CN109117647A - A kind of the permission control management method and management system of mobile application SDK - Google Patents

A kind of the permission control management method and management system of mobile application SDK Download PDF

Info

Publication number
CN109117647A
CN109117647A CN201810782042.3A CN201810782042A CN109117647A CN 109117647 A CN109117647 A CN 109117647A CN 201810782042 A CN201810782042 A CN 201810782042A CN 109117647 A CN109117647 A CN 109117647A
Authority
CN
China
Prior art keywords
sdk
permission
time
token
control module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810782042.3A
Other languages
Chinese (zh)
Other versions
CN109117647B (en
Inventor
陈利群
陈涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhongan Information Technology Service Co ltd
Original Assignee
Zhongan Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongan Information Technology Service Co Ltd filed Critical Zhongan Information Technology Service Co Ltd
Priority to CN201810782042.3A priority Critical patent/CN109117647B/en
Publication of CN109117647A publication Critical patent/CN109117647A/en
Application granted granted Critical
Publication of CN109117647B publication Critical patent/CN109117647B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of permission of mobile application SDK control management method and management systems, belong to field of computer technology, described method includes following steps: judging whether it is and use SDK for the first time;Judge that local token of whether testing is known;If being known for the first time using SDK and local token of testing, calling interface issues warning note;If knowing for the first time using SDK and local token of not testing, SDK is called;If not knowing for the first time using SDK and local token of testing, then SDK is called;If not knowing for the first time using SDK and local token of not testing, then judge whether to be more than to exempt from permission number.For not yet applying in method disclosed by the invention, or the third-party application also in application process, also SDK can be used and carry out functional development and verifying, and it is equipped with and SDK is called to have number limitation, applicant can not issue, on the one hand it can satisfy the demand quickly developed, on the other hand meet the rights management needs for calling SDK.

