characterized in that the authorization method includes:
the user terminal sends an authorization ciphertext acquisition request to an authorization server; the authorization ciphertext acquisition request comprises an effective duration of request authorization and a service identifier;
the authorization server generates an authorization ciphertext corresponding to the authorization ciphertext acquisition request according to a preset random ciphertext generation algorithm, and sends the authorization ciphertext to the user terminal;
the authentication terminal receives the authorization ciphertext input by the user terminal and identifies whether the authorization ciphertext is legal or not through a preset ciphertext decryption algorithm; the ciphertext decryption algorithm is a decryption algorithm corresponding to the random ciphertext generation algorithm;
if the authorization ciphertext is legal, the authentication terminal extracts the effective duration and the service identifier contained in the authorization ciphertext;
and the authentication terminal updates the effective service duration of the service corresponding to the service identifier according to the effective duration.
A second aspect of the embodiments of the present invention provides an authorization system, which is characterized in that the authorization system includes: the system comprises an authorization server, a user terminal and an authentication terminal;
the user terminal is used for sending an authorization ciphertext acquisition request to an authorization server; the authorization ciphertext acquisition request comprises an effective duration of request authorization and a service identifier;
the authorization server is used for generating an authorization ciphertext corresponding to the authorization ciphertext acquisition request according to a preset random ciphertext generation algorithm and sending the authorization ciphertext to the user terminal;
the authentication terminal is used for receiving the authorization ciphertext input by the user terminal and identifying whether the authorization ciphertext is legal or not through a preset ciphertext decryption algorithm; the ciphertext decryption algorithm is a decryption algorithm corresponding to the random ciphertext generation algorithm;
the authentication terminal is used for extracting the effective duration and the service identifier contained in the authorization ciphertext if the authorization ciphertext is legal;
and the authentication terminal is used for updating the effective service duration of the service corresponding to the service identifier according to the effective duration.
The authorization method and the authorization system provided by the embodiment of the invention have the following beneficial effects:
the embodiment of the invention sends an authorization ciphertext acquisition request to the authorization server through the user terminal so as to acquire the authorization ciphertext which can use the built-in service of the authentication terminal through the authorization server. And after receiving an authorization ciphertext acquisition request of the user, the authorization server generates an authorization ciphertext which accords with a preset encryption mode and has valid duration information of request authorization and service identification information according to the authorization ciphertext request, and returns the authorization ciphertext to the user terminal. After receiving the authorization ciphertext, the user terminal can input the authorization ciphertext into the authentication terminal, if the authentication terminal identifies that the authorization ciphertext can be decrypted through a preset decryption algorithm, the authorization ciphertext is a legal authorization ciphertext, and the effective service duration of the service corresponding to the service identifier in the authorization ciphertext is updated, so that the renewal operation can be performed without the requirement that the effective service duration is zero, the effective service duration of a certain service can be prolonged in any state of the authentication terminal, the occurrence probability of service interruption caused by service expiration is reduced, the difficulty of the renewal operation of the user is further reduced, and the use experience of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a block diagram of an authentication system according to an embodiment of the present invention;
fig. 2 is a flowchart of an implementation of an authorization method according to a first embodiment of the present invention;
fig. 3 is a flowchart illustrating a specific implementation of an authorization method S203 according to a second embodiment of the present invention;
fig. 4 is a flowchart illustrating a specific implementation of an authorization method S203 according to a third embodiment of the present invention;
fig. 5 is a flowchart of a specific implementation of an authorization method according to a fourth embodiment of the present invention;
fig. 6 is a flowchart of a specific implementation of an authorization method according to a fifth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Fig. 1 shows a block diagram of an authorization system according to an embodiment of the present invention, where the authorization system includes an authorization server, a user terminal, and an authentication terminal. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 1, the authorization system includes: an authorization server 11, a user terminal 12 and an authentication terminal 13;
the user terminal 12 is configured to send an authorization ciphertext acquisition request to the authorization server 11; the authorization ciphertext acquisition request comprises an effective duration of request authorization and a service identifier;
the authorization server 11 is configured to generate an authorization ciphertext corresponding to the authorization ciphertext acquisition request according to a preset random ciphertext generation algorithm, and send the authorization ciphertext to the user terminal 12;
the authentication terminal 13 is configured to receive the authorization ciphertext input by the user terminal 12, and identify whether the authorization ciphertext is legal through a preset ciphertext decryption algorithm; the ciphertext decryption algorithm is a decryption algorithm corresponding to the random ciphertext generation algorithm;
the authentication terminal 13 is configured to extract the valid duration and the service identifier included in the authorization ciphertext if the authorization ciphertext is legal;
and the authentication terminal 13 is configured to update the effective service duration of the service corresponding to the service identifier according to the effective duration.
Optionally, the authorization ciphertext is specifically a two-dimensional code image, and the authentication terminal 13 is configured to receive the authorization ciphertext input by the user terminal 12, and identify whether the authorization ciphertext is legal through a preset ciphertext decryption algorithm, and specifically includes:
the authentication terminal 13 is configured to scan the two-dimensional code image displayed by the user terminal 12, and acquire information included in the two-dimensional code image;
and the authentication terminal 13 is configured to decrypt the information included in the two-dimensional code image through the ciphertext decryption algorithm to obtain a uniform resource locator URL, and analyze whether the URL is a legal URL.
