CN111046367A - Voice equipment authentication method and system - Google Patents

Voice equipment authentication method and system Download PDF

Info

Publication number
CN111046367A
CN111046367A CN201911347342.XA CN201911347342A CN111046367A CN 111046367 A CN111046367 A CN 111046367A CN 201911347342 A CN201911347342 A CN 201911347342A CN 111046367 A CN111046367 A CN 111046367A
Authority
CN
China
Prior art keywords
voice
processor
information
fingerprint
device fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911347342.XA
Other languages
Chinese (zh)
Other versions
CN111046367B (en
Inventor
王小雨
闻洪凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AI Speech Ltd
Original Assignee
AI Speech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AI Speech Ltd filed Critical AI Speech Ltd
Priority to CN201911347342.XA priority Critical patent/CN111046367B/en
Publication of CN111046367A publication Critical patent/CN111046367A/en
Application granted granted Critical
Publication of CN111046367B publication Critical patent/CN111046367B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an authentication method of voice equipment, which is applied to the voice equipment and comprises the following steps: acquiring a first device fingerprint of the voice device; obtaining a pre-stored authorization code, and checking the authorization code to obtain a second device fingerprint, wherein the authorization code is obtained by encoding a third device fingerprint uploaded by the voice device in advance by a voice server; determining whether the first device fingerprint matches the second device fingerprint; and when the first device fingerprint is matched with the second device fingerprint, determining that the voice device passes the authentication. Even in an off-line state, the embodiment of the invention can ensure one-to-one correspondence between the authorization and the actual voice equipment by the authentication method of the invention, thereby avoiding the situation that a user can apply the same authorization to a plurality of pieces of equipment.