Description

A kind of the permission control management method and management system of mobile application SDK
Technical field
The present invention relates to field of computer technology, in particular to the permission of a kind of mobile application SDK control management method and Management system.
Background technique
Mobile terminal SDK is mechanism or personal publication, and what can be used by third-party application encapsulates the soft of specific function Part packet or software library.For the developer of SDK or Development institution, is issued in SDK and propagate and flow on the internet It is a troublesome problem how to using the third-party application of SDK to carry out the control of version and permission after logical, in fact it could happen that The problem of it is as follows:
1, it tests power and realizes entirely localization, it is easier to inversely be cracked, while more parts must be generated according to different applications SDK, and after third-party application permission is expired, cannot achieve permission withdrawal.
2, the white list for weighing the cloud that places one's entire reliance upon is tested, then must all carry out network access every time or for the first time, is come Determine whether third-party application has the permission that this SDK can be used, in the imperfect situation of network condition, user experience will be difficult To guarantee, even if network condition is good, there is also corresponding delays.
It is not friendly enough for the developer of third-party application if 3, SDK just can be used after must verifying It is good.The developer of third-party application must can just carry out exploitation verifying after applying for permission, this link can delay Tripartite applies the development time of publisher.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides a kind of controls of the permission of mobile application SDK to manage Reason method and management system.The technical solution is as follows:
On the one hand, the present invention provides the permissions of mobile application SDK a kind of to control management method, and the method includes as follows Key step:
Judge whether it is and uses SDK for the first time;
Judge that local token of whether testing is known;
If being known for the first time using SDK and local token of testing, calling interface issues warning note;
If knowing for the first time using SDK and local token of not testing, SDK is called;
If not knowing for the first time using SDK and local token of testing, then SDK is called;
If not knowing for the first time using SDK and local token of not testing, then judge whether to be more than to exempt from permission number.
With reference to first aspect, described to judge whether to be more than to exempt from permission number in the first mode in the cards, if not having It has more than and exempts from permission number, then call SDK;
If being more than to exempt from permission number, synchronizing network connection is initiated, the permission for calling SDK is judged whether there is, if there is calling The permission of SDK, then generation tests token and knows and call SDK;If not calling the permission of SDK, SDK is called to fail.
The possible implementation of with reference to first aspect the first, in the third mode in the cards, if described do not have More than permission number is exempted from, then during calling SDK, if there is network connection, asynchronous network authentication is initiated, tune is judged whether there is With SDK permission, SDK permission is called if having, token knowledge is tested in generation, calls SDK;If not calling SDK permission, SDK is called Failure.
A kind of possible implementation of any of the above with reference to first aspect, it is described in the 4th kind of mode in the cards If not knowing for the first time using SDK and local token of testing, then during calling SDK, if there is network connection, asynchronous network is initiated Authentication, judges whether there is and continues to use SDK permission;If not continuing to use SDK permission, empties and test token knowledge;If there is continuation Using SDK permission, then SDK is called.
The 4th kind of possible implementation with reference to first aspect, it is described to test token in the 5th kind of mode in the cards The generation method of knowledge includes the following steps:
Generating device fingerprint obtains certification mark and SDK version number;
The device-fingerprint, certification mark and SDK version number are assembled into the first character string;
By first character string by the operation of sha3 algorithm, the first Hash is generated;
Local random generation private key, and the first public key is calculated by elliptic curve according to private key;
First Hash and private key are generated into digital signature;
Digital signature is examined, if examining successfully, digital signature is to test token knowledge.
The 5th kind of possible implementation with reference to first aspect, in the 6th kind of mode in the cards, the certification mark Know the unique identification for the name identification distribution for referring to that cloud is filled according to client.
The 5th kind with reference to first aspect or the 6th kind of possible implementation, in the 7th kind of mode in the cards, The digital signature packets of the inspection include following steps:
The digital signature and the device-fingerprint, SDK version number, the first public key are uploaded to cloud together;
Cloud is assembled into the according to pre-registered certification mark white list and the above device-fingerprint that transmits, SDK version number Two character strings;
Second character string generates the second Hash by the operation of sha3 algorithm;
Cloud calculates the second public key according to second Hash and the digital signature, by elliptic curve;
The first public key and the second public key are compared, comparing the consistent then described digital signature is to test token knowledge.
On the other hand, the present invention provides the permission Control management system of mobile application SDK a kind of, the system comprises: Third-party application, SDK, Cloud Server;
The third-party application includes: to call SDK interface, for calling SDK;
The SDK includes: external interface, is connect with SDK interface is called;
Permission control module, connect with external interface;
SDK functional module is connect with permission control module, external interface module;
The Cloud Server includes: network interface, is connect with the permission control module.
In conjunction with second aspect, in second of mode in the cards, the permission control module includes: permission control for the first time Molding block and non-permission control module for the first time;The non-control module of permission for the first time includes: to exempt from permission number authentication module, be more than Exempt from permission number control module and be less than to exempt from permission number control module.
It is described to weigh for the first time in the third mode in the cards in conjunction with second of possible implementation of second aspect Limit control module includes: to test token to know detection module, warning note module;Described is more than to exempt from permission number control module and do not surpass Cross that exempt from permission number control module include: network detection module and to test power identifier generation module.
Technical solution provided in an embodiment of the present invention has the benefit that
1, in method disclosed by the invention for not yet applying, or the third-party application also in application process, it can also It to use SDK to carry out functional development and verifying, and is equipped with and SDK is called to have number limitation, applicant can not issue, on the one hand can be with Meet the needs of quickly developing, on the other hand meets the rights management needs for calling SDK;
2, its right to use can timely be closed after the permission of third party's application is overdue in method disclosed by the invention Limit;
3, the present invention in the case where network condition is not sufficiently good, can still guarantee user SDK use, will not to The usage experience at family causes deleterious effect;
4, SDK data verification uses elliptic curve in method disclosed by the invention, avoids traditional RSA Algorithm Public and private key is generated by server-side, and then public key is directly exposed to client, but client easily causes public key leakage not again Safety problem.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is a kind of permission control management method flow chart for mobile application SDK that the embodiment of the present invention 1 provides;
Fig. 2 is that testing for the offer of the embodiment of the present invention 1 weighs mark generating method flow chart;
Fig. 3 is the inspection digital signature method flow chart that the embodiment of the present invention 1 provides;
Fig. 4 is a kind of permission control management method flow chart for mobile application SDK that the embodiment of the present invention 2 provides;
Fig. 5 is a kind of permission Control management system schematic diagram for mobile application SDK that the embodiment of the present invention 3 provides.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached in the embodiment of the present invention Figure, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only this Invention a part of the embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art exist Every other embodiment obtained under the premise of creative work is not made, shall fall within the protection scope of the present invention.