Optionally, the authorization ciphertext is specifically an authorization code, and the authentication terminal 13 is configured to receive the authorization ciphertext input by the user terminal 12, and identify whether the authorization ciphertext is legal through a preset ciphertext decryption algorithm, and specifically includes:
the user terminal 12 is configured to establish a communication channel with the authentication terminal 13;
the user terminal 12 is configured to send an authorization code input by a user to the authentication terminal 13 through the communication channel;
the authentication terminal 13 is configured to identify whether the authorization code is legal or not through the ciphertext decryption algorithm.
Optionally, the authentication terminal 13 is further configured to:
the authentication terminal 13 is configured to detect whether the effective service duration is greater than 0 if an equipment service request initiated by a user is received;
the authentication terminal 13 is configured to not respond to the device service request if the effective service duration is less than or equal to 0;
the authentication terminal 13 is configured to respond to the device service request if the effective service duration is greater than 0.
Optionally, the authenticating terminal 13, after being configured to respond to the device service request if the valid service duration is greater than 0, further includes:
the authentication terminal 13 is configured to record a service duration for providing the service;
the authentication terminal 13 is configured to calculate a difference between the effective service duration and the service duration to obtain a remaining service duration;
the authentication terminal 13 is configured to stop providing the service if the remaining service duration is less than or equal to 0.
The embodiment of the invention sends an authorization ciphertext acquisition request to the authorization server through the user terminal so as to acquire the authorization ciphertext which can use the built-in service of the authentication terminal through the authorization server. And after receiving an authorization ciphertext acquisition request of the user, the authorization server generates an authorization ciphertext which accords with a preset encryption mode and has valid duration information of request authorization and service identification information according to the authorization ciphertext request, and returns the authorization ciphertext to the user terminal. The user terminal can input the authorization ciphertext into the authentication terminal after receiving the authorization ciphertext, if the authentication terminal identifies that the authorization ciphertext can be decrypted through a preset decryption algorithm, the authorization ciphertext is legal, and the effective service duration of the service corresponding to the service identifier in the authorization ciphertext is updated, so that the problem that the service interruption is possibly caused by service expiration during the service using period of the user, the use experience of the user is reduced, and the difficulty of the user's continuous operation is increased in the conventional authorization method because the continuous operation can be performed only after the effective service period of a product expires in the conventional authorization method is solved.
As another embodiment of the present invention, an authorization method is provided. In the embodiment of the invention, the authorization method is applied to an authorization system, and the authorization system comprises an authorization server, a user terminal and an authentication terminal. The authorization server is used for issuing an authorization ciphertext corresponding to the authentication terminal to each user terminal so that each user terminal can acquire the authority for using the authentication terminal to provide services according to the authorization ciphertext; the user terminal is specifically a terminal device used by a user, and can be a mobile terminal such as a mobile phone, a tablet computer and the like; the authentication terminal is specifically used for performing authentication operation on a service request initiated by a user, and if the service request of the user is legal, corresponding service is provided for the user; the three devices may be connected in communication by wired communication or wireless communication. Fig. 2 shows a flowchart of an implementation of the authorization method provided by the first embodiment of the present invention, which is detailed as follows:
in S201, the user terminal sends an authorization ciphertext acquisition request to an authorization server; the authorization ciphertext acquisition request comprises the effective duration of the request authorization and the service identifier.
In this embodiment, if the user needs to extend the service duration of the authentication terminal, an authorization ciphertext acquisition request may be sent to the authorization server through the user terminal. When generating an authorization ciphertext acquisition request, a user can input a service identifier of a service corresponding to a required service duration to be prolonged and a length of the request for prolonging the authorization time, namely an effective duration, and a user terminal generates a corresponding authorization ciphertext acquisition request according to the two input parameters of the user. Optionally, if the two parameters are not input during the generation, the user terminal configures according to a default value to generate a default authorization ciphertext acquisition request. For example, the user terminal defaults to set the validity duration to 15 days, and the service identifier is a service identifier corresponding to the basic service, in this case, the user clicks the authorization cryptogram generation instruction and does not configure the two parameters, and then the user terminal generates an authorization cryptogram acquisition request with the validity duration of 15 days and the service identifier as the basic service.
In this embodiment, the user terminal and the authorization server may communicate through a wireless network, where the wireless communication mode includes multiple wireless access modes such as a wireless local area network and a mobile communication network, and if the user terminal adopts the mobile communication network, the user terminal may communicate through a short message or a multimedia message, for example; if the user terminal is in a wireless lan mode, the user terminal may be connected to the authorization server through a client (e.g., WeChat, QQ, etc.).
In this embodiment, after receiving an authorization ciphertext acquisition request input by a user, a user terminal queries a communication address of an authorization server corresponding to the service identifier, performs communication connection with the authorization server according to the communication address, and then sends the authorization service request to the authorization server.
Optionally, before S201, the method further includes: the user terminal sends an authorized purchase instruction to the authorization server, and the authorization server returns an authorized payment link to the user terminal according to the authorized purchase instruction. And the authorization server detects whether the payment operation corresponding to the authorization payment link is finished, if so, the token with successful payment is returned to the user terminal, and the user terminal generates the authorization ciphertext acquisition request according to the token with successful payment. The authorization server detects whether the token for successful payment is contained in the authorization ciphertext acquisition instruction sent by each user terminal, so as to determine whether the acquisition instruction is a legal acquisition instruction. If the authorization ciphertext acquisition instruction contains a token for successful payment, executing the relevant operation of S202; otherwise, if the authorization ciphertext acquisition instruction does not contain the token which is successful in payment, requesting invalid information to the user terminal range, and refusing to respond to the authorization ciphertext acquisition instruction of the user.