Description

Voice equipment authentication method and system
Technical Field
The invention relates to the technical field of electronic equipment, in particular to a voice equipment authentication method and system.
Background
In the prior art, the device authentication and authorization method mostly adopts software verification: in the method of using the authorization sequence number, the authorization sequence number is usually a long string of unnoticeable and irregular characters. The generation of the character string does not require the user to provide device information for application installation deployment when the device fingerprint, i.e., the authorized serial number, is issued.
However, the most obvious problem of this method is that, in an offline state, a user may apply the same authorization to multiple devices, and since the device information is not included, the devices can be normally used, and accurate authentication cannot be achieved.
Disclosure of Invention
The embodiment of the invention provides a voice equipment authentication method and a system, which are used for solving at least one of the technical problems.
In a first aspect, an embodiment of the present invention provides an authentication method for a voice device, which is applied to a voice device, and the method includes:
acquiring a first device fingerprint of the voice device;
obtaining a pre-stored authorization code, and checking the authorization code to obtain a second device fingerprint, wherein the authorization code is obtained by encoding a third device fingerprint uploaded by the voice device in advance by a voice server;
determining whether the first device fingerprint matches the second device fingerprint;
and when the first device fingerprint is matched with the second device fingerprint, determining that the voice device passes the authentication.
In a second aspect, an embodiment of the present invention provides an authentication system for a voice device, where the authentication system is applied to a voice device, and the system includes:
the information acquisition module is used for acquiring a first device fingerprint of the voice device;
the first verification module is used for acquiring a pre-stored authorization code and verifying the authorization code to obtain a second device fingerprint, wherein the authorization code is obtained by encoding a third device fingerprint uploaded by the voice device in advance by a voice server;
a second check module, configured to determine whether the first device fingerprint matches the second device fingerprint;
and the authentication module is used for determining that the voice equipment passes the authentication when the first equipment fingerprint is matched with the second equipment fingerprint.
In a third aspect, an embodiment of the present invention provides a storage medium, where one or more programs including execution instructions are stored, where the execution instructions can be read and executed by an electronic device (including but not limited to a computer, a server, or a network device, etc.) to perform any one of the above-mentioned voice device authentication methods of the present invention.
In a fourth aspect, an electronic device is provided, comprising: the voice equipment authentication method comprises at least one processor and a memory which is in communication connection with the at least one processor, wherein the memory stores instructions which can be executed by the at least one processor, and the instructions are executed by the at least one processor so as to enable the at least one processor to execute any one of the voice equipment authentication methods.
In a fifth aspect, an embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program stored on a storage medium, and the computer program includes program instructions, and when the program instructions are executed by a computer, the computer is caused to execute any one of the above methods for authenticating a speech device.
The embodiment of the invention has the beneficial effects that: the embodiment of the invention uses a software verification scheme, an authentication algorithm comprises a symmetrical part and an asymmetrical part, the symmetrical part realizes the confirmation of the fingerprint of the equipment, and the asymmetrical part realizes the verification of the authorization information. This enables two levels of verification: 1. asymmetric verification that can prove whether this authorization code is legitimate (i.e., whether it was issued by a legitimate voice service provider); 2. a symmetric check to verify that the authorization code was issued to a legitimate voice device. Therefore, even in an off-line state, the one-to-one correspondence between the authorization and the actual voice equipment can be ensured by the authentication method of the invention, and the condition that a user can apply the same authorization to a plurality of equipment is avoided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of one embodiment of a voice device authentication method of the present invention;
FIG. 2 is a flow chart of another embodiment of the authentication method of the voice device of the present invention;
FIG. 3 is a functional block diagram of an embodiment of a voice device authentication system of the present invention;
fig. 4 is a schematic structural diagram of an embodiment of an electronic device according to the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
As used in this disclosure, "module," "device," "system," and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, or software in execution. In particular, for example, an element may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. Also, an application or script running on a server, or a server, may be an element. One or more elements may be in a process and/or thread of execution and an element may be localized on one computer and/or distributed between two or more computers and may be operated by various computer-readable media. The elements may also communicate by way of local and/or remote processes based on a signal having one or more data packets, e.g., from a data packet interacting with another element in a local system, distributed system, and/or across a network in the internet with other systems by way of the signal.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The embodiment of the present invention provides an authentication method for a voice device, which is applied to a voice device, where the voice device may be a device with a voice control function, for example, an automatic lifting clothes rod capable of being controlled by voice, an automatic opening and closing curtain, an air conditioner, a refrigerator, a microwave oven, a table lamp, and the like, and the present invention is not limited thereto.
The product corresponding to the authentication method of the voice device of the present invention may be a software package (e.g., SDK or APP) with a voice control function, which is not limited in the present invention. The voice equipment manufacturer executes the voice equipment authentication method by configuring the software package in the invention on the own voice equipment.
Specifically, as shown in fig. 1, the voice device authentication method of the present invention includes the following steps:
and S10, acquiring the first device fingerprint of the voice device.