Embodiment 1
As shown in Figure 1, the permission of mobile application SDK a kind of controls management method, include the following steps:
S01: judge whether it is and use SDK for the first time;
S02: judge that local token of whether testing is known;
Above-mentioned judgement generates following four result:
If 1, being known for the first time using SDK and local token of testing, calling interface issues warning note;
If 2, knowing for the first time using SDK and local token of not testing, SDK is called;
If not 3, knowing for the first time using SDK and local token of testing, then SDK is called;
If not 4, knowing for the first time using SDK and local token of not testing, then judge whether to be more than to exempt from permission number.
Wherein, judge whether to be more than to exempt from permission number involved in the 4th kind of result, generate following two result:
Exempt from permission number if 1, being not above, calls SDK;
If 2, being more than to exempt from permission number, synchronizing network connection is initiated, the permission for calling SDK is judged whether there is, if there is tune With the permission of SDK, then generation tests token and knows and call SDK;If not calling the permission of SDK, SDK is called to fail.
As shown in Fig. 2, what is be related to tests token knowledge judging whether to be more than in the 2nd result for exempting from the generation of permission number Generation method include the following steps:
Generating device fingerprint obtains certification mark and SDK version number;
The device-fingerprint, certification mark and SDK version number are assembled into the first character string;
By first character string by the operation of sha3 algorithm, the first Hash is generated;
Local random generation private key, and the first public key is calculated by elliptic curve according to private key;
First Hash and private key are generated into digital signature;
Digital signature is examined, if examining successfully, digital signature is to test token knowledge.
Above-mentioned to test in power mark generating method, certification mark refers to that cloud is distributed only according to the name identification that client fills in One mark.
As shown in figure 3, above-mentioned test in power mark generating method, digital signature packets is examined to include following steps:
The digital signature and the device-fingerprint, SDK version number, the first public key are uploaded to cloud together;
Cloud is assembled into the according to pre-registered certification mark white list and the above device-fingerprint that transmits, SDK version number Two character strings;
Second character string generates the second Hash by the operation of sha3 algorithm;
Cloud calculates the second public key according to second Hash and the digital signature, by elliptic curve;
The first public key and the second public key are compared, comparing the consistent then described digital signature is to test token knowledge.
Embodiment 2
As shown in figure 4, the permission of mobile application SDK a kind of controls management method, include the following steps:
S01: judge whether it is and use SDK for the first time;
S02: judge that local token of whether testing is known;
Above-mentioned judgement generates following four result:
If 1, being known for the first time using SDK and local token of testing, calling interface issues warning note;
If 2, knowing for the first time using SDK and local token of not testing, SDK is called;
If not 3, knowing for the first time using SDK and local token of testing, then SDK is called, judgement is local while calling SDK is It is no to have network connection, if there is network connection, asynchronous network authentication is initiated, judges whether there is and continues to use SDK permission;If no SDK permission is continued to use, then empties and tests token knowledge;If continuing to use SDK permission, SDK is called;
If not 4, knowing for the first time using SDK and local token of not testing, then judge whether to be more than to exempt from permission number.
Wherein, judge whether to be more than to exempt from permission number involved in the 4th kind of result, generate following two result:
Exempt from permission number if 1, being not above, call SDK, during calling SDK, judges locally whether there is network Connection initiates asynchronous network connection, judges whether there is and call SDK permission if there is network connection, calls SDK permission if having, Token knowledge is tested in generation, calls SDK;If not calling SDK permission, SDK is called to fail;
If 2, being more than to exempt from permission number, synchronizing network authentication is initiated, the permission for calling SDK is judged whether there is, if there is tune With the permission of SDK, then generation tests token and knows and call SDK;If not calling the permission of SDK, SDK is called to fail.
As shown in Fig. 2, what is be related to tests token knowledge judging whether to be more than in the 2nd result for exempting from the generation of permission number Generation method include the following steps:
Generating device fingerprint obtains certification mark and SDK version number;
The device-fingerprint, certification mark and SDK version number are assembled into the first character string;
By first character string by the operation of sha3 algorithm, the first Hash is generated;
Local random generation private key, and the first public key is calculated by elliptic curve according to private key;
First Hash and private key are generated into digital signature;
Digital signature is examined, if examining successfully, digital signature is to test token knowledge.
Above-mentioned to test in power mark generating method, certification mark refers to that cloud is distributed only according to the name identification that client fills in One mark.
As shown in figure 3, above-mentioned test in power mark generating method, digital signature packets is examined to include following steps:
The digital signature and the device-fingerprint, SDK version number, the first public key are uploaded to cloud together;
Cloud is assembled into the according to pre-registered certification mark white list and the above device-fingerprint that transmits, SDK version number Two character strings;
Second character string generates the second Hash by the operation of sha3 algorithm;
Cloud calculates the second public key according to second Hash and the digital signature, by elliptic curve;
The first public key and the second public key are compared, comparing the consistent then described digital signature is to test token knowledge.
Compared with Example 1, there are two differences for the present embodiment:
1, it is non-for the first time and it is local test call SDK in the case that token is known during, increase the step that network tests power Suddenly, main purpose and is arranged or empties according to judging result and test to judge whether user has a permission logged on Token is known.
2, do not test that token is known and be not above and exempt from permission number in the case where then calls locally using SDK for the first time non- During SDK, the step of network tests power is increased, main purpose is that token knowledge is tested for generation of networking, in order to next time Token knowledge is tested without being once again set up when login, avoids next time when logging in due to the case where can not logging in without network connection.
Based on two above difference, embodiment 2 have the excellent of SDK still can be logged in the case where local is without network Gesture guarantees the good sign-in experience of user.
Embodiment 3
As shown in figure 5, based on embodiment 2, the present invention provides the permission Control management system of mobile application SDK a kind of, institutes The system of stating includes: third-party application, SDK, Cloud Server;
The third-party application includes: to call SDK interface, for calling SDK;
The SDK includes: external interface, is connect with SDK interface is called;
Permission control module, for being connect with external interface;
SDK functional module, for being connect with permission control module, external interface module;
The Cloud Server includes: network interface, is connect with the permission control module.
Further, the permission control module includes: permission control module and non-permission control module for the first time for the first time;Institute Stating the non-control module of permission for the first time includes: to exempt from permission number authentication module, more than exempting from permission number control module and be less than to exempt from Permission number control module.
Further, the control module of permission for the first time includes: and tests token to know detection module, warning note module;It is described More than exempting from permission number control module and being less than and exempt from permission number control module to include: network detection module and test token and know Generation module.
All the above alternatives can form alternative embodiment of the invention using any combination, herein no longer It repeats one by one.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (10)