In this embodiment, the authentication terminal may provide multiple services for the user terminal, and in order to distinguish each service, the authentication terminal allocates a service identifier to each service, generates a service identifier correspondence relationship, and uploads the service identifier correspondence relationship to the server corresponding to the authentication terminal. The user terminal downloads the service identification corresponding relation through the authorization server, after the user selects the corresponding service, the service identification corresponding to the service is inquired and obtained from the service identification corresponding relation list, and the service identification is encapsulated in the authorization ciphertext acquisition instruction.
In S202, the authorization server generates an authorization ciphertext corresponding to the authorization ciphertext acquisition request according to a preset random ciphertext generation algorithm, and sends the authorization ciphertext to the user terminal.
In this embodiment, after receiving an authorization ciphertext acquisition request sent by a user terminal, an authorization server executes ciphertext generation operation, extracts an effective duration and a service identifier included in the authorization ciphertext acquisition request, introduces the two parameters into a preset random ciphertext generation algorithm, generates an authorization ciphertext corresponding to the authorization ciphertext acquisition request, and returns the ciphertext to the user terminal through a communication connection established between the user terminal and the authorization server.
In this embodiment, the ciphertext may be a ciphertext formed by a character string, including but not limited to: pure digital passwords, password groups formed by combining letters and numbers or password groups formed by combining letters and numbers. The ciphertext may also be an image ciphertext, including but not limited to: two-dimensional code ciphertext images and bar code ciphertext images. The ciphertext may also be a speech ciphertext, such as a speech signal composed of a Morse ciphertext.
Optionally, as described above, before S202, a validity determination operation may also be performed on the authorization ciphertext acquisition request. If the authorization server identifies the acquisition request as a legal request, executing the relevant operation of S202; otherwise, if the authorization server identifies the acquisition request as an illegal request, the ciphertext generation operation is stopped. Optionally, if the authorization server receives an authorization ciphertext acquisition request that is continuously sent by the same user terminal for multiple times, and the number of times of continuously sending the illegal request is greater than a preset threshold, the communication connection with the user terminal is disconnected, and the user terminal is identified as an illegal terminal, so that the communication connection with the user terminal is not performed any more, and a service request initiated by the illegal terminal is forbidden.
In this embodiment, the user terminal is provided with a maximum waiting time, and if the waiting time is longer than the maximum waiting time and the authorization ciphertext returned by the authorization server is still not received, the user terminal performs the related operation of S201 again, so that the authorization server retransmits the authorization ciphertext, it should be noted that the request identifier in the ciphertext acquisition request retransmitted by the user terminal due to the exceeding of the waiting time is consistent with the request identifier transmitted at the previous time, so that the authorization server recognizes that the received service request is a retransmitted service request, instead of the user initiating a new authorization name ciphertext acquisition request again, thereby avoiding the occurrence of repeated transmission.
In S203, the authentication terminal receives the authorization ciphertext input by the user terminal, and identifies whether the authorization ciphertext is legal or not through a preset ciphertext decryption algorithm; the ciphertext decryption algorithm is a decryption algorithm corresponding to the random ciphertext generation algorithm.
In this embodiment, after receiving the authorization ciphertext returned by the server, the user terminal may input the authorization ciphertext into the authentication terminal, so as to prolong the effective service duration of the service corresponding to the service identifier of the authentication terminal. Specifically, the authentication terminal is provided with an interaction module, such as a touch screen, a soft keyboard and other modules, the user inputs the authorization ciphertext into the interaction module of the authentication terminal according to the authorization ciphertext received by the user terminal, after the authorization ciphertext is input, the confirmation instruction is clicked, the authentication terminal identifies that the user has input the authorization ciphertext, and the relevant operation of S203 is executed.
In this embodiment, the authentication terminal is configured with a decryption algorithm corresponding to a random ciphertext generation algorithm for encrypting the authorization ciphertext acquisition request by the authorization server, that is, a ciphertext decryption algorithm, so as to decrypt a ciphertext input by the user terminal. If the authentication terminal can decrypt the authorized ciphertext through the ciphertext decryption algorithm, the authorized ciphertext is represented as a legal ciphertext, and the relevant operation of S204 is executed; otherwise, if the authentication terminal cannot decrypt the authorized ciphertext through the ciphertext decryption algorithm, namely the decrypted data is unreadable, the authorized ciphertext is judged to be an illegal ciphertext, and authorization failure information is returned to the user terminal.
Optionally, in this embodiment, the authentication terminal may provide services for multiple users at the same time. Therefore, before the user terminal inputs the authorization ciphertext, the user terminal is required to perform login operation so as to confirm the user account corresponding to the service duration. Preferably, when the user terminal sends an authorization ciphertext acquisition request to the authorization server, the user identifier is encapsulated in the acquisition request, so that when the authorization server generates the authorization ciphertext, the user identifier is encrypted, the authentication terminal directly receives the authorization ciphertext to determine the corresponding user account, the user does not need to log in, and the operation required by the user is reduced.
In S204, if the authorization ciphertext is legal, the authentication terminal extracts the valid duration and the service identifier included in the authorization ciphertext.