Illustratively, device information of the voice device is acquired, wherein the device information comprises processor information, memory information and a physical address of a network component; and encoding the processor information, the memory information and the physical address of the network component to obtain the first device fingerprint.
Wherein the processor information comprises a processor signal and a processor serial number; the memory information includes a memory model number, a processor serial number, and a memory size.
Illustratively, encoding the processor information, memory information, and physical addresses of network components employs an MD5 encoding algorithm.
And S20, obtaining a pre-stored authorization code, and checking the authorization code to obtain a second device fingerprint, wherein the authorization code is obtained by encoding a third device fingerprint uploaded by the voice device in advance by the voice server.
Illustratively, the authorization code may be issued by the voice service provider to the voice device vendor. The voice service provider generates a corresponding authorization code according to the device fingerprint provided by the voice device manufacturer according to the requirements of the voice device manufacturer, and provides the authorization code to the voice device manufacturer. And then burning the acquired authorization code into a memory of the corresponding voice equipment by the voice equipment manufacturer.
Illustratively, the third device fingerprint is encoded in advance according to the processor information, the memory information, and a physical address of a network component, for obtaining the authorization code from the voice server.
Illustratively, the first device fingerprint and the third device fingerprint are both generated based on processor information, memory information, and a physical address of the network component of the voice device using the same encoding algorithm, except that the first device fingerprint is generated upon authentication and the third device fingerprint is generated upon acquisition of the authorization code.
Illustratively, the voice server encodes the third device fingerprint uploaded by the voice device in advance by using an RSA encryption algorithm.
S30, judging whether the first device fingerprint is matched with the second device fingerprint;
and S40, when the fingerprint of the first device is matched with the fingerprint of the second device, determining that the voice device passes the authentication.
The embodiment of the invention uses a software verification scheme, an authentication algorithm comprises a symmetrical part and an asymmetrical part, the symmetrical part realizes the confirmation of the fingerprint of the equipment, and the asymmetrical part realizes the verification of the authorization information. This enables two levels of verification: 1. asymmetric verification that can prove whether this authorization code is legitimate (i.e., whether it was issued by a legitimate voice service provider); 2. a symmetric check to verify that the authorization code was issued to a legitimate voice device.
Therefore, even in an off-line state, the one-to-one correspondence between the authorization and the actual voice equipment can be ensured by the authentication method of the invention, and the condition that a user can apply the same authorization to a plurality of equipment is avoided.
As shown in fig. 2, it is a schematic diagram of another embodiment of the voice device authentication method of the present invention, which specifically includes:
1) and the manufacturer acquires the equipment information. A manufacturer acquires equipment information from equipment to be installed and deployed with the SDK, wherein the equipment information comprises processor information (model, serial number and the like), memory information (model, size, serial number and the like), physical addresses of network components and the like of the equipment;
2) and generating the device fingerprint. Using a specific algorithm, a string of character strings is generated as a device fingerprint of the device based on the device information, such as by:
deviceFingerprint=MD5(cpu_sn+memry_sn+net_mac)
3) and submitting the device fingerprint. The manufacturer provides the device fingerprint for the voice service provider for authorization, and submits the device fingerprint to an authorization service application for authorization;
4) and the authorization service generates an authorization code. After receiving the device fingerprint provided by the manufacturer, the authorization service generates an authorization code based on the device fingerprint and the asymmetric encryption algorithm, and returns the authorization code to the manufacturer. If the following generation algorithm is adopted:
authCode=RSA_ENC(deviceFingerprint+random+timestamp,rivateKey)
5) the manufacturer burns the authorization code into the equipment;
6) the SDK installed on the equipment is authorized and checked, and when the SDK is checked, the SDK is divided into two links:
the first step is to check whether the authorization code is valid, by the following algorithm:
deviceFingerprintAndOther=RSA_DEC(authCode,publicKey)
the second step is to check whether the device fingerprint obtained after decryption is consistent with the actual device fingerprint:
isEqual=compare(MD5(cpu_sn+memry_sn+net_mac),eviceFingerprint)
the authorization is considered valid only if the checks of both links pass.
The embodiment of the invention uses a software checking scheme, and an authorization algorithm and an authentication algorithm simultaneously comprise symmetrical parts and asymmetrical parts. The symmetric part realizes the confirmation of the device fingerprint, and the asymmetric part realizes the verification of the authorization information.
It should be noted that for simplicity of explanation, the foregoing method embodiments are described as a series of acts or combination of acts, but those skilled in the art will appreciate that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention. In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
As shown in fig. 3, an embodiment of the present invention further provides a speech device authentication system 300, applied to a speech device, the system including:
an information obtaining module 310, configured to obtain a first device fingerprint of the voice device;
the first checking module 320 is configured to obtain a pre-stored authorization code, and check the authorization code to obtain a second device fingerprint, where the authorization code is obtained by encoding, by a voice server, a third device fingerprint uploaded by the voice device in advance;
a second check module 330, configured to determine whether the first device fingerprint matches the second device fingerprint;
an authentication module 340, configured to determine that the voice device passes authentication when the first device fingerprint matches the second device fingerprint.
In some embodiments, the obtaining the first device fingerprint of the speech device comprises:
acquiring equipment information of the voice equipment, wherein the equipment information comprises processor information, memory information and a physical address of a network component;
and encoding the processor information, the memory information and the physical address of the network component to obtain the first device fingerprint.
In some embodiments, the present invention provides a non-transitory computer-readable storage medium, in which one or more programs including executable instructions are stored, where the executable instructions can be read and executed by an electronic device (including but not limited to a computer, a server, or a network device, etc.) to perform any one of the above-mentioned voice device authentication methods of the present invention.