1. the permission of mobile application SDK a kind of controls management method, which is characterized in that including following key step:
Judge whether it is and uses SDK for the first time;
Judge that local token of whether testing is known;
If being known for the first time using SDK and local token of testing, calling interface issues warning note;
If knowing for the first time using SDK and local token of not testing, SDK is called;
If not knowing for the first time using SDK and local token of testing, then SDK is called;
If not knowing for the first time using SDK and local token of not testing, then judge whether to be more than to exempt from permission number.
2. a kind of permission of mobile application SDK as described in claim 1 controls management method, which is characterized in that the judgement Whether it is more than to exempt from permission number, exempts from permission number if being not above, call SDK;
If being more than to exempt from permission number, synchronizing network connection is initiated, the permission for calling SDK is judged whether there is, calls SDK's if having Permission, then generation tests token and knows and call SDK;If not calling the permission of SDK, SDK is called to fail.
3. a kind of permission of mobile application SDK as claimed in claim 2 controls management method, which is characterized in that if described do not have It has more than and exempts from permission number, then during calling SDK, if there is network connection, initiate asynchronous network authentication, judge whether there is SDK permission is called, calls SDK permission if having, token knowledge is tested in generation, calls SDK;If not calling SDK permission, call SDK failure.
4. the permission of mobile application SDK as described in any one of claims 1 to 3 a kind of controls management method, feature It is, if not described known using SDK and local token of testing for the first time, then during calling SDK, if there is network connection, sends out Asynchronous network authentication is played, judges whether there is and continues to use SDK permission;If not continuing to use SDK permission, empties and test token Know;If continuing to use SDK permission, SDK is called.
5. a kind of permission of mobile application SDK as claimed in claim 4 controls management method, which is characterized in that described to test power The generation method of mark includes the following steps:
Generating device fingerprint obtains certification mark and SDK version number;
The device-fingerprint, certification mark and SDK version number are assembled into the first character string;
By first character string by the operation of sha3 algorithm, the first Hash is generated;
Local random generation private key, and the first public key is calculated by elliptic curve according to private key;
First Hash and private key are generated into digital signature;
Digital signature is examined, if examining successfully, digital signature is to test token knowledge.
6. a kind of permission of mobile application SDK as claimed in claim 5 controls management method, which is characterized in that the certification Mark refers to the unique identification for the name identification distribution that cloud is filled according to client.
7. the permission of mobile application SDK as described in any one of claim 5 or 6 a kind of controls management method, feature It is, the digital signature packets of the inspection include following steps:
The digital signature and the device-fingerprint, SDK version number, the first public key are uploaded to cloud together;
Cloud is assembled into the second word according to the pre-registered device-fingerprint for authenticating mark white list and above transmitting, SDK version number Symbol string;
Second character string generates the second Hash by the operation of sha3 algorithm;
Cloud calculates the second public key according to second Hash and the digital signature, by elliptic curve;
The first public key and the second public key are compared, comparing the consistent then described digital signature is to test token knowledge.
8. a kind of permission Control management system of mobile application SDK characterized by comprising third-party application, SDK, cloud service Device;
The third-party application includes: to call SDK interface, for calling SDK;
The SDK includes: external interface, is connect with SDK interface is called;
Permission control module, connect with external interface;
SDK functional module is connect with permission control module, external interface module;
The Cloud Server includes: network interface, is connect with the permission control module.
9. a kind of permission Control management system of mobile application SDK as claimed in claim 8, which is characterized in that the permission Control module includes: permission control module and non-permission control module for the first time for the first time;The non-control module of permission for the first time includes: Exempt from permission number authentication module, more than exempting from permission number control module and be less than to exempt from permission number control module.
10. a kind of permission Control management system of mobile application SDK as claimed in claim 9, which is characterized in that it is described for the first time Permission control module includes: to test token to know detection module, warning note module;Described is more than to exempt from permission number control module and not Include: network detection module and test power identifier generation module more than permission number control module is exempted from.
CN201810782042.3A 2018-07-17 2018-07-17 Authority control management method and management system of mobile application SDK Active CN109117647B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810782042.3A CN109117647B (en) 2018-07-17 2018-07-17 Authority control management method and management system of mobile application SDK