In this embodiment, if the authentication terminal identifies the authorization ciphertext as a valid ciphertext through a ciphertext decryption algorithm, the valid duration for which the user terminal applies for the extension and the service identifier of the corresponding service at this time may be determined according to the authorization ciphertext. Optionally, as described above, the authorization cryptogram may further include a user identifier, in this case, S204 may further include: and the authentication terminal logs in a user account corresponding to the user identification according to the user identification.
In this embodiment, the authentication terminal and the device for providing services may be integrated into one device, in which case the authentication terminal may directly update the corresponding effective service duration in the local memory according to the effective duration, and provide the corresponding service for the user when the effective service duration is not zero. The authentication terminal and the device providing the service may be two different devices, for example, the authentication terminal may be an external switch of the device providing the service, and if the user initiates a service request and the authentication terminal determines that the current service duration is greater than zero, the start switch of the device providing the service is turned on or a handshake instruction to the device is turned on, so that the user can perform a corresponding service operation through the device; otherwise, the device providing the service is not started.
In S205, the authentication terminal updates the effective service duration of the service corresponding to the service identifier according to the effective duration.
In this embodiment, the authentication terminal records the valid service duration corresponding to each service identifier, and after receiving the authorization ciphertext and decrypting the service identifier and the valid duration corresponding to the authorization ciphertext, the authentication terminal superimposes the valid duration that needs to be extended this time on the basis of the valid service duration that the service identifier corresponds to the service record, for example, the valid service duration that the authentication terminal records the first service is 5 hours, and the valid duration that the authorization is requested this time is 3 hours, and after the authentication terminal executes S205, the valid duration of the first service is updated to 8 hours, so that the purpose of extending the valid service duration without service expiration is achieved.
It can be seen from the above that, in the authorization method provided in the embodiment of the present invention, an authorization ciphertext acquisition request is sent to an authorization server through a user terminal, so that an authorization ciphertext that can use a built-in service of an authentication terminal is acquired through the authorization server. And after receiving an authorization ciphertext acquisition request of the user, the authorization server generates an authorization ciphertext which accords with a preset encryption mode and has valid duration information of request authorization and service identification information according to the authorization ciphertext request, and returns the authorization ciphertext to the user terminal. After receiving the authorization ciphertext, the user terminal can input the authorization ciphertext into the authentication terminal, if the authentication terminal identifies that the authorization ciphertext can be decrypted through a preset decryption algorithm, the authorization ciphertext is a legal authorization ciphertext, and the effective service duration of the service corresponding to the service identifier in the authorization ciphertext is updated, so that the renewal operation can be performed without the requirement that the effective service duration is zero, the effective service duration of a certain service can be prolonged in any state of the authentication terminal, the occurrence probability of service interruption caused by service expiration is reduced, the difficulty of the renewal operation of the user is further reduced, and the use experience of the user is improved.
Fig. 3 shows a flowchart of a specific implementation of an authorization method S203 according to a second embodiment of the present invention. Referring to fig. 3, with respect to the embodiment described in fig. 2, the authorization method S203 provided in this embodiment includes S301 and S302, which are detailed as follows:
further, the authorization ciphertext is specifically a two-dimensional code image, the authentication terminal receives the authorization ciphertext input by the user terminal, and identifies whether the authorization ciphertext is legal or not through a preset ciphertext decryption algorithm, and the method specifically includes:
in S301, the authentication terminal scans the two-dimensional code image displayed by the user terminal to obtain information included in the two-dimensional code image.
In this embodiment, the authentication terminal is provided with a scanning module for scanning the two-dimensional code. After receiving an authorization ciphertext, namely a two-dimensional code image, returned by an authorization server, the user terminal displays the two-dimensional code image through a display module arranged at the user terminal, wherein the display module can be a display screen or a projection module and the like. Then, the user can make the user terminal close to the authentication terminal, align the displayed two-dimensional code image to the scanning module of the authentication terminal, and activate the scanning operation to obtain the two-dimensional code image of the user terminal when the scanning module of the authentication terminal is shielded.
In this embodiment, the two-dimensional code image is specifically a two-dimensional code image encrypted by a preset random ciphertext generation algorithm, so that after the authentication terminal scans the two-dimensional code image through the scanning module, the obtained information is encrypted, and therefore, the terminal device executes the operation of S302 to determine the content corresponding to the encrypted information.
In this embodiment, since the manufacturing cost of the scanning module is relatively lower than that of the interactive module, the cost of the whole authentication terminal can be saved. On the other hand, the space occupied by the scanning module is relatively small, and the scanning module is also convenient to be applied to an authentication terminal with a small size.
In S302, the authentication terminal decrypts the information included in the two-dimensional code image through the ciphertext decryption algorithm to obtain a Uniform Resource Locator (URL), and analyzes whether the URL is a legal URL.
In this embodiment, the authentication terminal imports information included in the acquired two-dimensional code image into a ciphertext decryption algorithm to determine a URL corresponding to the information included in the two-dimensional code image. Each two-dimensional code image is essentially the process of converting the same resource locator URL into an image, and thus each two-dimensional code image may correspond to one URL. And the authorization server records the valid duration needing authorization and the service identification in the storage space corresponding to the URL. Therefore, after the authentication terminal decrypts the URL of the two-dimensional code image, the authentication terminal jumps to the storage space corresponding to the URL to inquire whether the storage space stores the effective duration of the request authorization and the corresponding service identifier according to the predetermined storage rule.