In some embodiments, the present invention further provides a computer program product comprising a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform any of the above-mentioned speech device authentication methods.
In some embodiments, an embodiment of the present invention further provides an electronic device, which includes: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of speech device authentication.
In some embodiments, the present invention further provides a storage medium having a computer program stored thereon, wherein the computer program is used for implementing the method for authenticating the voice device when being executed by the processor.
The voice device authentication system of the embodiment of the present invention can be used for executing the voice device authentication method of the embodiment of the present invention, and accordingly achieves the technical effect achieved by the voice device authentication method of the embodiment of the present invention, and is not described herein again. In the embodiment of the present invention, the relevant functional module may be implemented by a hardware processor (hardware processor).
Fig. 4 is a schematic diagram of a hardware structure of an electronic device for performing a voice device authentication method according to another embodiment of the present application, and as shown in fig. 4, the electronic device includes:
one or more processors 410 and a memory 420, with one processor 410 being an example in fig. 4.
The apparatus for performing the voice device authentication method may further include: an input device 430 and an output device 440.
The processor 410, the memory 420, the input device 430, and the output device 440 may be connected by a bus or other means, such as the bus connection in fig. 4.
The memory 420, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the voice device authentication method in the embodiments of the present application. The processor 410 executes various functional applications and data processing of the server by executing nonvolatile software programs, instructions and modules stored in the memory 420, so as to implement the voice device authentication method of the above-mentioned method embodiment.
The memory 420 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the voice device authentication apparatus, and the like. Further, the memory 420 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 420 may optionally include memory located remotely from the processor 410, which may be connected to the voice device authentication apparatus via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input means 430 may receive input numeric or character information and generate signals related to user settings and function control of the voice device authentication apparatus. The output device 440 may include a display device such as a display screen.
The one or more modules are stored in the memory 420 and, when executed by the one or more processors 410, perform the voice device authentication method of any of the method embodiments described above.
The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the methods provided in the embodiments of the present application.
The electronic device of the embodiments of the present application exists in various forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing highly reliable services.
(5) And other electronic devices with data interaction functions.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the above technical solutions substantially or contributing to the related art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A voice device authentication method is applied to a voice device, and comprises the following steps:
acquiring a first device fingerprint of the voice device;
obtaining a pre-stored authorization code, and checking the authorization code to obtain a second device fingerprint, wherein the authorization code is obtained by encoding a third device fingerprint uploaded by the voice device in advance by a voice server;
determining whether the first device fingerprint matches the second device fingerprint;
and when the first device fingerprint is matched with the second device fingerprint, determining that the voice device passes the authentication.
2. The method of claim 1, wherein the obtaining the first device fingerprint of the voice device comprises:
acquiring equipment information of the voice equipment, wherein the equipment information comprises processor information, memory information and a physical address of a network component;
and encoding the processor information, the memory information and the physical address of the network component to obtain the first device fingerprint.
3. The method of claim 2, wherein the third device fingerprint is pre-encoded with the processor information, memory information, and a physical address of a network component for obtaining the authorization code from the voice server.
4. The method of claim 2, wherein encoding the processor information, memory information, and physical addresses of network components employs an MD5 encoding algorithm.
5. The method of any of claims 1-4, wherein the voice server encodes a third device fingerprint previously uploaded by the voice device using an RSA encryption algorithm.
6. The method of claim 2, wherein the processor information comprises a processor signal and a processor serial number; the memory information includes a memory model number, a processor serial number, and a memory size.
7. A voice device authentication system applied to a voice device, the system comprising:
the information acquisition module is used for acquiring a first device fingerprint of the voice device;
the first verification module is used for acquiring a pre-stored authorization code and verifying the authorization code to obtain a second device fingerprint, wherein the authorization code is obtained by encoding a third device fingerprint uploaded by the voice device in advance by a voice server;
a second check module, configured to determine whether the first device fingerprint matches the second device fingerprint;
and the authentication module is used for determining that the voice equipment passes the authentication when the first equipment fingerprint is matched with the second equipment fingerprint.
8. The system of claim 1, wherein the obtaining the first device fingerprint of the voice device comprises:
acquiring equipment information of the voice equipment, wherein the equipment information comprises processor information, memory information and a physical address of a network component;
and encoding the processor information, the memory information and the physical address of the network component to obtain the first device fingerprint.
9. An electronic device, comprising: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the method of any one of claims 1-6.
10. A storage medium on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN201911347342.XA 2019-12-24 2019-12-24 Voice equipment authentication method and system Active CN111046367B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911347342.XA CN111046367B (en) 2019-12-24 2019-12-24 Voice equipment authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911347342.XA CN111046367B (en) 2019-12-24 2019-12-24 Voice equipment authentication method and system