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810782042.3A CN109117647B (en) 2018-07-17 2018-07-17 Authority control management method and management system of mobile application SDK

Publications (2)

Publication Number Publication Date
CN109117647A true CN109117647A (en) 2019-01-01
CN109117647B CN109117647B (en) 2021-03-02

Family

ID=64862757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810782042.3A Active CN109117647B (en) 2018-07-17 2018-07-17 Authority control management method and management system of mobile application SDK

Country Status (1)

Country Link
CN (1) CN109117647B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112528248A (en) * 2020-12-08 2021-03-19 北京航天云路有限公司 User authority management scheme facing multiple applications

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034059A (en) * 2010-12-02 2011-04-27 东莞宇龙通信科技有限公司 Method and device for managing application program and terminal
CN103167498A (en) * 2011-12-19 2013-06-19 卓望数码技术(深圳)有限公司 Ability control method and system
CN103617394A (en) * 2013-12-04 2014-03-05 北京网秦天下科技有限公司 SDK providing and invoking method and associated device
CN103793633A (en) * 2014-02-14 2014-05-14 宇龙计算机通信科技(深圳)有限公司 Method and device for calibrating SDK
CN104426948A (en) * 2013-08-28 2015-03-18 北京闹米科技有限公司 Network data sharing system and network data sharing method
WO2015062494A1 (en) * 2013-10-29 2015-05-07 北京奇虎科技有限公司 Method and device for sdk uploading and downloading of a file
CN104836784A (en) * 2014-09-25 2015-08-12 腾讯科技(北京)有限公司 Information processing method, client, and server
US20150339789A1 (en) * 2008-08-29 2015-11-26 Taku Nagumo Apparatus, license determining method, recording medium
CN106295310A (en) * 2016-07-28 2017-01-04 乐视控股(北京)有限公司 Third party's program SDK authentication processing method and device
CN106709280A (en) * 2016-12-08 2017-05-24 北京旷视科技有限公司 Method, client and server for processing information
CN107070948A (en) * 2017-05-23 2017-08-18 广东工业大学 Signature and verification method based on hybrid encryption algorithm in cloud storage
CN107689870A (en) * 2017-08-29 2018-02-13 杭州绿湾网络科技有限公司 Client method for authenticating and system
CN107704334A (en) * 2017-10-13 2018-02-16 维沃移动通信有限公司 A kind of SDK processing method and mobile terminal