Optionally, in this embodiment, the analyzing, by the authentication terminal, whether the URL is a legal URL specifically includes: the authentication terminal jumps to the network address appointed by the URL according to the URL obtained by decryption, then determines whether the network is affiliated to a legal network address of the authorization server, if so, identifies the URL as a legal URL, and executes the relevant operation of S204; if the jumped network address belongs to the local address of the authentication terminal or the indicated network address is not the legal network address belonging to the authorization server, the URL is judged to be an illegal URL.
In the embodiment of the invention, the authentication terminal acquires the two-dimensional code image of the user terminal as the authorization ciphertext through the scanning module, and judges whether the URL corresponding to the two-dimensional code image is the legal URL or not through the ciphertext decryption algorithm, so that the aim of identifying the authorization ciphertext is fulfilled, the input operation of a user is reduced, the legality can be identified directly through scanning, and the authorization efficiency is improved.
Fig. 4 is a flowchart illustrating a specific implementation of an authorization method according to a third embodiment of the present invention. Referring to fig. 4, with respect to the embodiment described in fig. 2, S203 in the authorization method provided in this embodiment includes S401 to S402, which are detailed as follows:
further, the authorization ciphertext is specifically an authorization code, and the authenticating terminal receives the authorization ciphertext input by the user terminal and identifies whether the authorization ciphertext is legal or not through a preset ciphertext decryption algorithm, and specifically includes:
in S401, the user terminal and the authentication terminal establish a communication channel.
In this embodiment, the user terminal establishes a dedicated communication channel with the authentication terminal, where the communication channel may be a wired communication channel or a wireless communication channel.
If a wired communication channel is established between the user terminal and the authentication terminal, the user terminal is specifically connected with the authentication device through a data transmission line, and the data transmission line can be a data line with a data transmission function, such as a USB interface transmission line or a serial port transmission line. In this case, the authentication terminal only needs to be provided with a corresponding communication interface, such as a USB interface or a serial interface, and the user terminal can be connected to the authentication terminal through a data transmission line matched with the user terminal.
If a wireless communication channel is established between the user terminal and the authentication terminal, a wireless communication module can be specifically opened for the authentication terminal to transmit a wireless signal corresponding to the authentication terminal, and the user terminal can establish the wireless communication channel after searching the wireless signal through the wireless module corresponding to the wireless signal. Specifically, the wireless communication module may be: bluetooth module, bluetooth low energy module, zigBee communication module, WIFI communication module etc..
In S402, the user terminal sends the authorization code input by the user to the authentication terminal through the communication channel.
In this embodiment, since data transmission can be performed between the user terminal and the authentication terminal through the communication channel, there is no need to set a corresponding interactive interface on the authentication terminal, and the operation of inputting the authorization code by the user is transferred to the user terminal. After the communication channel between the user terminal and the authentication terminal is established, the current display interface of the user terminal jumps to the authorization code input interface, and after the user completes input operation on the authorization code input interface, the user terminal converts the key information acquired by the input operation into an authorization code and sends the authorization code to the authentication terminal.
Optionally, in this embodiment, after the user terminal establishes the communication channel with the authentication terminal, the authentication terminal queries whether the cache area of the user terminal has the authorization code returned by the server through the communication channel. If the authorization code exists, the authorization code is directly read and automatically filled in the authorization code input interface, so that the input operation of a user is reduced.
In S403, the authentication terminal identifies whether the authorization code is legal through the ciphertext decryption algorithm.
In this embodiment, after receiving an authorization code transmitted by a user terminal through a communication channel, an authentication terminal may perform a decryption operation on the authorization code through a preset ciphertext decryption algorithm, and if the decryption is successful, determine that the authorization code is a valid authorization code; otherwise, if the coding rule of the authorization code is not matched with the decryption rule corresponding to the ciphertext decryption algorithm, the authorization code is judged to be an illegal authorization code, which indicates that the decryption cannot be successful.
In the embodiment of the invention, the authentication terminal does not need to be provided with an interactive interface, only needs to be provided with the communication module, and reuses the interactive interface of the user terminal, thereby greatly reducing the manufacturing cost of the authentication terminal.
Fig. 5 is a flowchart illustrating a specific implementation of an authorization method according to a fourth embodiment of the present invention. Referring to fig. 5, with respect to the embodiments described in fig. 2 to fig. 4, the authorization method provided in this embodiment may further include S501 to S503, which are detailed as follows:
in S501, if the authentication terminal receives an equipment service request initiated by a user, it detects whether the effective service duration is greater than 0.
In this embodiment, the authentication terminal may respond to a device service request initiated by a user, where the device service request includes a service identifier for specifying a type of service to be provided. The specific manner of the device service request initiated by the user may be as follows: the user communicates with the authentication terminal through the user terminal, a communication channel is established, the corresponding service icon is clicked on the user terminal, the user terminal inquires the corresponding service identifier according to the service icon, the service identifier is packaged in the equipment service request, and the equipment service request is sent to the authentication terminal.
Optionally, before S501, the method may further include: the authentication terminal receives user information input by a user, logs in a corresponding user account according to the user information, acquires an effective service duration list corresponding to the user account, determines the effective service duration of a service identifier corresponding to the equipment service request according to the effective service duration list, detects whether the effective service duration is 0, and executes related operations of S502 if the effective service duration is detected to be less than or equal to 0; otherwise, if it is detected that the effective service duration is greater than 0, the relevant operation of S503 is performed.