Publications (2)

Publication Number Publication Date
CN111046367A true CN111046367A (en) 2020-04-21
CN111046367B CN111046367B (en) 2022-05-03

Family

ID=70238849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911347342.XA Active CN111046367B (en) 2019-12-24 2019-12-24 Voice equipment authentication method and system

Country Status (1)

Country Link
CN (1) CN111046367B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235255A (en) * 2020-09-23 2021-01-15 深圳市优必选科技股份有限公司 Voice data processing method and device and server
CN115470464A (en) * 2022-06-10 2022-12-13 慧之安信息技术股份有限公司 Authorization management system based on hardware fingerprint

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180255057A1 (en) * 2014-10-03 2018-09-06 Gopro, Inc. Authenticating a limited input device via an authenticated application
CN109190335A (en) * 2018-09-17 2019-01-11 北京市计算中心 A kind of software copyright protecting method and system
CN110162936A (en) * 2019-05-31 2019-08-23 北京比特安索信息技术有限公司 A kind of use authorization method of software content
CN110601854A (en) * 2019-09-19 2019-12-20 许继集团有限公司 Authorization client, power distribution terminal equipment and authorization method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180255057A1 (en) * 2014-10-03 2018-09-06 Gopro, Inc. Authenticating a limited input device via an authenticated application
CN109190335A (en) * 2018-09-17 2019-01-11 北京市计算中心 A kind of software copyright protecting method and system
CN110162936A (en) * 2019-05-31 2019-08-23 北京比特安索信息技术有限公司 A kind of use authorization method of software content
CN110601854A (en) * 2019-09-19 2019-12-20 许继集团有限公司 Authorization client, power distribution terminal equipment and authorization method thereof

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235255A (en) * 2020-09-23 2021-01-15 深圳市优必选科技股份有限公司 Voice data processing method and device and server
CN112235255B (en) * 2020-09-23 2023-03-14 深圳市优必选科技股份有限公司 Voice data processing method and device and server
CN115470464A (en) * 2022-06-10 2022-12-13 慧之安信息技术股份有限公司 Authorization management system based on hardware fingerprint

Also Published As

Publication number Publication date
CN111046367B (en) 2022-05-03

Similar Documents

Publication Publication Date Title
CN110351269B (en) Method for logging in open platform through third-party server
US10009355B2 (en) Bootstrapping user authentication on devices
US11509537B2 (en) Internet of things device discovery and deployment
CN105164633B (en) The configuration and verifying carried out by trusted provider
CN111125677A (en) Equipment authorization method and system
CN111046367B (en) Voice equipment authentication method and system
US20170208055A1 (en) Native authentication experience with failover
CN110198296B (en) Authentication method and device, storage medium and electronic device
CN111881441B (en) Method for online activation of device, electronic device and storage medium
US11681513B2 (en) Controlled scope of authentication key for software update
US9455972B1 (en) Provisioning a mobile device with a security application on the fly
US20200279044A1 (en) Verifying Updates Based on Update Behavior-Based Profiles
CN107182042B (en) Short message channel quality evaluation method, device, medium and system
CN110971617A (en) Voice equipment authorization method, authentication method and system
CN104050054B (en) Processing method for installation package installation failure and cause determining method and device
CN110784474B (en) Embedded product access authorization method and device
CN114691157A (en) Cloud-based FPGA management control system and method and electronic equipment
CN111026410A (en) Method and device for automatically deploying software of upper computer, electronic equipment and storage medium
CN109740306B (en) Method and device for authorizing application software based on mixed scheme
CN105549995A (en) Audio device upgrading method and apparatus
CN110022327B (en) Short message authentication test method and device
CN110601852B (en) Authentication and authorization method and system for electronic equipment of voice conversation platform
CN108228280A (en) The configuration method and device of browser parameters, storage medium, electronic equipment
KR20180090060A (en) Internet of Things Security Module
KR102071281B1 (en) Method for intergraged authentication thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 215123 building 14, Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Applicant after: Sipic Technology Co.,Ltd.

Address before: 215123 building 14, Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Applicant before: AI SPEECH Ltd.

GR01 Patent grant
GR01 Patent grant