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150339789A1 (en) * 2008-08-29 2015-11-26 Taku Nagumo Apparatus, license determining method, recording medium
CN102034059A (en) * 2010-12-02 2011-04-27 东莞宇龙通信科技有限公司 Method and device for managing application program and terminal
CN103167498A (en) * 2011-12-19 2013-06-19 卓望数码技术(深圳)有限公司 Ability control method and system
CN104426948A (en) * 2013-08-28 2015-03-18 北京闹米科技有限公司 Network data sharing system and network data sharing method
WO2015062494A1 (en) * 2013-10-29 2015-05-07 北京奇虎科技有限公司 Method and device for sdk uploading and downloading of a file
CN103617394A (en) * 2013-12-04 2014-03-05 北京网秦天下科技有限公司 SDK providing and invoking method and associated device
CN103793633A (en) * 2014-02-14 2014-05-14 宇龙计算机通信科技(深圳)有限公司 Method and device for calibrating SDK
CN104836784A (en) * 2014-09-25 2015-08-12 腾讯科技(北京)有限公司 Information processing method, client, and server
CN106295310A (en) * 2016-07-28 2017-01-04 乐视控股(北京)有限公司 Third party's program SDK authentication processing method and device
CN106709280A (en) * 2016-12-08 2017-05-24 北京旷视科技有限公司 Method, client and server for processing information
CN107070948A (en) * 2017-05-23 2017-08-18 广东工业大学 Signature and verification method based on hybrid encryption algorithm in cloud storage
CN107689870A (en) * 2017-08-29 2018-02-13 杭州绿湾网络科技有限公司 Client method for authenticating and system
CN107704334A (en) * 2017-10-13 2018-02-16 维沃移动通信有限公司 A kind of SDK processing method and mobile terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MATIAS MARTINEZ: "Towards the Quality Improvement of Cross-Platform Mobile Applications", 《2017 IEEE/ACM 4TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT)》 *
邵奇峰 等: "区块链技术:架构及进展", 《计算机学报》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112528248A (en) * 2020-12-08 2021-03-19 北京航天云路有限公司 User authority management scheme facing multiple applications

Also Published As

Publication number Publication date
CN109117647B (en) 2021-03-02

Similar Documents

Publication Publication Date Title
EP3061027B1 (en) Verifying the security of a remote server
Balfe et al. Trusted computing: Providing security for peer-to-peer networks
KR100463736B1 (en) Method for permitting debugging and testing of software on mobile communication device in a secure environment
US8220032B2 (en) Methods, devices, and computer program products for discovering authentication servers and establishing trust relationships therewith
CN108965230A (en) A kind of safety communicating method, system and terminal device
CN113014444B (en) Internet of things equipment production test system and safety protection method
TW201525755A (en) Method for verifying legitimacy, middle server and computer-readable storage medium
WO2016029595A1 (en) Method, device, and equipment for calling open platform and non-volatile computer storage medium
WO2022247359A1 (en) Cluster access method and apparatus, electronic device, and medium
US7822689B2 (en) Maintaining privacy for transactions performable by a user device having a security module
CN104158802A (en) Platform authorization method, platform service side, application client side and system
Bitton et al. Evaluating the information security awareness of smartphone users
CN106331003A (en) Method and device for accessing application portal system on cloud desktop
CN110401640A (en) A kind of credible connection method based on trust computing binary system structure
CN104821951B (en) A kind of method and apparatus of secure communication
CN110166471A (en) A kind of portal authentication method and device
CN112804269B (en) Method for realizing website interface anti-crawler
CN109117647A (en) A kind of the permission control management method and management system of mobile application SDK
CN110035076A (en) Trusted access method, trusted client and server towards energy internet
CN101789973A (en) Method and system for constructing Mashup application
CN115001714B (en) Resource access method and device, electronic equipment and storage medium
CN116108416A (en) Application program interface safety protection method and system
CN110430213A (en) Service request processing method, apparatus and system
CN109639695A (en) Dynamic identity authentication method, electronic equipment and storage medium based on mutual trust framework
CN105978919B (en) A kind of authentication processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240306

Address after: Room 1179, W Zone, 11th Floor, Building 1, No. 158 Shuanglian Road, Qingpu District, Shanghai, 201702

Patentee after: Shanghai Zhongan Information Technology Service Co.,Ltd.

Country or region after: China

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: ZHONGAN INFORMATION TECHNOLOGY SERVICE Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240415

Address after: Room 1179, W Zone, 11th Floor, Building 1, No. 158 Shuanglian Road, Qingpu District, Shanghai, 201702

Patentee after: Shanghai Zhongan Information Technology Service Co.,Ltd.

Country or region after: China

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: ZHONGAN INFORMATION TECHNOLOGY SERVICE Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right