In S502, if the effective service duration is less than or equal to 0, the authentication terminal does not respond to the device service request.
In this embodiment, the authentication terminal identifies that the effective service duration corresponding to the device service request initiated by the user is less than or equal to 0, which indicates that the service purchased or rented by the user has expired, and after the expiration is required, the effective service duration is extended to continue using the service corresponding to the device service request. Thus, in this case, the authentication terminal will not respond to the user-initiated device service request.
Wherein, the unresponsive device service request specifically includes: stopping the authentication equipment from executing the function module corresponding to the service, and returning a service expiration information to the user to prompt the user to buy the service duration again.
For example, the authentication terminal is an automatic drinking or feeding device, the authorization server sends a ciphertext purchased by a user to the user terminal, the user terminal inputs the ciphertext to the authentication terminal through a manual input mode, a voice input mode, an I2C serial bus mode, a serial-parallel port mode, a USB mode, a TYPE-C mode, a bluetooth mode, a WIFI mode, a 433 mode or a two-dimensional code scan input mode, and the ciphertext includes an effective duration for the user to apply for authorization, wherein the authentication terminal is a drinking or feeding machine in the embodiment, and the drinking or feeding machine adds the effective duration to an original effective service duration to obtain an updated effective service duration, and outputs the updated effective service duration to the user through the display module. If receiving a food throwing starting instruction initiated by a user and the effective service time length is more than 0, controlling a motor of the food throwing machine to throw the feed; if the effective service duration is less than 0, closing the effective output instruction or cutting off the main control power supply and the motor of the equipment, and stopping feeding the feed until the user authorizes the feed again, so as to prolong the effective service duration.
For example, the authentication terminal is embedded in other service device combinations, the authorization server sends a ciphertext purchased by the user to the user terminal, the user terminal inputs the ciphertext into the authentication terminal through manual input, voice input, an I2C serial bus, a serial-parallel port, a USB, TYPE-C, bluetooth, WIFI, 433, or two-dimensional code scanning input and other modes, the ciphertext contains effective duration for the user to apply for authorization, and when the authentication terminal communicates with other devices, the method can be as follows: I2C serial bus, cluster and parallel port, USB, TYPE-C, bluetooth, WIFI, 433 and other modes carry out handshake communication. Thereby controlling the effective duration of the service device or directly adopting the effective duration mode of the power supply of the control device.
In S503, if the effective service duration is greater than 0, the authentication terminal responds to the device service request.
In this embodiment, if the authentication terminal detects that the valid service duration is greater than 0, it indicates that the user still has the right to use the authentication terminal, and therefore, the authentication terminal will respond to the device service request and provide the service corresponding to the device service request.
In the embodiment of the invention, the authentication terminal can determine whether to respond to the service initiated by the user according to whether the effective service duration of the user is greater than 0, thereby realizing the purpose of automatically managing the rental service function.
Fig. 6 shows a flowchart of a specific implementation of an authorization method according to a fifth embodiment of the present invention. Referring to fig. 6, with respect to the embodiment described in fig. 5, in the authorization method provided in this embodiment, after the authenticating terminal responds to the device service request if the valid service duration is greater than 0, the method further includes S604 to S606, which are detailed as follows:
since the implementation manners of S601 to S603 and S501 to S503 are completely the same, the detailed description may refer to the related descriptions of S501 to S503, and will not be described herein again.
Further, after the authenticating terminal responds to the device service request if the effective service duration is greater than 0, the method further includes:
in S604, the authentication terminal records the service duration for providing the service.
In this embodiment, after determining that the effective service duration corresponding to the service requested by the user terminal is greater than 0, the authentication terminal responds to the device service request initiated by the user, provides the service corresponding to the device service request, and records the service duration corresponding to the service provided by the authentication terminal in real time. Specifically, the authentication terminal acquires the service duration at preset time intervals, and performs the relevant operation of S605.
Optionally, in this embodiment, if the user completes the corresponding service operation, a service stop instruction may be sent to the authentication terminal, under this condition, the authentication terminal stops calculating the service duration, determines the remaining service duration of the user according to the effective service duration and the service duration corresponding to the time when the service stop instruction is received, and uses the remaining service duration as the updated effective service duration corresponding to the service, so that the user may stop the service at any time, and under the condition that the user does not use the service, the authentication terminal does not perform a timing operation on the service.
In S605, the authentication terminal calculates a difference between the effective service duration and the service duration to obtain a remaining service duration.
In this embodiment, after the authentication terminal goes to the service duration, the difference between the effective service duration and the service duration is calculated, and it is determined whether the user still has the right to use the service provided by the authentication terminal. Specifically, if the remaining duration is greater than 0, it indicates that the use permission of the user is still unexpired, and the service can be continuously provided and the service response operation can be continuously executed; otherwise, if the remaining duration is less than or equal to 0, it indicates that the usage right of the user has expired, and the user does not have the right to continue using the service provided by the authentication terminal, and the relevant operation of S606 is executed.
Optionally, in this embodiment, the manner of calculating the remaining duration by the authentication terminal may also be to record the remaining effective duration in real time according to an internal countdown timer. The implementation mode is specifically as follows: when the authentication terminal receives the equipment service request of the user and determines that the effective service time length of the user is greater than 0, the effective service time length is used as an initial value of the countdown timer, the countdown timer is started at the moment when the authentication terminal provides the service, counting down is carried out, and the residual effective time length is obtained in real time.
In S606, if the remaining service duration is less than or equal to 0, the authentication terminal stops providing the service.
In this embodiment, the authentication terminal monitors the remaining service duration calculated in S605 in real time, and if the remaining service duration is less than or equal to 0, stops providing the service, specifically, stops executing the function module corresponding to the service, and does not respond to the device service request of the user again until the user obtains the right to use the service again.
In the embodiment of the invention, the effective service duration is updated only when the user uses the service, so that duration charging is not needed when the user does not use the service, and the flexibility of using the service by the user is improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (8)

1. An authorization method applied to an authorization system, the authorization method comprising:
when the service duration of the authentication terminal is prolonged, the user terminal sends an authorization ciphertext acquisition request to an authorization server; the authorization ciphertext acquisition request comprises an effective duration of request authorization and a service identifier;
the authorization server generates an authorization ciphertext corresponding to the authorization ciphertext acquisition request according to a preset random ciphertext generation algorithm, and sends the authorization ciphertext to the user terminal;
the authentication terminal receives the authorization ciphertext input by the user terminal and identifies whether the authorization ciphertext is legal or not through a preset ciphertext decryption algorithm; the ciphertext decryption algorithm is a decryption algorithm corresponding to the random ciphertext generation algorithm;
if the authorization ciphertext is legal, the authentication terminal extracts the effective duration and the service identifier contained in the authorization ciphertext;
the authentication terminal updates the effective service duration of the service corresponding to the service identifier according to the effective duration, and the method comprises the following steps: overlapping the effective service duration required to be prolonged on the basis of the effective service duration of the service record corresponding to the service identifier;
the authorization ciphertext is specifically an authorization code, the authentication terminal receives the authorization ciphertext input by the user terminal, and identifies whether the authorization ciphertext is legal or not through a preset ciphertext decryption algorithm, and the method specifically includes:
the user terminal and the authentication terminal establish a communication channel;
the user terminal sends an authorization code input by a user to the authentication terminal through the communication channel;
and the authentication terminal identifies whether the authorization code is legal or not through the ciphertext decryption algorithm.
2. The authorization method according to claim 1, wherein the authorization ciphertext is specifically a two-dimensional code image, the authentication terminal receives the authorization ciphertext input by the user terminal, and identifies whether the authorization ciphertext is legal through a preset ciphertext decryption algorithm, specifically comprising:
the authentication terminal scans the two-dimensional code image displayed by the user terminal to acquire information contained in the two-dimensional code image;
and the authentication terminal decrypts the information contained in the two-dimensional code image through the ciphertext decryption algorithm to obtain a Uniform Resource Locator (URL), and analyzes whether the URL is a legal URL or not.
3. The authorization method according to claim 1 or 2, characterized in that it further comprises:
if the authentication terminal receives an equipment service request initiated by a user, detecting whether the effective service duration is greater than 0;
if the effective service duration is less than or equal to 0, the authentication terminal does not respond to the equipment service request;
and if the effective service duration is greater than 0, the authentication terminal responds to the equipment service request.
4. The authorization method according to claim 3, wherein after the authenticating terminal responds to the device service request if the valid service duration is greater than 0, the method further comprises:
the authentication terminal records the service duration of the service;
the authentication terminal calculates the difference between the effective service duration and the service duration to obtain the remaining service duration;
and if the residual service duration is less than or equal to 0, the authentication terminal stops providing the service.
5. An authorization system, characterized in that the authorization system comprises: the system comprises an authorization server, a user terminal and an authentication terminal;
the user terminal is used for sending an authorization ciphertext acquisition request to the authorization server when the service duration of the authentication terminal is prolonged; the authorization ciphertext acquisition request comprises an effective duration of request authorization and a service identifier;
the authorization server is used for generating an authorization ciphertext corresponding to the authorization ciphertext acquisition request according to a preset random ciphertext generation algorithm and sending the authorization ciphertext to the user terminal;
the authentication terminal is used for receiving the authorization ciphertext input by the user terminal and identifying whether the authorization ciphertext is legal or not through a preset ciphertext decryption algorithm; the ciphertext decryption algorithm is a decryption algorithm corresponding to the random ciphertext generation algorithm;
the authentication terminal is used for extracting the effective duration and the service identifier contained in the authorization ciphertext if the authorization ciphertext is legal;
the authentication terminal is configured to update the effective service duration of the service corresponding to the service identifier according to the effective duration, and includes: overlapping the effective service duration required to be prolonged on the basis of the effective service duration of the service record corresponding to the service identifier;
the authorization ciphertext is specifically an authorization code, and the authentication terminal is configured to receive the authorization ciphertext input by the user terminal, and identify whether the authorization ciphertext is legal through a preset ciphertext decryption algorithm, and specifically includes:
the user terminal is used for establishing a communication channel with the authentication terminal;
the user terminal is used for sending the authorization code input by the user to the authentication terminal through the communication channel;
and the authentication terminal is used for identifying whether the authorization code is legal or not through the ciphertext decryption algorithm.
6. The authorization system according to claim 5, wherein the authorization ciphertext is specifically a two-dimensional code image, and the authentication terminal is configured to receive the authorization ciphertext input by the user terminal, and identify whether the authorization ciphertext is legal through a preset ciphertext decryption algorithm, and specifically includes:
the authentication terminal is used for scanning the two-dimensional code image displayed by the user terminal and acquiring information contained in the two-dimensional code image;
and the authentication terminal is used for decrypting the information contained in the two-dimensional code image through the ciphertext decryption algorithm to obtain a Uniform Resource Locator (URL), and analyzing whether the URL is a legal URL or not.
7. The authorization system according to claim 5 or 6, characterized by further comprising:
the authentication terminal is used for detecting whether the effective service duration is greater than 0 or not if receiving an equipment service request initiated by a user;
the authentication terminal is used for not responding to the equipment service request if the effective service duration is less than or equal to 0;
and the authentication terminal is used for responding to the equipment service request if the effective service duration is greater than 0.
8. The system according to claim 7, wherein after the authenticating terminal is configured to respond to the device service request if the valid service duration is greater than 0, the system further comprises:
the authentication terminal is used for recording the service duration of the service;
the authentication terminal is used for calculating the difference between the effective service duration and the service duration to obtain the residual service duration;
and the authentication terminal is used for stopping providing the service if the residual service duration is less than or equal to 0.
CN201711205512.1A 2017-11-27 2017-11-27 Authorization method and system thereof Active CN108023727B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711205512.1A CN108023727B (en) 2017-11-27 2017-11-27 Authorization method and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711205512.1A CN108023727B (en) 2017-11-27 2017-11-27 Authorization method and system thereof

Publications (2)

Publication Number Publication Date
CN108023727A CN108023727A (en) 2018-05-11
CN108023727B true CN108023727B (en) 2021-04-09

Family

ID=62077384

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711205512.1A Active CN108023727B (en) 2017-11-27 2017-11-27 Authorization method and system thereof

Country Status (1)

Country Link
CN (1) CN108023727B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889342B (en) * 2018-12-15 2023-07-18 中国平安人寿保险股份有限公司 Interface test authentication method and device, electronic equipment and storage medium
CN109523948B (en) * 2018-12-28 2021-02-02 深圳市奥拓电子股份有限公司 LED display screen authorization control method, LED display screen and storage medium
CN111224955B (en) * 2019-12-25 2023-02-03 中国平安人寿保险股份有限公司 Service response method and system
CN111710404B (en) * 2020-05-31 2024-01-23 南京麦澜德医疗科技股份有限公司 Equipment authorization using method
CN114861154B (en) * 2022-07-04 2023-04-11 荣耀终端有限公司 Collaborative login method
CN116992424B (en) * 2023-09-28 2024-02-02 杭州行至云起科技有限公司 Authorization code using method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546648A (en) * 2012-01-18 2012-07-04 Ut斯达康通讯有限公司 Resource access authorization method
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN106921617A (en) * 2015-12-25 2017-07-04 腾讯科技(深圳)有限公司 Common equipment reservation control method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4442294B2 (en) * 2004-04-09 2010-03-31 ソニー株式会社 Content playback apparatus, program, and content playback control method
CN102143468B (en) * 2010-09-25 2014-01-08 华为软件技术有限公司 Method and system for charging, tariff update and service provision
CN106412108B (en) * 2016-11-09 2019-07-26 深圳华远云联数据科技有限公司 User data dispositions method and system based on cloud platform framework

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546648A (en) * 2012-01-18 2012-07-04 Ut斯达康通讯有限公司 Resource access authorization method
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN106921617A (en) * 2015-12-25 2017-07-04 腾讯科技(深圳)有限公司 Common equipment reservation control method and device

Also Published As

Publication number Publication date
CN108023727A (en) 2018-05-11

Similar Documents

Publication Publication Date Title
CN108023727B (en) Authorization method and system thereof
US8984295B2 (en) Secure access to electronic devices
CN111246539B (en) Networking binding method of intelligent household appliance, intelligent household appliance and user terminal
JP5688458B2 (en) System and method for securely using multiple subscriber profiles in security components and portable communication devices
KR101819556B1 (en) Apparatus and method for supporting family cloud in cloud computing system
CN108376211B (en) Software authorization management method, server and system
CN106330442B (en) Identity authentication method, device and system
EP2437461B1 (en) Key derivation for secure communications
EP2770695A1 (en) Method, server and user terminal for providing and acquiring media content
CN103095457A (en) Login and verification method for application program
CN103188221A (en) Application login method, application login device and mobile terminal
CN110276000B (en) Method and device for acquiring media resources, storage medium and electronic device
CN101526985A (en) Client system and method of digital rights management and digital rights management system
JP2014531659A (en) System and method for user authentication
KR101560246B1 (en) System for Cloud Printing and Method of Cloud Printing Service using the Same
CN113328861B (en) Authority verification method, device and system
JP2005157881A5 (en)
US20130247152A1 (en) Access device, access system and computer program product
CN109873819A (en) A kind of method and system preventing unauthorized access server
CN104811303A (en) Two-way authentication method, two-way authentication device and two-way authentication system
WO2019067086A1 (en) Methods and systems of performing preemptive generation of second factor authentication
CN104247485A (en) Network application function authorisation in a generic bootstrapping architecture
CN112399392A (en) Communication connection method, device, equipment and storage medium of home care terminal
US20050021469A1 (en) System and method for securing content copyright
CN105141624A (en) Login method, account management server and client system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant