TW202230175A - Authorization authentication, software development kit generation method, electronic equipment and computer-readable storage medium - Google Patents

Authorization authentication, software development kit generation method, electronic equipment and computer-readable storage medium Download PDF

Info

Publication number
TW202230175A
TW202230175A TW110141938A TW110141938A TW202230175A TW 202230175 A TW202230175 A TW 202230175A TW 110141938 A TW110141938 A TW 110141938A TW 110141938 A TW110141938 A TW 110141938A TW 202230175 A TW202230175 A TW 202230175A
Authority
TW
Taiwan
Prior art keywords
authentication
target
authentication result
tool
application
Prior art date
Application number
TW110141938A
Other languages
Chinese (zh)
Inventor
莊世杰
Original Assignee
大陸商深圳市商湯科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 大陸商深圳市商湯科技有限公司 filed Critical 大陸商深圳市商湯科技有限公司
Publication of TW202230175A publication Critical patent/TW202230175A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention relates to an authorization authentication, a software development kit generation method, an electronic equipment and a computer-readable storage medium, wherein the authorization authentication method comprises: in response to a target application's start instruction on the software development kit, obtaining the identification information of the target application; performing authorization authentication based on the identification information of the target application and the identification information of the authorized application to obtain the authentication result; the authentication result is sent to at least two target development tools in the software development kit, so that the at least two target development tools to start the calling function for the target application when the authentication result is passed. The technical scheme provided by the embodiment of the present disclosure can reduce the performance loss of authorization authentication and the authentication maintenance cost.

Description

授權認證、軟體開發套件生成方法、電子設備及電腦可讀儲存介質Authorization certification, software development kit generation method, electronic device and computer-readable storage medium

本發明關於資訊安全技術領域,尤其關於授權認證、軟體開發套件生成方法、電子設備及電腦可讀儲存介質。The present invention relates to the technical field of information security, in particular to authorization authentication, a software development kit generation method, an electronic device and a computer-readable storage medium.

軟體開發套件(Software Development Kit,SDK)一般會提供給客戶開發使用,但是SDK的一些開發工具容易被盜用。相關技術中,SDK中的開發工具在被調用前,往往會先進行安全認證,以防止SDK被破解使用,但一個SDK中往往包括多個開發工具,導致需要進行多次安全認證,不僅會造成性能損耗,後期修改認證方式時,也需要一一修改,維護成本高。A software development kit (Software Development Kit, SDK) is generally provided to customers for development and use, but some development tools of the SDK are easily stolen. In related technologies, before the development tools in the SDK are called, security authentication is often performed to prevent the SDK from being cracked and used. However, an SDK often includes multiple development tools, which requires multiple security authentications. Performance loss, when modifying the authentication method later, it also needs to be modified one by one, and the maintenance cost is high.

本發明提供一種授權認證、軟體開發套件生成方法、電子設備及電腦可讀儲存介質。本發明的技術方案如下: 根據本發明實施例的一方面,提供一種授權認證方法,所述方法應用於軟體開發套件對應的目標認證工具,所述目標認證工具配置有授權應用的標識資訊,所述方法包括: 回應於目標應用對軟體開發套件的啟動指令,獲取所述目標應用的標識資訊;基於所述目標應用的標識資訊和所述授權應用的標識資訊進行授權認證,得到認證結果;向所述軟體開發套件中的至少兩個目標開發工具發送所述認證結果,以使所述至少兩個目標開發工具在所述認證結果為認證通過的情況下,針對所述目標應用啟動調用功能。 The invention provides an authorization authentication, a method for generating a software development kit, an electronic device and a computer-readable storage medium. The technical scheme of the present invention is as follows: According to an aspect of the embodiments of the present invention, an authorization authentication method is provided. The method is applied to a target authentication tool corresponding to a software development kit, and the target authentication tool is configured with identification information of an authorized application, and the method includes: In response to the target application's start instruction to the software development kit, obtain the identification information of the target application; perform authorization and authentication based on the identification information of the target application and the identification information of the authorized application to obtain an authentication result; develop the software to the software The at least two target development tools in the kit send the authentication result, so that the at least two target development tools start calling functions for the target application when the authentication result is that the authentication is passed.

上述實施例在軟體開發套件使用過程中,通過軟體開發套件對應的目標認證工具的一次授權認證,就可以實現對多個目標開發工具統一的授權認證,大大降低授權認證的性能損耗,且後續修改認證方式,也可以直接對目標認證工具進行修改,有效降低了認證維護成本。In the above-mentioned embodiment, during the use of the software development kit, the unified authorization and authentication of multiple target development tools can be realized through one authorization and authentication of the target authentication tool corresponding to the software development kit, which greatly reduces the performance loss of authorization and authentication, and the subsequent modification The authentication method can also be directly modified to the target authentication tool, which effectively reduces the authentication maintenance cost.

根據本發明實施例的另一方面,提供一種授權認證方法,所述方法應用於軟體開發套件中的至少兩個目標開發工具,所述方法包括: 接收目標認證工具發送的認證結果,所述認證結果為所述目標認證工具回應於目標應用對軟體開發套件的啟動指令,基於所述目標應用的標識資訊和所述目標認證工具配置有的授權應用的標識資訊進行授權認證得到的;在所述認證結果為認證通過的情況下,針對所述目標應用啟動調用功能。 According to another aspect of the embodiments of the present invention, an authorization authentication method is provided, the method is applied to at least two target development tools in a software development kit, and the method includes: Receive an authentication result sent by the target authentication tool, where the authentication result is that the target authentication tool responds to the target application's start-up instruction to the software development kit, based on the identification information of the target application and the authorized application configured with the target authentication tool The identification information is obtained through authorization and authentication; if the authentication result is that the authentication is passed, the calling function is activated for the target application.

上述實施例在軟體開發套件使用過程中,通過軟體開發套件對應的目標認證工具的一次授權認證,就可以實現對多個目標開發工具統一的授權認證,大大降低授權認證的性能損耗,且後續修改認證方式,也可以直接對目標認證工具進行修改,有效降低了認證維護成本。In the above-mentioned embodiment, during the use of the software development kit, the unified authorization and authentication of multiple target development tools can be realized through one authorization and authentication of the target authentication tool corresponding to the software development kit, which greatly reduces the performance loss of authorization and authentication, and the subsequent modification The authentication method can also be directly modified to the target authentication tool, which effectively reduces the authentication maintenance cost.

根據本發明實施例的另一方面,提供一種軟體開發套件生成方法,包括:接收套件申請指令,所述套件申請指令包括授權應用的標識資訊;獲取與所述套件申請指令對應的至少兩個目標開發工具和初始認證工具;將所述授權應用的標識資訊配置至所述初始認證工具,得到目標認證工具,所述目標認證工具用於對所述至少兩個目標開發套件進行統一授權認證;基於所述至少兩個目標開發工具生成軟體開發套件,或基於所述至少兩個目標開發工具和所述目標認證工具生成所述軟體開發套件。According to another aspect of the embodiments of the present invention, a method for generating a software development kit is provided, including: receiving a kit application instruction, where the kit application instruction includes identification information of an authorized application; acquiring at least two targets corresponding to the kit application instruction a development tool and an initial authentication tool; configure the identification information of the authorized application to the initial authentication tool to obtain a target authentication tool, and the target authentication tool is used to perform unified authorization and authentication on the at least two target development kits; based on The at least two target development tools generate a software development kit, or the software development kit is generated based on the at least two target development tools and the target authentication tool.

上述實施例中,在目標軟體發展工具的申請過程中,生成了可以用於對軟體開發套件括中目標開發工具進行統一的授權認證的目標認證工具,進而可以在後續軟體開發套件使用過程中,可以實現對多個目標開發工具統一的授權認證,大大降低授權認證性能損耗,且將目標認證工具和至少兩個目標開發工具一起打包生成軟體開發套件,可以提升後續認證結果的傳送速率;且後續修改認證方式,也可以直接對目標認證工具進行修改,有效降低了認證維護成本。In the above-mentioned embodiment, in the application process of the target software development tool, a target authentication tool that can be used for unified authorization and authentication of the target development tool included in the software development kit is generated, and then in the subsequent use of the software development kit, It can realize unified authorization and authentication for multiple target development tools, greatly reduce the loss of authorization and authentication performance, and package the target authentication tool and at least two target development tools together to generate a software development kit, which can improve the transmission rate of subsequent authentication results; and Modifying the authentication method can also directly modify the target authentication tool, which effectively reduces the cost of authentication maintenance.

根據本發明實施例的另一方面,提供一種授權認證裝置,所述裝置設置於軟體開發套件對應的目標認證工具,所述目標認證工具配置有授權應用的標識資訊,所述裝置包括: 標識資訊獲取部分,配置為回應於目標應用對軟體開發套件的啟動指令,獲取所述目標應用的標識資訊; 授權認證部分,配置為基於所述目標應用的標識資訊和所述授權應用的標識資訊進行授權認證,得到認證結果; 認證結果發送部分,配置為向所述軟體開發套件中的至少兩個目標開發工具發送所述認證結果,以使所述至少兩個目標開發工具在所述認證結果為認證通過的情況下,針對所述目標應用啟動調用功能。 According to another aspect of the embodiments of the present invention, an authorization authentication device is provided, the device is set in a target authentication tool corresponding to a software development kit, the target authentication tool is configured with identification information of an authorized application, and the device includes: The identification information acquisition part is configured to acquire the identification information of the target application in response to the start instruction of the target application to the software development kit; The authorization authentication part is configured to perform authorization authentication based on the identification information of the target application and the identification information of the authorized application to obtain an authentication result; The authentication result sending part is configured to send the authentication result to at least two target development tools in the software development kit, so that the at least two target development tools can target the at least two target development tools when the authentication result is passed. The target application starts the calling function.

根據本發明實施例的另一方面,提供一種授權認證裝置,所述裝置設置於軟體開發套件中的至少兩個目標開發工具,所述裝置包括: 認證結果接收部分,配置為接收目標認證工具發送的認證結果,所述認證結果為所述目標認證工具回應於目標應用對軟體開發套件的啟動指令,基於所述目標應用的標識資訊和所述目標認證工具配置有的授權應用的標識資訊進行授權認證得到的; 調用功能啟動部分,配置為在所述認證結果為認證通過的情況下,針對所述目標應用啟動調用功能。 According to another aspect of the embodiments of the present invention, an authorization authentication apparatus is provided, the apparatus is provided with at least two target development tools in a software development kit, and the apparatus includes: The authentication result receiving part is configured to receive the authentication result sent by the target authentication tool, where the authentication result is that the target authentication tool responds to the start instruction of the software development kit by the target application, based on the identification information of the target application and the target application The authentication tool is configured with the identification information of the authorized application for authorization and authentication; The calling function starting part is configured to start the calling function for the target application when the authentication result is that the authentication is passed.

根據本發明實施例的另一方面,提供一種軟體開發套件生成裝置,包括: 套件申請指令接收部分,配置為接收套件申請指令,所述套件申請指令包括授權應用的標識資訊; 工具獲取部分,配置為獲取與所述套件申請指令對應的至少兩個目標開發工具和初始認證工具; 第一工具配置部分,配置為將所述授權應用的標識資訊配置至所述初始認證工具,得到目標認證工具,所述目標認證工具配置為對所述至少兩個目標開發套件進行統一授權認證; 軟體開發套件生成部分,配置為基於所述至少兩個目標開發工具生成軟體開發套件,或配置為基於所述至少兩個目標開發工具和所述目標認證工具生成所述軟體開發套件。 According to another aspect of the embodiments of the present invention, an apparatus for generating a software development kit is provided, including: The kit application instruction receiving part is configured to receive a kit application instruction, where the kit application instruction includes identification information of the authorized application; a tool acquisition part, configured to acquire at least two target development tools and initial certification tools corresponding to the kit application instruction; a first tool configuration part, configured to configure the identification information of the authorized application to the initial authentication tool to obtain a target authentication tool, and the target authentication tool is configured to perform unified authorization authentication on the at least two target development kits; The software development kit generating part is configured to generate a software development kit based on the at least two target development tools, or is configured to generate the software development kit based on the at least two target development tools and the target authentication tool.

根據本發明實施例的另一方面,提供一種電子設備,包括:處理器;用於儲存所述處理器可執行指令的記憶體;其中,所述處理器被配置為執行所述指令,以實現如上述任一項所述的軟體開發套件生成方法或授權認證方法。According to another aspect of the embodiments of the present invention, an electronic device is provided, including: a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to execute the instructions to achieve The software development kit generation method or the authorization authentication method according to any one of the above.

根據本發明實施例的另一方面,提供一種電腦可讀儲存介質,當所述儲存介質中的指令由電子設備的處理器執行時,使得所述電子設備能夠執行本發明實施例的上述任一項所述的軟體開發套件生成方法或授權認證方法。According to another aspect of the embodiments of the present invention, a computer-readable storage medium is provided, when instructions in the storage medium are executed by a processor of an electronic device, the electronic device can execute any of the foregoing embodiments of the present invention The software development kit generation method or the authorization authentication method described in the item.

根據本發明實施例的另一方面,提供一種電腦程式,包括電腦可讀代碼,在所述電腦可讀代碼在電子設備中運行,被所述電子設備中的處理器執行的情況下,實現實現如上述任一項所述的軟體開發套件生成方法或授權認證方法。According to another aspect of the embodiments of the present invention, there is provided a computer program, including computer-readable codes, which, when the computer-readable codes are executed in an electronic device and executed by a processor in the electronic device, realize the realization of The software development kit generation method or the authorization authentication method according to any one of the above.

根據本發明實施例的另一方面,提供一種包含指令的電腦程式產品,當其在電腦上運行時,使得電腦執行本發明實施例的上述任一項所述的方法。According to another aspect of the embodiments of the present invention, there is provided a computer program product comprising instructions which, when executed on a computer, cause the computer to execute the method described in any one of the above embodiments of the present invention.

應當理解的是,以上的一般描述和後文的細節描述僅是示例性和解釋性的,並不能限制本發明。It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention.

為了使本領域普通人員更好地理解本發明的技術方案,下面將結合附圖,對本發明實施例中的技術方案進行清楚、完整地描述。In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings.

需要說明的是,本發明的說明書和申請專利範圍及上述附圖中的術語“第一”、“第二”等是用於區別類似的物件,而不必用於描述特定的順序或先後次序。應該理解這樣使用的資料在適當情況下可以互換,以便這裡描述的本發明的實施例能夠以除了在這裡圖示或 描述的那些以外的順序實施。以下示例性實施例中所描述的實施方式並不代表與本發明相一致的所有實施方式。相反,它們僅是與如所附申請專利範圍中所詳述的、本發明的一些方面相一致的裝置和方法的例子。It should be noted that the terms "first", "second", etc. in the description of the present invention and the scope of the patent application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the materials so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than those illustrated or described herein. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with some aspects of the invention as detailed in the appended claims.

目前,SDK一般會提供給客戶開發使用,但是由於SDK的一些模組代碼容易被盜用、SDK的so庫容易被解壓提取後使用,因此在相關技術中SDK會做簽名校驗等安全認證方法,以防止SDK被破解使用。然而,在SDK有多個模組的情況下,一方面可能要進行多次安全認證,另一方面各模組可能需要獨立校驗、添加或修改校驗方式,不僅會造成性能損耗,而且多個後期修改校驗方式維護成本大,難以實現SDK的有效維護。At present, the SDK is generally provided to customers for development and use. However, because some module codes of the SDK are easy to be stolen, and the so library of the SDK is easy to be decompressed and extracted for use, the SDK will perform security authentication methods such as signature verification in related technologies. In order to prevent the SDK from being cracked and used. However, when the SDK has multiple modules, on the one hand, multiple security certifications may be required, and on the other hand, each module may need to independently verify, add or modify the verification method, which will not only cause performance loss, but also The maintenance cost of modifying the verification method in the later stage is high, and it is difficult to achieve effective maintenance of the SDK.

鑒於此,本發明實施例提出了一種授權認證、軟體開發套件生成方法、裝置及電子設備,其中,該授權認證方法包括:回應於目標應用對軟體開發套件的啟動指令,獲取目標應用的標識資訊;基於目標應用的標識資訊和授權應用的標識資訊進行授權認證,得到認證結果;向軟體開發套件中的至少兩個目標開發工具發送認證結果,以使至少兩個目標開發工具在認證結果為認證通過的情況下,針對目標應用啟動調用功能。利用本發明實施例提供的技術方案可以降低授權認證的性能損耗和認證維護成本。In view of this, an embodiment of the present invention provides an authorization authentication, a software development kit generating method, apparatus, and electronic device, wherein the authorization authentication method includes: in response to a target application's start instruction for the software development kit, obtaining identification information of the target application ; Perform authorization authentication based on the identification information of the target application and the identification information of the authorized application, and obtain the authentication result; send the authentication result to at least two target development tools in the software development kit, so that the at least two target development tools are authenticated in the authentication result If passed, start the calling function for the target application. By using the technical solutions provided by the embodiments of the present invention, the performance loss of authorization and authentication and the cost of authentication maintenance can be reduced.

請參閱圖1,圖1是根據本發明實施例示出的一種軟體開發套件生成方法的應用環境示意圖,如圖1所示,該應用環境可以包括終端01和伺服器02。Please refer to FIG. 1 , which is a schematic diagram of an application environment of a method for generating a software development kit according to an embodiment of the present invention. As shown in FIG. 1 , the application environment may include a terminal 01 and a server 02 .

在本發明實施例的一實施方式中,終端01可以面向使用者提供軟體開發套件申請、下載等服務。其中,終端02可以包括智慧手機、臺式電腦、平板電腦、筆記型電腦、智慧音箱、數位助理、擴增實境(augmented reality,AR)/虛擬實境(virtual reality,VR)設備、車載終端、智慧可穿戴設備等類型的實體設備。也可以包括運行與上述實體設備的軟體,例如應用程式等。其中,實體設備上運行的作業系統可以包括但不限於安卓系統、蘋果公司開發的移動作業系統(Input Output System,IOS)系統、linux、windows等。In an implementation manner of the embodiment of the present invention, the terminal 01 may provide services such as software development kit application and download for the user. Wherein, the terminal 02 may include a smart phone, a desktop computer, a tablet computer, a notebook computer, a smart speaker, a digital assistant, an augmented reality (AR)/virtual reality (VR) device, a vehicle terminal , smart wearable devices and other types of physical devices. It may also include software, such as applications, that run on the above-mentioned physical devices. The operating system running on the physical device may include, but is not limited to, an Android system, a mobile operating system (Input Output System, IOS) system developed by Apple, linux, windows, and the like.

在本發明實施例的一實施方式中,伺服器02可以為終端01的後臺服務,可以用於生成軟體發展工具。其中,伺服器02可以是獨立的物理伺服器,也可以是多個物理伺服器構成的伺服器集群或者分散式系統,還可以是提供雲服務、雲資料庫、雲計算、雲函數、雲儲存、網路服務、雲通信、中介軟體服務、功能變數名稱服務、安全服務、CDN(Content Delivery Network,內容分發網路)、以及大資料和人工智慧平臺等基礎雲計算服務的雲伺服器。In one implementation of the embodiment of the present invention, the server 02 may be a background service of the terminal 01, and may be used to generate a software development tool. The server 02 may be an independent physical server, a server cluster or a distributed system composed of multiple physical servers, or a cloud service, cloud database, cloud computing, cloud function, and cloud storage. , network service, cloud communication, middleware service, function variable name service, security service, CDN (Content Delivery Network), and cloud server for basic cloud computing services such as big data and artificial intelligence platforms.

本說明書實施例中,上述終端01以及伺服器02可以通過有線或無線通訊方式進行直接或間接地連接,本發明在此不做限制。In the embodiment of the present specification, the above-mentioned terminal 01 and the server 02 may be directly or indirectly connected through wired or wireless communication, which is not limited in the present invention.

可以理解的是,軟體開發套件生成方法的執行主體包括終端01和伺服器02、授權認證方法的執行主體可以是伺服器02。It can be understood that the execution body of the software development kit generation method includes the terminal 01 and the server 02 , and the execution body of the authorization authentication method may be the server 02 .

以下介紹本發明一種軟體開發套件生成方法的實施例,圖2a和圖2b是根據一示例性實施例示出的一種軟體開發套件生成方法的流程圖,本說明書提供了如實施例或流程圖的方法操作步驟,但基於常規或者無創造性的勞動可以包括更多或者更少的操作步驟。實施例中列舉的步驟順序僅僅為眾多步驟執行順序中的一種方式,不代表唯一的執行順序。在實際中的系統或設備產品執行時,可以按照實施例或者附圖所示的方法循序執行或者並存執行(例如並行處理器或者多執行緒處理的環境)。如圖2a所示,可以包括以下步驟。The following describes an embodiment of a method for generating a software development kit according to the present invention. FIG. 2a and FIG. 2b are flowcharts of a method for generating a software development kit according to an exemplary embodiment. This specification provides a method such as an embodiment or a flowchart. operational steps, but may include more or fewer operational steps based on routine or non-creative work. The sequence of steps enumerated in the embodiments is only one of the execution sequences of many steps, and does not represent the only execution sequence. When an actual system or device product is executed, it can be executed sequentially or concurrently (for example, in a parallel processor or a multi-threaded processing environment) according to the embodiments or the methods shown in the accompanying drawings. As shown in Figure 2a, the following steps may be included.

S201:接收套件申請指令。S201: Receive a kit application instruction.

在實際應用中,軟體開發套件提供方可以提供面向使用者的終端,使用者可以在該終端觸發套件申請指令,其中,使用者在該終端可以結合應用程式開發需求,在套件申請指令中配置授權應用的標識資訊。其中,授權應用可以為需要結合申請的軟體開發套件進行開發的應用。這裡,授權應用的標識資訊可以為授權應用的包名;其中,為了提高傳輸的安全性,授權應用的標識資訊還可以包括基於授權應用的包名生成的簽名資訊。In practical applications, the software development kit provider can provide a user-oriented terminal, and the user can trigger the kit application instruction on the terminal, wherein the user can configure the authorization in the kit application instruction based on the application development requirements on the terminal. Identification information for the application. The authorized application may be an application that needs to be developed in combination with the applied software development kit. Here, the identification information of the authorized application may be the package name of the authorized application; wherein, in order to improve transmission security, the identification information of the authorized application may also include signature information generated based on the package name of the authorized application.

在本發明實施例的一實施方式中,可以結合密碼散列函數對授權應用的包名進行簽名,其中,密碼散列函數可以包括但不限於SHA-1、md5等。In one implementation of the embodiments of the present invention, the package name of the authorized application may be signed in combination with a cryptographic hash function, where the cryptographic hash function may include but not limited to SHA-1, md5, and the like.

S203:獲取與套件申請指令對應的至少兩個目標開發工具和初始認證工具。S203: Obtain at least two target development tools and initial certification tools corresponding to the kit application instruction.

在一些實施例中,軟體開發套件提供方的伺服器側可以預先設置有大量開發工具和初始認證工具。在另一些實施例中,也可以在接收到套件申請指令之後,創建上述初始認證工具和至少兩個目標開發工具。In some embodiments, the server side of the software development kit provider may be pre-configured with a large number of development tools and initial authentication tools. In other embodiments, the above-mentioned initial authentication tool and at least two target development tools may also be created after the kit application instruction is received.

在本發明實施例的一實施方式中,至少兩個目標開發工具可以為開發授權應用所需的開發工具。初始認證工具可以為具有認證功能的工具。In an implementation manner of the embodiment of the present invention, the at least two target development tools may be development tools required for developing authorized applications. The initial authentication tool may be a tool with an authentication function.

在本發明實施例的一實施方式中,使用者可以在終端配置開發授權應用所需的開發工具的標識資訊;相應的,上述套件申請指令中還可以包括開發授權應用所需的開發工具的標識資訊,以便伺服器可以結合套件申請指令中開發授權應用所需的開發工具的標識資訊從大量預設的開發工具中獲取開發授權應用所需的上述至少兩個目標開發工具。In an implementation of the embodiment of the present invention, the user can configure the identification information of the development tool required for developing the authorized application on the terminal; correspondingly, the above-mentioned kit application instruction may also include the identification of the development tool required for developing the authorized application. information, so that the server can obtain the above-mentioned at least two target development tools required for developing the authorized application from a large number of preset development tools in combination with the identification information of the development tool required for developing the authorized application in the package application instruction.

S205:將授權應用的標識資訊配置至初始認證工具,得到目標認證工具。S205: Configure the identification information of the authorized application to the initial authentication tool to obtain the target authentication tool.

在本發明實施例的一實施方式中,可以通過將授權應用的標識資訊編譯至初始認證工具,以實現將授權應用的標識資訊配置至初始認證工具,得到目標認證工具。其中,配置有授權應用的標識資訊的目標認證工具可以用於對授權應用所需的開發工具(上述至少兩個目標開發套件)進行統一授權認證。In one implementation of the embodiment of the present invention, the identification information of the authorized application can be configured to the initial authentication tool by compiling the identification information of the authorized application into the initial authentication tool to obtain the target authentication tool. The target authentication tool configured with the identification information of the authorized application can be used to perform unified authorization authentication on the development tools (at least two target development kits) required for the authorized application.

S207:基於至少兩個目標開發工具生成軟體開發套件。S207: Generate a software development kit based on at least two target development tools.

在本發明實施例的一實施方式中,可以將上述至少兩個目標開發工具進行打包,得到軟體開發套件。In an implementation manner of the embodiment of the present invention, the above-mentioned at least two target development tools may be packaged to obtain a software development kit.

示例性的,在本發明實施例中,圖2b為根據本發明實施例示出的一種用於軟體開發套件生成的電子設備的方塊圖,如圖2b所示,用於軟體開發套件生成的電子設備可以包括應用11、SDK12、安全模組13、模組A 14、模組B15、應用模組A16以及應用模組B17,其中,SDK相當於軟體開發套件;應用為使用SDK的應用,相當於授權應用; SDK中配置的安全模組相當於目標認證工具,SDK中的模組A、模組B或者應用中的應用模組A以及應用模組B相當於至少兩個目標開發工具。Exemplarily, in an embodiment of the present invention, FIG. 2b is a block diagram of an electronic device for generating a software development kit according to an embodiment of the present invention. As shown in FIG. 2b, an electronic device for generating a software development kit is shown in FIG. 2b. It can include application 11, SDK12, security module 13, module A 14, module B15, application module A16 and application module B17, where the SDK is equivalent to a software development kit; the application is an application using the SDK, which is equivalent to authorization Application; The security module configured in the SDK is equivalent to the target authentication tool, and module A and module B in the SDK or application module A and application module B in the application are equivalent to at least two target development tools.

由以上本說明書實施例提供的技術方案可見,本說明書在目標軟體發展工具的申請過程中,除了生成包括至少兩個目標開發工具的軟體開發套件,還生成了可以用於對軟體開發套件括中目標開發工具進行統一的授權認證的目標認證工具,進而可以在後續軟體開發套件使用過程中,可以實現對多個目標開發工具統一的授權認證,大大降低授權認證性能損耗,且後續修改認證方式時,也可以直接對目標認證工具進行修改,有效降低了認證維護成本。It can be seen from the technical solutions provided by the above embodiments of this specification that, in the application process of the target software development tool, in addition to generating a software development kit including at least two target development tools, a software development kit that can be used to include the software development kit is also generated. The target development tool is a target authentication tool for unified authorization and authentication, so that in the subsequent use of the software development kit, unified authorization and authentication of multiple target development tools can be realized, which greatly reduces the loss of authorization and authentication performance, and when the authentication method is subsequently modified. , the target authentication tool can also be modified directly, which effectively reduces the cost of authentication maintenance.

在本發明實施例的一實施方式中,為了提高後續授權認證過程中認證結果傳輸的安全性,如圖3所示,上述方法還可以包括以下步驟。In an implementation of the embodiment of the present invention, in order to improve the security of the authentication result transmission in the subsequent authorization and authentication process, as shown in FIG. 3 , the above method may further include the following steps.

S209:生成預設金鑰對。S209: Generate a preset key pair.

在本發明實施例的一實施方式中,上述預設金鑰對可以包括預設加密金鑰和預設解密金鑰。In an implementation manner of the embodiment of the present invention, the above-mentioned preset key pair may include a preset encryption key and a preset decryption key.

在一些實施例中,生成預設金鑰對可以結合對稱加密演算法,相應的,預設加密金鑰與預設解密金鑰相同。In some embodiments, the generation of the preset key pair may be combined with a symmetric encryption algorithm. Correspondingly, the preset encryption key is the same as the preset decryption key.

在另一些實施例中,生成預設金鑰對也可以結合非對稱加密演算法,相應的,預設加密金鑰可以為預設私密金鑰,預設解密金鑰可以為預設公開金鑰。In other embodiments, the generation of the preset key pair may also be combined with an asymmetric encryption algorithm. Correspondingly, the preset encryption key may be a preset private key, and the preset decryption key may be a preset public key .

上述實施例中,採用非對稱加密演算法來生成用來加密和解密的預設金鑰對,可以避免需要用預設加密金鑰進行加密的工具和需要用預設解密金鑰進行解密的工具之間相互洩露金鑰的問題,提高資料的安全性。In the above embodiment, the asymmetric encryption algorithm is used to generate the preset key pair for encryption and decryption, which can avoid tools that need to be encrypted with a preset encryption key and tools that need to be decrypted with a preset decryption key. The problem of mutual disclosure of keys between them improves the security of data.

S211:將預設加密金鑰配置至目標認證工具,以更新目標認證工具。S211: Configure the preset encryption key to the target authentication tool to update the target authentication tool.

在本發明實施例的一實施方式中,可以通過將預設加密金鑰編譯至目標認證工具的方式,實現將預設加密金鑰配置至目標認證工具。相應的,後續目標認證工具可以結合預設加密金鑰對基於授權應用的標識資訊確定的認證結果進行加密,以保證認證結果傳輸的安全性。In an implementation of the embodiment of the present invention, the preset encryption key can be configured to the target authentication tool by compiling the preset encryption key into the target authentication tool. Correspondingly, the subsequent target authentication tool can encrypt the authentication result determined based on the identification information of the authorized application in combination with the preset encryption key, so as to ensure the security of the transmission of the authentication result.

S213:將預設解密金鑰配置至至少兩個目標開發工具,以更新至少兩個目標開發工具。S213: Configure the preset decryption key to at least two target development tools to update at least two target development tools.

在一本發明實施例的一實施方式中,可以通過將預設解密金鑰編譯至上述至少兩個目標開發工具的方式,實現將預設解密金鑰配置至上述至少兩個目標開發工具。相應的,後續目標開發工具可以結合預設解密金鑰對目標認證工具加密後的認證結果進行解密,得到認證結果。In an implementation manner of an embodiment of the present invention, the preset decryption key can be configured to the at least two target development tools by compiling the preset decryption key into the at least two target development tools. Correspondingly, the subsequent target development tool can decrypt the authentication result encrypted by the target authentication tool in combination with the preset decryption key to obtain the authentication result.

上述實施例中,通過在目標認證工具中配置預設加密金鑰和在目標開發工具中配置對應的預設解密金鑰,可以大大提高後續認證結果傳輸的安全性。In the above embodiment, by configuring the preset encryption key in the target authentication tool and configuring the corresponding preset decryption key in the target development tool, the security of subsequent authentication result transmission can be greatly improved.

以下介紹本發明另一種授權認證方法的實施例,圖4是根據本發明實施例示出的另一種軟體開發套件生成方法的流程圖,具體包括: S401:接收套件申請指令,套件申請指令包括授權應用的標識資訊; S403:獲取與套件申請指令對應的至少兩個目標開發工具和初始認證工具; S405:將授權應用的標識資訊配置至初始認證工具,得到目標認證工具; 上述步驟S401-S405的具體細化可以參見上述步驟S201-205的具體細化,在此不再贅述。 S407:基於至少兩個目標開發工具和目標認證工具生成軟體開發套件。 The following describes an embodiment of another authorization and authentication method of the present invention. FIG. 4 is a flowchart of another software development kit generation method according to an embodiment of the present invention, which specifically includes: S401: Receive a kit application instruction, where the kit application instruction includes identification information of the authorized application; S403: Obtain at least two target development tools and initial certification tools corresponding to the kit application instruction; S405: configure the identification information of the authorized application to the initial authentication tool to obtain the target authentication tool; For the specific refinement of the foregoing steps S401-S405, reference may be made to the specific refinement of the foregoing steps S201-205, which will not be repeated here. S407: Generate a software development kit based on at least two target development tools and target authentication tools.

在本發明實施例的一實施方式中,可以將上述至少兩個目標開發工具和目標認證工具進行打包,生成軟體開發套件。In an implementation manner of the embodiment of the present invention, the above-mentioned at least two target development tools and target authentication tools may be packaged to generate a software development kit.

由以上本說明書實施例提供的技術方案可見,本說明書在目標軟體發展工具的申請過程中,生成了可以用於對軟體開發套件括中目標開發工具進行統一的授權認證的目標認證工具,進而可以在後續軟體開發套件使用過程中,可以實現對多個目標開發工具統一的授權認證,大大降低授權認證性能損耗,且將目標認證工具和至少兩個目標開發工具一起打包生成軟體開發套件,可以提升後續認證結果的傳送速率;且後續修改認證方式,也可以直接對目標認證工具進行修改,有效降低了認證維護成本。It can be seen from the technical solutions provided by the above embodiments of this specification that, in the application process of the target software development tool, this specification generates a target authentication tool that can be used to uniformly authorize and authenticate the target development tools included in the software development kit, and further can In the subsequent use of the software development kit, the unified authorization and authentication of multiple target development tools can be realized, which greatly reduces the performance loss of authorization and authentication, and the target authentication tool and at least two target development tools are packaged together to generate a software development kit, which can improve the performance of the software development kit. The transmission rate of subsequent authentication results; and the subsequent modification of the authentication method can also directly modify the target authentication tool, which effectively reduces the cost of authentication maintenance.

在一本發明實施例的一實施方式中,為了提高後續授權認證過程中認證結果傳輸的安全性,如圖5所示,上述方法還可以包括: S409:生成預設金鑰對,預設金鑰對包括預設加密金鑰和預設解密金鑰; S411:將預設加密金鑰配置至目標認證工具,以更新目標認證工具; S413:將預設解密金鑰配置至至少兩個目標開發工具,以更新至少兩個目標開發工具。 In an implementation of an embodiment of the present invention, in order to improve the security of the authentication result transmission in the subsequent authorization and authentication process, as shown in FIG. 5 , the above method may further include: S409: Generate a preset key pair, where the preset key pair includes a preset encryption key and a preset decryption key; S411: Configure the preset encryption key to the target authentication tool to update the target authentication tool; S413: Configure the preset decryption key to at least two target development tools to update at least two target development tools.

上述步驟S409-S413的具體細化可以參見上述步驟S209-S213的具體細化,在此不再贅述。For the specific refinement of the foregoing steps S409-S413, reference may be made to the specific refinement of the foregoing steps S209-S213, which will not be repeated here.

在一些實施例中,上述方法還可以包括:確定預設認證時效資訊;將預設認證時效資訊配置至目標認證工具,以更新目標認證工具。In some embodiments, the above method may further include: determining preset authentication validity information; and configuring the preset authentication validity information to the target authentication tool to update the target authentication tool.

在本發明實施例的一實施方式中,預設認證時效資訊可以為預先設置的認證結果的有效時長,即生成認證結果之後的有效時長內,該認證結果為有效的。In an implementation of the embodiment of the present invention, the preset authentication time limit information may be a preset valid time period of the authentication result, that is, within the valid time period after the authentication result is generated, the authentication result is valid.

上述實施例中,通過在目標認證工具中配置預設證時效資訊,可以保證有效時長內的認證結果才有效,進而更好的保證認證結果的安全性。In the above-mentioned embodiment, by configuring the preset certificate aging information in the target authentication tool, it can be ensured that the authentication result within the valid period is valid, thereby better ensuring the security of the authentication result.

在一些實施例中,上述方法還可以包括:將授權應用的標識資訊配置至至少兩個目標開發工具,以更新至少兩個目標開發工具。In some embodiments, the above method may further include: configuring the identification information of the authorized application to the at least two target development tools to update the at least two target development tools.

在實際應用中,為了避免後續目標開發工具被調用過程中,有人惡意類比目標認證工具來向目標開發工具發送認證通過的認證結果,可以預先在目標開發工具中配置有授權應用的標識資訊,以便後續目標開發工具可以在得到認證結果的同時,自身也可以結合授權應用的標識資訊進行授權認證,進而提升認證結果的可靠性。In practical applications, in order to prevent the subsequent target development tool from being called, someone maliciously compares the target authentication tool to send the authentication result that has passed the authentication to the target development tool. While obtaining the authentication result, the target development tool can also perform authorization authentication in combination with the identification information of the authorized application, thereby improving the reliability of the authentication result.

在一些實施例中,上述方法還可以包括:向套件申請指令對應的請求方反射軟體開發套件。In some embodiments, the above method may further include: applying for a requester reflection software development kit corresponding to the instruction to the kit.

上述實施例中,將軟體開發套件發送給相應的請求方,以便請求方可以結合軟體開發套件進行授權應用的開發。In the above embodiment, the software development kit is sent to the corresponding requester, so that the requester can develop the authorized application in combination with the software development kit.

基於上述軟體開發套件生成方法,以下介紹本發明一種授權認證方法的實施例,圖6是根據本發明實施例示出的一種授權認證方法的流程圖,本說明書提供了如實施例或流程圖的方法操作步驟,但基於常規或者無創造性的勞動可以包括更多或者更少的操作步驟。實施例中列舉的步驟順序僅僅為眾多步驟執行順序中的一種方式,不代表唯一的執行順序。在實際中的系統或設備產品執行時,可以按照實施例或者附圖所示的方法循序執行或者並存執行(例如並行處理器或者多執行緒處理的環境)。如圖6所示,可以包括以下步驟。Based on the above-mentioned software development kit generation method, an embodiment of an authorization and authentication method of the present invention is introduced below. FIG. 6 is a flowchart of an authorization and authentication method according to an embodiment of the present invention. This specification provides a method such as an embodiment or a flowchart. operational steps, but may include more or fewer operational steps based on routine or non-creative work. The sequence of steps enumerated in the embodiments is only one of the execution sequences of many steps, and does not represent the only execution sequence. When an actual system or device product is executed, it can be executed sequentially or concurrently (for example, in a parallel processor or a multi-threaded processing environment) according to the embodiments or the methods shown in the accompanying drawings. As shown in Figure 6, the following steps may be included.

S601:目標認證工具回應於目標應用對軟體開發套件的啟動指令,獲取目標應用的標識資訊。S601: The target authentication tool obtains the identification information of the target application in response to the target application's start-up instruction to the software development kit.

在實際應用中,使用者需要結合軟體開發套件進行目標應用開發時,會將軟體開發套件安裝在目標應用中,相應的,目標應用可以為當前需要調用軟體開發套件中目標開發工具的應用。In practical applications, when a user needs to develop a target application in combination with a software development kit, the software development kit is installed in the target application. Correspondingly, the target application can be an application that currently needs to call the target development tool in the software development kit.

在一些實施例中,在目標認證工具被配置在軟體開發套件中的情況下,在啟動指令被觸發後,目標認證工具可以調用相應的應用程式介面來獲取目標應用的標識資訊。In some embodiments, when the target authentication tool is configured in the software development kit, after the activation instruction is triggered, the target authentication tool can call the corresponding application program interface to obtain the identification information of the target application.

在另一些實施例中,在目標認證工具未被配置在軟體開發套件中的情況下,在啟動指令被觸發後,軟體開發套件中的目標開發工具可以調用相應的應用程式介面,來獲取目標應用的標識資訊,並將目標應用的標識資訊傳輸給目標認證工具。In other embodiments, when the target authentication tool is not configured in the software development kit, after the startup instruction is triggered, the target development tool in the software development kit can call the corresponding application programming interface to obtain the target application the identification information of the target application, and transmit the identification information of the target application to the target authentication tool.

其中,目標應用的標識資訊可以為授權應用的包名;另外,目標應用的標識資訊還可以包括基於目標應用的包名生成的簽名資訊。The identification information of the target application may be the package name of the authorized application; in addition, the identification information of the target application may also include signature information generated based on the package name of the target application.

在本發明實施例的一實施方式中,可以結合密碼散列函數對目標應用的包名進行簽名,其中,密碼散列函數可以包括但不限於SHA-1、md5等。In an implementation manner of the embodiment of the present invention, the package name of the target application may be signed in combination with a cryptographic hash function, where the cryptographic hash function may include, but is not limited to, SHA-1, md5, and the like.

S603:目標認證工具基於目標應用的標識資訊和授權應用的標識資訊進行授權認證,得到認證結果。S603: The target authentication tool performs authorization authentication based on the identification information of the target application and the identification information of the authorized application, and obtains an authentication result.

本說明書實施例中,目標認證工具中配置有授權應用的標識資訊,相應的,可以通過將目標應用的標識資訊與授權應用的標識資訊進行比對,來進行授權認證,其中,當目標應用的標識資訊與授權應用的標識資訊一致,認證結果為認證通過;反之,當目標應用的標識資訊與授權應用的標識資訊不一致時,認證結果為認證不通過。In the embodiment of this specification, the identification information of the authorized application is configured in the target authentication tool. Correspondingly, the authorization authentication can be performed by comparing the identification information of the target application with the identification information of the authorized application. If the identification information is consistent with the identification information of the authorized application, the authentication result is authentication passed; otherwise, when the identification information of the target application is inconsistent with the identification information of the authorized application, the authentication result is authentication failure.

S605:目標認證工具向軟體開發套件中的至少兩個目標開發工具發送認證結果。S605: The target certification tool sends certification results to at least two target development tools in the software development kit.

在一些實施例中,上述目標認證工具還配置有預設加密金鑰,相應的,上述至少兩個目標開發工具可以配置有與上述預設加密金鑰對應的預設解密金鑰;目標認證工具向軟體開發套件中的至少兩個目標開發工具發送認證結果包括:目標認證工具基於上述預設加密金鑰對認證結果進行加密,得到加密資訊;目標認證工具向軟體開發套件中的至少兩個目標開發工具發送上述加密資訊。In some embodiments, the target authentication tool is further configured with a preset encryption key, and accordingly, the at least two target development tools may be configured with a preset decryption key corresponding to the preset encryption key; the target authentication tool Sending the authentication result to the at least two target development tools in the software development kit includes: the target authentication tool encrypts the authentication result based on the above-mentioned preset encryption key to obtain encrypted information; the target authentication tool sends the at least two targets in the software development kit to The development tool sends the above encrypted information.

至少兩個目標開發工具基於預設解密金鑰對加密資訊進行解密,得到認證結果。At least two target development tools decrypt the encrypted information based on the preset decryption key to obtain an authentication result.

上述實施例中,通過在目標認證工具中配置預設加密金鑰和在目標開發工具中配置對應的預設解密金鑰,可以大大提高認證結果傳輸的安全性。In the above embodiment, by configuring the preset encryption key in the target authentication tool and configuring the corresponding preset decryption key in the target development tool, the security of the transmission of the authentication result can be greatly improved.

在一些實施例中,為了降低無效的資料傳輸,減輕系統負擔,目標認證工具向軟體開發套件中的至少兩個目標開發工具發送認證結果可以包括:在所述認證結果為認證通過的情況下,目標認證工具向所述軟體開發套件中的至少兩個目標開發工具發送所述認證結果。In some embodiments, in order to reduce invalid data transmission and reduce system load, the target authentication tool sending authentication results to at least two target development tools in the software development kit may include: if the authentication result is authentication passed, The target authentication tool sends the authentication result to at least two target development tools in the software development kit.

相應的,在認證結果為認證未通過的情況下,目標認證工具可以不執行軟體開發套件中的至少兩個目標開發工具發送所述認證結果的步驟。Correspondingly, if the authentication result is that the authentication fails, the target authentication tool may not execute the step of sending the authentication result by at least two target development tools in the software development kit.

S607:至少兩個目標開發工具在認證結果為認證通過的情況下,針對目標應用啟動調用功能。S607: In the case that the authentication result of the at least two target development tools is that the authentication is passed, start the calling function for the target application.

在一本發明實施例的一實施方式中,在針對目標應用啟動調用功能之後,目標應用可以直接調用上述目標開發工具。In an implementation of an embodiment of the present invention, after the calling function is started for the target application, the target application can directly call the above-mentioned target development tool.

由以上本說明書實施例提供的技術方案,本說明書在軟體開發套件使用過程中,通過軟體開發套件對應的目標認證工具的一次授權認證,就可以實現對多個目標開發工具統一的授權認證,大大降低授權認證的性能損耗,且後續修改認證方式,也可以直接對目標認證工具進行修改,有效降低了認證維護成本。According to the technical solutions provided by the above embodiments of this specification, in the process of using the software development kit, the unified authorization and authentication of multiple target development tools can be realized through one-time authorization authentication of the target authentication tool corresponding to the software development kit, which greatly improves the performance of the software development kit. The performance loss of authorization and authentication is reduced, and the authentication method can be modified later, and the target authentication tool can also be directly modified, which effectively reduces the cost of authentication maintenance.

在一些實施例中,目標認證工具還配置有預設認證時效資訊,在目標認證工具基於目標應用的標識資訊和授權應用的標識資訊進行授權認證,得到認證結果之後,上述方法還可以包括:根據預設認證時效資訊生成認證結果的有效期資訊;其中,上述目標認證工具基於預設加密金鑰對認證結果進行加密,得到加密資訊可以包括:目標認證工具基於預設加密金鑰對認證結果和有效期資訊進行加密,得到加密資訊。In some embodiments, the target authentication tool is further configured with preset authentication time limit information. After the target authentication tool performs authorization authentication based on the identification information of the target application and the identification information of the authorized application, and obtains the authentication result, the above method may further include: according to The preset authentication aging information generates the validity period information of the authentication result; wherein, the target authentication tool encrypts the authentication result based on the preset encryption key, and obtaining the encryption information may include: the target authentication tool pairs the authentication result and the validity period based on the preset encryption key The information is encrypted to obtain encrypted information.

在本發明實施例的一實施方式中,有效期資訊可以為結合生成認證結果的當前時間點和預設認證時效資訊(有效時長),確定的當前時間點生成的認證結果的有效截止時間點。In an implementation of the embodiment of the present invention, the validity period information may be the valid expiration time point of the authentication result generated at the current time point determined by combining the current time point when the authentication result is generated and the preset authentication time period information (valid time period).

相應的,上述至少兩個目標開發工具基於預設解密金鑰對加密資訊進行解密,得到認證結果可以包括:基於預設解密金鑰對加密資訊進行解密,得到認證結果和有效期資訊。Correspondingly, the at least two target development tools decrypt the encrypted information based on the preset decryption key, and obtaining the authentication result may include: decrypting the encrypted information based on the preset decryption key to obtain the authentication result and validity period information.

在一些實施例中,有效期資訊也可以不加密,直接發送給上述至少兩個目標開發工具。其中,有效期資訊也可以單獨加密後,發送給上述至少兩個目標開發工具。In some embodiments, the validity period information may be directly sent to the at least two target development tools without encryption. Wherein, the validity period information can also be sent to the above at least two target development tools after being encrypted separately.

相應的,在針對目標應用啟動調用功能之前,上述方法還可以包括:根據有效期資訊對認證結果進行有效性識別,得到有效性識別結果;在有效性識別結果為有效的情況下,執行針對目標應用啟動調用功能的操作。Correspondingly, before starting the calling function for the target application, the above method may further include: performing validity identification on the authentication result according to the validity period information, and obtaining a validity identification result; in the case that the validity identification result is valid, executing the verification for the target application. Initiate the action that invokes the function.

上述實施例中,通過為認證結果配置有效期資訊,可以保證該認證結果在有效截止時間點前才有效,進而更好的保證認證結果的安全性。In the above embodiment, by configuring the validity period information for the authentication result, it can be ensured that the authentication result is valid before the valid expiration time point, thereby better guaranteeing the security of the authentication result.

在一些實施例中,在基於預設加密金鑰對認證結果進行加密,得到加密資訊之前,上述方法還可以包括:根據授權應用的標識資訊和認證結果,生成校驗碼。In some embodiments, before encrypting the authentication result based on the preset encryption key to obtain encrypted information, the above method may further include: generating a check code according to the identification information of the authorized application and the authentication result.

在一些實施例中,為了降低無效的資料傳輸,減輕系統負擔,上述根據授權應用的標識資訊和認證結果,生成校驗碼可以包括:在認證結果為認證通過的情況下,可以根據授權應用的標識資訊和認證結果,生成校驗碼;相應的,在認證結果為認證未通過的情況下,不執行根據授權應用的標識資訊和認證結果,生成校驗碼的操作。In some embodiments, in order to reduce invalid data transmission and reduce system burden, the above-mentioned generating a check code according to the identification information of the authorized application and the authentication result may include: The identification information and the authentication result are used to generate a verification code; correspondingly, if the authentication result is that the authentication fails, the operation of generating the verification code based on the identification information and the authentication result of the authorized application is not performed.

相應的,上述基於預設加密金鑰對認證結果進行加密,得到加密資訊可以包括:基於預設加密金鑰對校驗碼進行加密,得到加密資訊。Correspondingly, encrypting the authentication result based on the preset encryption key to obtain the encrypted information may include: encrypting the check code based on the preset encryption key to obtain the encrypted information.

相應的,上述至少兩個目標開發工具還配置有授權應用的標識資訊,上述至少兩個目標開發工具基於預設解密金鑰對加密資訊進行解密,得到認證結果可以包括:基於預設解密金鑰對加密資訊進行解密,得到解密後的認證結果和解密後的授權應用的標識資訊;基於所述至少兩個目標開發工具配置的授權應用的標識資訊和解密後的授權應用的標識資訊進行授權驗證,得到二次認證結果;在二次認證結果為認證通過的情況下,將解密後的認證結果作為認證結果。Correspondingly, the at least two target development tools are also configured with identification information of authorized applications, and the at least two target development tools decrypt the encrypted information based on the preset decryption key, and obtaining the authentication result may include: based on the preset decryption key. Decrypt the encrypted information to obtain the decrypted authentication result and the decrypted identification information of the authorized application; perform authorization verification based on the identification information of the authorized application configured by the at least two target development tools and the decrypted identification information of the authorized application , and obtain the secondary authentication result; in the case that the secondary authentication result is the authentication passed, the decrypted authentication result is used as the authentication result.

在一些實施例中,可以通過將配置的授權應用的標識資訊和解密後的授權應用的標識資訊進行比對,來進行認證驗證,其中,當配置的授權應用的標識資訊和解密後的授權應用的標識資訊一致,認證驗證結果為通過;反之,當配置的授權應用的標識資訊和解密後的授權應用的標識資訊不一致時,認證驗證結果為不通過。In some embodiments, authentication and verification may be performed by comparing the configured identification information of the authorized application with the decrypted identification information of the authorized application, wherein when the configured identification information of the authorized application and the decrypted authorized application The authentication and verification result is passed; otherwise, when the configured identification information of the authorized application is inconsistent with the decrypted identification information of the authorized application, the authentication and verification result is not passed.

上述實施例中,通過預先在目標開發工具中配置有授權應用的標識資訊,進而在目標開發工具得到認證結果的同時,目標開發工具也可以結合授權應用的標識資訊進行授權認證,進而提升認證結果的可靠性,有效避免開發工具被調用過程中,存在惡意類比目標認證工具來向目標開發工具發送認證通過的認證結果。In the above embodiment, by pre-configuring the target development tool with the identification information of the authorized application, while the target development tool obtains the authentication result, the target development tool can also perform authorization authentication in combination with the identification information of the authorized application, thereby improving the authentication result. It can effectively prevent the development tool from being called, and there is a malicious analogy to the target authentication tool to send the authentication result that has passed the authentication to the target development tool.

以下從軟體開發套件對應的目標認證工具為執行主體,介紹本發明實施例提供的一種授權認證方法,其中,該目標認證工具配置有授權應用的標識資訊,結合圖7,該方法可以包括: S701:回應於目標應用對軟體開發套件的啟動指令,獲取目標應用的標識資訊。 S703:基於目標應用的標識資訊和授權應用的標識資訊進行授權認證,得到認證結果。 S705:向軟體開發套件中的至少兩個目標開發工具發送認證結果,以使至少兩個目標開發工具在認證結果為認證通過的情況下,針對目標應用啟動調用功能。 The following describes an authorization authentication method provided by an embodiment of the present invention from the target authentication tool corresponding to the software development kit as the execution subject, wherein the target authentication tool is configured with the identification information of the authorized application. In conjunction with FIG. 7 , the method may include: S701: Acquire identification information of the target application in response to the target application's start-up instruction to the software development kit. S703: Perform authorization authentication based on the identification information of the target application and the identification information of the authorized application, and obtain an authentication result. S705: Send an authentication result to at least two target development tools in the software development kit, so that the at least two target development tools start the calling function for the target application when the authentication result is that the authentication is passed.

在一些實施例中,目標認證工具還配置有預設加密金鑰,向軟體開發套件中的至少兩個目標開發工具發送認證結果包括:基於預設加密金鑰對認證結果進行加密,得到加密資訊;向軟體開發套件中的至少兩個目標開發工具發送加密資訊。In some embodiments, the target authentication tool is further configured with a preset encryption key, and sending the authentication result to the at least two target development tools in the software development kit includes: encrypting the authentication result based on the preset encryption key to obtain encrypted information ; Send encrypted information to at least two target development tools in the software development kit.

在一些實施例中,目標認證工具還配置有預設認證時效資訊,在基於目標應用的標識資訊和授權應用的標識資訊進行授權認證,得到認證結果之後,方法還包括:根據預設認證時效資訊生成認證結果的有效期資訊;基於預設加密金鑰對認證結果進行加密,得到加密資訊包括:基於預設加密金鑰對認證結果和有效期資訊進行加密,得到加密資訊。In some embodiments, the target authentication tool is further configured with preset authentication validity information. After performing authorization and authentication based on the identification information of the target application and the identification information of the authorized application, and obtaining an authentication result, the method further includes: according to the preset authentication validity information Generating the validity period information of the authentication result; encrypting the authentication result based on the preset encryption key, and obtaining the encrypted information includes: encrypting the authentication result and the validity period information based on the preset encryption key to obtain the encrypted information.

在一些實施例中,在基於預設加密金鑰對認證結果進行加密,得到加密資訊之前,方法還包括:根據授權應用的標識資訊和認證結果,生成校驗碼;基於預設加密金鑰對認證結果進行加密,得到加密資訊包括:基於預設加密金鑰對校驗碼進行加密,得到加密資訊。In some embodiments, before encrypting the authentication result based on the preset encryption key to obtain encrypted information, the method further includes: generating a check code according to the identification information of the authorized application and the authentication result; based on the preset encryption key pair Encrypting the authentication result to obtain encrypted information includes: encrypting a check code based on a preset encryption key to obtain encrypted information.

在一些實施例中,校驗碼除了由授權應用的標識資訊和認證結果生成以外,還可以包括其他資訊,其中可以結合實際應用需求確定,例如為了方便以後擴展功能的資訊,或者其他校驗資訊。In some embodiments, the verification code may include other information besides the identification information and the authentication result of the authorized application, which may be determined in combination with the actual application requirements, such as information to facilitate future expansion of functions, or other verification information .

在一些實施例中,上述校驗碼也可以具有時效性;其中,在對校驗碼進行加密的同時,也可以對校驗碼對應的有效期資訊進行一起加密,或者可以單獨對校驗碼對應的有效期資訊進行加密,也可以直接發送給上述至少兩個目標開發工具。In some embodiments, the above-mentioned check code may also be time-sensitive; wherein, when the check code is encrypted, the validity period information corresponding to the check code may also be encrypted together, or the corresponding check code may be separately encrypted. The validity period information is encrypted, and can also be directly sent to the above at least two target development tools.

關於上述以目標認證工具為執行主體實施例中的具體細化方式已經在上述有關該方法的實施例中進行了詳細描述,此處將不做詳細闡述說明。The specific refinement of the above-mentioned embodiment with the target authentication tool as the execution subject has been described in detail in the above-mentioned embodiments related to the method, and will not be described in detail here.

以下從軟體開發套件中的至少兩個目標開發工具為執行主體,介紹本發明實施例提供的一種授權認證方法,結合圖8,該方法可以包括: S801:接收目標認證工具發送的認證結果,認證結果為目標認證工具回應於目標應用對軟體開發套件的啟動指令,基於目標應用的標識資訊和目標認證工具配置有的授權應用的標識資訊進行授權認證得到的; S803:在認證結果為認證通過的情況下,針對目標應用啟動調用功能。 The following describes an authorization authentication method provided by an embodiment of the present invention from at least two target development tools in the software development kit as the execution body. With reference to FIG. 8 , the method may include: S801: Receive the authentication result sent by the target authentication tool, and the authentication result is that the target authentication tool responds to the target application's start instruction for the software development kit, and performs authorization authentication based on the identification information of the target application and the identification information of the authorized application configured by the target authentication tool owned; S803: In the case that the authentication result is that the authentication is passed, start the calling function for the target application.

在一些實施例中,上述至少兩個目標開發工具配置有預設解密金鑰;接收目標認證工具發送的認證結果包括:接收目標認證工具發送的加密資訊,加密資訊為目標認證工具基於與預設解密金鑰對應的預設加密金鑰對認證結果進行加密得到的;基於預設解密金鑰對加密資訊進行解密,得到認證結果。In some embodiments, the at least two target development tools are configured with a preset decryption key; receiving the authentication result sent by the target authentication tool includes: receiving encrypted information sent by the target authentication tool, where the encrypted information is based on the target authentication tool and the preset Obtained by encrypting the authentication result with the preset encryption key corresponding to the decryption key; decrypting the encrypted information based on the preset decryption key to obtain the authentication result.

在一些實施例中,上述加密資訊為目標認證工具基於預設加密金鑰對認證結果和有效期資訊進行加密得到的,基於預設解密金鑰對加密資訊進行解密,得到認證結果包括:基於預設解密金鑰對加密資訊進行解密,得到認證結果和有效期資訊;在針對目標應用啟動調用功能之前,方法還包括:根據有效期資訊對認證結果進行有效性識別,得到有效性識別結果;在有效性識別結果為有效的情況下,執行針對目標應用啟動調用功能的操作。In some embodiments, the above-mentioned encrypted information is obtained by the target authentication tool encrypting the authentication result and the validity period information based on a preset encryption key, and decrypting the encrypted information based on the preset decryption key, and obtaining the authentication result includes: The decryption key decrypts the encrypted information to obtain the authentication result and the validity period information; before starting the calling function for the target application, the method further includes: validating the authentication result according to the validity period information to obtain the validity identification result; If the result is valid, execute the operation of invoking the function for the target application.

在一些實施例中,上述加密資訊為目標認證工具基於預設加密金鑰對校驗碼進行加密得到的,校驗碼為根據授權應用的標識資訊和認證結果生成的,至少兩個目標開發工具還配置有授權應用的標識資訊,基於預設解密金鑰對加密資訊進行解密,得到認證結果包括:基於預設解密金鑰對加密資訊進行解密,得到解密後的認證結果和解密後的授權應用的標識資訊;基於至少兩個目標開發工具配置的授權應用的標識資訊和解密後的授權應用的標識資訊進行授權驗證,得到二次認證結果;在二次認證結果為認證通過的情況下,將解密後的認證結果作為認證結果。In some embodiments, the above encryption information is obtained by the target authentication tool encrypting a check code based on a preset encryption key, the check code is generated according to the identification information of the authorized application and the authentication result, and at least two target development tools The identification information of the authorized application is also configured, the encrypted information is decrypted based on the preset decryption key, and obtaining the authentication result includes: decrypting the encrypted information based on the preset decryption key, and obtaining the decrypted authentication result and the decrypted authorized application The identification information of the authorized application; based on the identification information of the authorized application configured by at least two target development tools and the decrypted identification information of the authorized application, the authorization verification is carried out, and the secondary authentication result is obtained; The decrypted authentication result is used as the authentication result.

在一些實施例中,校驗碼除了由授權應用的標識資訊和認證結果生成以外,還可以包括其他資訊,可以結合實際應用需求確定,例如,為了方便以後擴展功能的資訊,或者其他校驗資訊。In some embodiments, the verification code may include other information besides the identification information and the authentication result of the authorized application, which may be determined in combination with actual application requirements, for example, information for the convenience of expanding functions in the future, or other verification information .

在一些實施例中,上述校驗碼也可以具有時效性;其中,在對校驗碼進行加密的同時,也可以對校驗碼對應的有效期資訊進行一起加密,也可以單獨加密,也可以直接發送給上述至少兩個目標開發工具。In some embodiments, the above check code may also be time-sensitive; wherein, when the check code is encrypted, the validity period information corresponding to the check code may also be encrypted together, or encrypted separately, or directly Sent to at least two of the above target development tools.

關於上述以目標開發工具為執行主體實施例中的具體細化方式已經在上述有關該方法的實施例中進行了詳細描述,此處將不做詳細闡述說明。The specific refinement of the above-mentioned embodiment with the target development tool as the execution subject has been described in detail in the above-mentioned embodiment related to the method, and will not be described in detail here.

圖9是根據本發明實施例示出的一種授權認證裝置方塊圖。參照圖9,該裝置設置於軟體開發套件對應的目標認證工具,目標認證工具配置有授權應用的標識資訊,上述裝置包括:標識資訊獲取部分910,配置為回應於目標應用對軟體開發套件的啟動指令,獲取目標應用的標識資訊;授權認證部分920,配置為基於目標應用的標識資訊和授權應用的標識資訊進行授權認證,得到認證結果;認證結果發送部分930,配置為向軟體開發套件中的至少兩個目標開發工具發送認證結果,以使至少兩個目標開發工具在認證結果為認證通過的情況下,針對目標應用啟動調用功能。FIG. 9 is a block diagram of an authorization and authentication apparatus according to an embodiment of the present invention. Referring to FIG. 9, the device is set in the target authentication tool corresponding to the software development kit, and the target authentication tool is configured with identification information of the authorized application, and the above-mentioned device includes: an identification information acquisition part 910, which is configured to respond to the activation of the software development kit by the target application. instruction to obtain the identification information of the target application; the authorization authentication part 920 is configured to perform authorization authentication based on the identification information of the target application and the identification information of the authorized application, and obtain the authentication result; the authentication result sending part 930 is configured to send the authentication result to the software development kit. At least two target development tools send authentication results, so that when the authentication result is that the authentication is passed, the at least two target development tools start calling functions for the target application.

在一些實施例中,目標認證工具還配置有預設加密金鑰,認證結果發送部分930包括:加密部分,配置為基於預設加密金鑰對認證結果進行加密,得到加密資訊;加密資訊發送部分,配置為向軟體開發套件中的至少兩個目標開發工具發送加密資訊,以使至少兩個目標開發工具基於預設解密金鑰對加密資訊進行解密,得到認證結果。In some embodiments, the target authentication tool is further configured with a preset encryption key, and the authentication result sending part 930 includes: an encryption part configured to encrypt the authentication result based on the preset encryption key to obtain encrypted information; an encrypted information sending part , configured to send encrypted information to at least two target development tools in the software development kit, so that the at least two target development tools decrypt the encrypted information based on the preset decryption key to obtain authentication results.

在一些實施例中,目標認證工具還配置有預設認證時效資訊,至少兩個目標開發工具配置有預設解密金鑰;上述裝置還包括:有效期資訊生成部分,配置為根據預設認證時效資訊生成認證結果的有效期資訊;加密部分,還配置為基於預設加密金鑰對認證結果和有效期資訊進行加密,得到加密資訊。In some embodiments, the target authentication tool is further configured with preset authentication aging information, and at least two target development tools are configured with preset decryption keys; the above-mentioned device further includes: a validity period information generation part configured to be configured according to the preset authentication aging information The validity period information of the authentication result is generated; the encryption part is also configured to encrypt the authentication result and the validity period information based on the preset encryption key to obtain the encrypted information.

在一些實施例中,上述裝置還包括:校驗碼生成部分,配置為根據授權應用的標識資訊和認證結果,生成校驗碼;加密部分,還配置為基於預設加密金鑰對校驗碼進行加密,得到加密資訊。In some embodiments, the above device further includes: a verification code generation part, configured to generate a verification code according to the identification information of the authorized application and the authentication result; an encryption part, further configured to pair the verification code based on a preset encryption key Encrypt to get encrypted information.

在一些實施例中,所述認證結果發送部分930,還被配置為執行在所述認證結果為認證通過的情況下,向所述軟體開發套件中的至少兩個目標開發工具發送所述認證結果。In some embodiments, the authentication result sending part 930 is further configured to send the authentication result to at least two target development tools in the software development kit when the authentication result is an authentication passed .

關於上述實施例中的裝置,其中各個模組執行操作的具體方式已經在有關該方法的實施例中進行了詳細描述,此處將不做詳細闡述說明。Regarding the apparatus in the above embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment of the method, and will not be described in detail here.

圖10是根據本發明實施例示出的一種授權認證裝置方塊圖。參照圖10,該裝置設置於軟體開發套件中的至少兩個目標開發工具,上述裝置包括:認證結果接收部分1010,配置為接收目標認證工具發送的認證結果,認證結果為目標認證工具回應於目標應用對軟體開發套件的啟動指令,基於目標應用的標識資訊和目標認證工具配置有的授權應用的標識資訊進行授權認證得到的;調用功能啟動部分1020,配置為在認證結果為認證通過的情況下,針對目標應用啟動調用功能。Fig. 10 is a block diagram of an authorization authentication apparatus according to an embodiment of the present invention. 10 , the apparatus is provided with at least two target development tools in the software development kit, and the above-mentioned apparatus includes: an authentication result receiving part 1010 configured to receive an authentication result sent by the target authentication tool, and the authentication result is that the target authentication tool responds to the target The application's startup instruction to the software development kit is obtained by performing authorization and authentication based on the identification information of the target application and the identification information of the authorized application configured by the target authentication tool; the function startup part 1020 is invoked, and is configured to be authenticated when the authentication result is passed. , which initiates the call function for the target application.

在一些實施例中,至少兩個目標開發工具配置有預設解密金鑰;認證結果接收部分包括:加密資訊接收部分,配置為接收目標認證工具發送的加密資訊,加密資訊為目標認證工具基於與預設解密金鑰對應的預設加密金鑰對認證結果進行加密得到的;解密部分,配置為基於預設解密金鑰對加密資訊進行解密,得到認證結果。In some embodiments, at least two target development tools are configured with a preset decryption key; the authentication result receiving part includes: an encrypted information receiving part, configured to receive encrypted information sent by the target authentication tool, the encrypted information is based on the target authentication tool based on and Obtained by encrypting the authentication result with the preset encryption key corresponding to the preset decryption key; the decryption part is configured to decrypt the encrypted information based on the preset decryption key to obtain the authentication result.

在一些實施例中,加密資訊為目標認證工具基於預設加密金鑰對認證結果和有效期資訊進行加密得到的,解密部分,還配置為基於預設解密金鑰對加密資訊進行解密,得到認證結果和有效期資訊;上述裝置還包括:有效性識別部分,配置為根據有效期資訊對認證結果進行有效性識別,得到有效性識別結果;調用功能啟動部分,配置為在有效性識別結果為有效的情況下,執行針對目標應用啟動調用功能的操作。In some embodiments, the encrypted information is obtained by the target authentication tool encrypting the authentication result and the validity period information based on a preset encryption key, and the decryption part is further configured to decrypt the encrypted information based on the preset decryption key to obtain the authentication result and validity period information; the above-mentioned device further includes: a validity identification part, configured to perform validity identification on the authentication result according to the validity period information, and obtain the validity identification result; the calling function startup part, configured to be configured to be valid when the validity identification result is valid , which executes the action that initiates the calling function for the target application.

在一些實施例中,加密資訊為目標認證工具基於預設加密金鑰對校驗碼進行加密得到的,校驗碼為根據授權應用的標識資訊和認證結果生成的,至少兩個目標開發工具還配置有授權應用的標識資訊,解密部分包括:解密子部分,配置為基於預設解密金鑰對加密資訊進行解密,得到解密後的認證結果和解密後的授權應用的標識資訊;認證驗證部分,配置為基於至少兩個目標開發工具配置的授權應用的標識資訊和解密後的授權應用的標識資訊進行授權驗證,得到二次認證結果;認證結果確定部分,配置為在二次認證結果為認證通過的情況下,將解密後的認證結果作為認證結果。In some embodiments, the encryption information is obtained by the target authentication tool encrypting a check code based on a preset encryption key, the check code is generated according to the identification information of the authorized application and the authentication result, and the at least two target development tools further The identification information of the authorized application is configured, and the decryption part includes: a decryption sub-section, which is configured to decrypt the encrypted information based on the preset decryption key to obtain the decrypted authentication result and the decrypted identification information of the authorized application; the authentication and verification part, It is configured to perform authorization verification based on the identification information of the authorized application configured by at least two target development tools and the decrypted identification information of the authorized application, and obtain a secondary authentication result; the authentication result determination part is configured to be authenticated when the secondary authentication result is passed. In the case of , the decrypted authentication result is used as the authentication result.

關於上述實施例中的裝置,其中各個模組執行操作的具體方式已經在有關該方法的實施例中進行了詳細描述,此處將不做詳細闡述說明。Regarding the apparatus in the above embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment of the method, and will not be described in detail here.

圖11是根據本發明實施例示出的一種軟體開發套件生成裝置方塊圖。參照圖11,該裝置可以包括:套件申請指令接收部分1110,配置為接收套件申請指令,套件申請指令包括授權應用的標識資訊;工具獲取部分1120,配置為獲取與套件申請指令對應的至少兩個目標開發工具和初始認證工具;第一工具配置部分1130,配置為將授權應用的標識資訊配置至初始認證工具,得到目標認證工具,所述目標認證工具用於對所述至少兩個目標開發套件進行統一授權認證;軟體開發套件生成部分1140,配置為基於至少兩個目標開發工具生成軟體開發套件,或配置為基於至少兩個目標開發工具和目標認證工具生成軟體開發套件。FIG. 11 is a block diagram of an apparatus for generating a software development kit according to an embodiment of the present invention. 11 , the apparatus may include: a kit application instruction receiving part 1110 configured to receive a kit application instruction including identification information of an authorized application; a tool acquisition part 1120 configured to acquire at least two kit application instructions corresponding to the kit application instruction A target development tool and an initial authentication tool; the first tool configuration part 1130 is configured to configure the identification information of the authorized application to the initial authentication tool to obtain a target authentication tool, and the target authentication tool is used for the at least two target development kits Perform unified authorization and authentication; the software development kit generating part 1140 is configured to generate software development kits based on at least two target development tools, or is configured to generate software development kits based on at least two target development tools and target authentication tools.

在一些實施例中,上述裝置還包括:預設金鑰對生成部分,配置為生成預設金鑰對,預設金鑰對包括預設加密金鑰和預設解密金鑰;第二工具配置部分,配置為將預設加密金鑰配置至目標認證工具,以更新目標認證工具;第三工具配置部分,配置為將預設解密金鑰配置至至少兩個目標開發工具,以更新至少兩個目標開發工具。In some embodiments, the above-mentioned apparatus further includes: a preset key pair generating part configured to generate a preset key pair, the preset key pair including a preset encryption key and a preset decryption key; the second tool configuration The third tool configuration part is configured to configure the preset encryption key to the target authentication tool to update the target authentication tool; the third tool configuration part is configured to configure the preset decryption key to the at least two target development tools to update the at least two Target development tools.

在一些實施例中,上述裝置還包括:時效資訊確定部分,配置為確定預設認證時效資訊;第四工具配置部分,配置為將預設認證時效資訊配置至目標認證工具,以更新目標認證工具。In some embodiments, the above-mentioned apparatus further includes: an aging information determination part, configured to determine preset authentication aging information; a fourth tool configuration part, configured to configure the preset authentication aging information to the target authentication tool to update the target authentication tool .

在一些實施例中,上述裝置還包括:第五工具配置部分,配置為將授權應用的標識資訊配置至至少兩個目標開發工具,以更新至少兩個目標開發工具。In some embodiments, the above-mentioned apparatus further includes: a fifth tool configuration part, configured to configure the identification information of the authorized application to the at least two target development tools, so as to update the at least two target development tools.

關於上述實施例中的裝置,其中各部分執行操作的具體方式已經在有關該方法的實施例中進行了詳細描述,此處將不做詳細闡述說明。Regarding the device in the above-mentioned embodiment, the specific manner in which each part performs the operation has been described in detail in the embodiment of the method, and will not be described in detail here.

圖12是根據本發明實施例示出的一種用於軟體開發套件生成或用於授權認證的電子設備的方塊圖,該電子設備可以是伺服器,其內部結構圖可以如圖12所示。該電子設備包括通過系統匯流排連接的處理器、記憶體和網路介面。其中,該電子設備的處理器用於提供計算和控制能力。該電子設備的記憶體包括非易失性儲存介質、內記憶體。該非易失性儲存介質儲存有作業系統和電腦程式。該內記憶體為非易失性儲存介質中的作業系統和電腦程式的運行提供環境。該電子設備的網路介面用於與外部的終端通過網路連接通信。該電腦程式被處理器執行時以實現一種軟體開發套件生成或授權認證的方法。FIG. 12 is a block diagram of an electronic device for generating a software development kit or for authorization and authentication according to an embodiment of the present invention. The electronic device may be a server, and its internal structure diagram may be as shown in FIG. 12 . The electronic device includes a processor, memory and a network interface connected by a system bus. Among them, the processor of the electronic device is used to provide computing and control capabilities. The memory of the electronic device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage medium. The network interface of the electronic device is used to communicate with an external terminal through a network connection. The computer program, when executed by the processor, implements a method of software development kit generation or authorization.

本領域技術人員可以理解,圖12中示出的結構,僅僅是與本發明方案相關的部分結構的方塊圖,並不構成對本發明方案所應用於其上的電子設備的限定,詳細的電子設備可以包括比圖中所示更多或更少的部件,或者組合某些部件,或者具有不同的部件佈置。Those skilled in the art can understand that the structure shown in FIG. 12 is only a block diagram of a part of the structure related to the solution of the present invention, and does not constitute a limitation on the electronic device to which the solution of the present invention is applied. The detailed electronic device More or fewer components than shown in the figures may be included, or some components may be combined, or have a different arrangement of components.

儘管未示出,上述電子設備還可以包括藍牙模組、輸入裝置等,在此不再贅述。Although not shown, the above-mentioned electronic device may also include a Bluetooth module, an input device, etc., which will not be repeated here.

在示例性實施例中,還提供了一種電子設備,包括:處理器;用於儲存該處理器可執行指令的記憶體;其中,該處理器被配置為執行該指令,以實現如本發明實施例中的軟體開發套件生成或授權認證方法。In an exemplary embodiment, an electronic device is also provided, comprising: a processor; a memory for storing instructions executable by the processor; wherein the processor is configured to execute the instructions, so as to realize the implementation of the present invention The example software development kit generates or authorizes the authentication method.

在示例性實施例中,還提供了一種電腦可讀儲存介質,當該儲存介質中的指令由電子設備的處理器執行時,使得授權認證設備能夠執行本發明實施例中的軟體開發套件生成或授權認證方法。In an exemplary embodiment, a computer-readable storage medium is also provided, when the instructions in the storage medium are executed by the processor of the electronic device, the authorized authentication device can execute the software development kit generated or generated in the embodiment of the present invention or Authorization authentication method.

在示例性實施例中,還提供了一種包含指令的電腦程式產品,當其在電腦上運行時,使得電腦執行本發明實施例中的軟體開發套件生成或授權認證方法。In an exemplary embodiment, there is also provided a computer program product comprising instructions, which, when executed on a computer, cause the computer to execute the software development kit generation or authorization authentication method in the embodiment of the present invention.

本領域普通技術人員可以理解實現上述實施例方法中的全部或部分流程,是可以通過電腦程式來指令相關的硬體來完成,該的電腦程式可儲存於一非易失性電腦可讀取儲存介質中,該電腦程式在執行時,可包括如上述各方法的實施例的流程。其中,本發明所提供的各實施例中所使用的對記憶體、儲存、資料庫或其它介質的任何引用,均可 包括非易失性和/或,易失性記憶體。非易失性記憶體可包括唯讀記憶體(ROM)、可程式設計ROM (PROM)、電可程式設計ROM(EPROM)、電可擦除可程式設計ROM(EEPROM)或快閃記憶體。易失性記憶體可包括隨機存取記憶體(RAM)或者外部高速緩衝記憶體。作為說明而非局限,RAM以多種形式可得,諸如靜態RAM(SRAM)、動態RAM(DRAM)、同步DRAM(SDRAM)、雙數據率SDRAM(DDRSDRAM)、增強型SDRAM(ESDRAM)、同步鏈路(Synchlink)DRAM(SLDRAM)、記憶體匯流排(Rambus)直接RAM(RDRAM)、直接記憶體匯流排動態RAM(DRDRAM)、以及記憶體匯流排動態RAM(RDRAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above-mentioned embodiments can be completed by instructing the relevant hardware through a computer program, and the computer program can be stored in a non-volatile computer-readable storage In the medium, when the computer program is executed, it may include the processes of the above-mentioned method embodiments. Wherein, any reference to memory, storage, database or other medium used in the various embodiments provided by the present invention may include non-volatile and/or volatile memory. Nonvolatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory. Volatile memory may include random access memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in various forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

本領域技術人員在考慮說明書及實踐這裡公開的發明後,將容易想到本發明的其它實施方案。本發明旨在涵蓋本發明的任何變型、用途或者適應性變化,這些變型、用途或者適應性變化遵循本發明的一般性原理並包括本發明未公開的本技術領域中的公知常識或慣用技術手段。說明書和實施例僅被視為示例性的,本發明的真正範圍和精神由下面的申請專利範圍指出。Other embodiments of the invention will readily occur to those skilled in the art upon consideration of the specification and practice of the invention disclosed herein. The present invention is intended to cover any variations, uses or adaptations of the present invention which follow the general principles of the present invention and include common knowledge or conventional techniques in the technical field not disclosed by the present invention . The specification and examples are to be regarded as exemplary only, with the true scope and spirit of the invention being indicated by the following claims.

應當理解的是,本發明並不局限於上面已經描述並在附圖中示出的精確結構,並且可以在不脫離其範圍進行各種修改和改變。本發明的範圍僅由所附的申請專利範圍來限制。It should be understood that the present invention is not limited to the precise structures described above and illustrated in the accompanying drawings, and that various modifications and changes may be made without departing from its scope. The scope of the invention is limited only by the appended claims.

工業實用性 本發明實施例中,通過回應於目標應用對軟體開發套件的啟動指令,獲取目標應用的標識資訊;基於目標應用的標識資訊和授權應用的標識資訊進行授權認證,得到認證結果;向軟體開發套件中的至少兩個目標開發工具發送認證結果,以使至少兩個目標開發工具在認證結果為認證通過的情況下,針對目標應用啟動調用功能。利用本發明實施例提供的技術方案可以降低授權認證的性能損耗和認證維護成本。 Industrial Applicability In the embodiment of the present invention, the identification information of the target application is obtained by responding to the startup instruction of the target application to the software development kit; authorization and authentication are performed based on the identification information of the target application and the identification information of the authorized application to obtain an authentication result; At least two of the target development tools send the authentication result, so that the at least two target development tools start the calling function for the target application when the authentication result is that the authentication is passed. By using the technical solutions provided by the embodiments of the present invention, the performance loss of authorization and authentication and the cost of authentication maintenance can be reduced.

01:終端 02:伺服器 11:應用 12:SDK 13:安全模組 14:模組A 15:模組B 16:應用模組A 17:應用模組B 910:標識資訊獲取部分 920:授權認證部分 930:認證結果發送部分 1010:認證結果接收部分 1020:調用功能啟動部分 1110:套件申請指令接收部分 1120:工具獲取部分 1130:第一工具配置部分 1140:軟體開發套件生成部分 S201,S203,S205,S207,S209,S211,S213,S401, S403,S405,S407,S409,S411,S413,S601,S603, S605,S607,S701,S703,S705,S801,S803:步驟 01: Terminal 02: Server 11: Application 12:SDK 13: Security Module 14: Module A 15: Module B 16: Application Module A 17: Application module B 910: Identification information acquisition part 920: Authorization authentication part 930: Authentication result sending part 1010: Authentication result receiving part 1020: Invoke function start part 1110: Kit Application Instruction Receiving Section 1120: Tool Acquisition Section 1130: First Tool Configuration Section 1140: Software development kit generation part S201, S203, S205, S207, S209, S211, S213, S401, S403,S405,S407,S409,S411,S413,S601,S603, S605, S607, S701, S703, S705, S801, S803: Steps

此處的附圖被併入說明書中並構成本說明書的一部分,示出了符合本發明的實施例,並與說明書一起用於解釋本發明的原理,並不構成對本發明的不當限定。 圖1是根據本發明實施例示出的一種軟體開發套件生成方法的應用環境示意圖; 圖2a是根據本發明實施例示出的一種軟體開發套件生成方法的流程圖; 圖2b是根據本發明實施例示出的一種用於軟體開發套件生成的電子設備的方塊圖; 圖3是根據本發明實施例示出的另一種軟體開發套件生成方法的流程圖; 圖4是根據本發明實施例示出的另一種軟體開發套件生成方法的流程圖; 圖5是根據本發明實施例示出的另一種軟體開發套件生成方法的流程圖; 圖6是根據本發明實施例示出的一種授權認證方法的流程示意圖; 圖7是根據本發明實施例示出的一種授權認證方法的流程示意圖; 圖8是根據本發明實施例示出的一種授權認證方法的流程示意圖; 圖9是根據本發明實施例示出的一種授權認證裝置方塊圖; 圖10是根據本發明實施例示出的一種授權認證裝置方塊圖; 圖11是根據本發明實施例示出的一種軟體開發套件生成裝置方塊圖; 圖12是根據本發明實施例示出的一種用於軟體開發套件生成或用於授權認證的電子設備的方塊圖。 The accompanying drawings, which are incorporated into and constitute a part of the specification, illustrate embodiments consistent with the present invention, and together with the description, serve to explain the principles of the present invention, and do not constitute an unreasonable limitation of the present invention. 1 is a schematic diagram of an application environment of a method for generating a software development kit according to an embodiment of the present invention; 2a is a flowchart of a method for generating a software development kit according to an embodiment of the present invention; 2b is a block diagram of an electronic device for generating a software development kit according to an embodiment of the present invention; 3 is a flowchart of another method for generating a software development kit according to an embodiment of the present invention; 4 is a flowchart of another method for generating a software development kit according to an embodiment of the present invention; 5 is a flowchart of another method for generating a software development kit according to an embodiment of the present invention; 6 is a schematic flowchart of an authorization and authentication method according to an embodiment of the present invention; 7 is a schematic flowchart of an authorization and authentication method according to an embodiment of the present invention; 8 is a schematic flowchart of an authorization authentication method according to an embodiment of the present invention; 9 is a block diagram of an authorization and authentication device according to an embodiment of the present invention; 10 is a block diagram of an authorization and authentication device according to an embodiment of the present invention; 11 is a block diagram of a software development kit generating device according to an embodiment of the present invention; Fig. 12 is a block diagram of an electronic device for generating a software development kit or for authorization and authentication according to an embodiment of the present invention.

S701,S703,S705:步驟 S701, S703, S705: Steps

Claims (15)

一種授權認證方法,所述方法應用於軟體開發套件對應的目標認證工具,所述目標認證工具配置有授權應用的標識資訊,所述方法包括: 回應於目標應用對所述軟體開發套件的啟動指令,獲取所述目標應用的標識資訊; 基於所述目標應用的標識資訊和所述授權應用的標識資訊進行授權認證,得到認證結果; 向所述軟體開發套件中的至少兩個目標開發工具發送所述認證結果,以使所述至少兩個目標開發工具在所述認證結果為認證通過的情況下,針對所述目標應用啟動調用功能。 An authorization authentication method, the method is applied to a target authentication tool corresponding to a software development kit, the target authentication tool is configured with identification information of an authorized application, and the method includes: Acquiring the identification information of the target application in response to the target application's start-up instruction to the software development kit; Perform authorization authentication based on the identification information of the target application and the identification information of the authorized application to obtain an authentication result; Sending the authentication result to the at least two target development tools in the software development kit, so that the at least two target development tools start calling functions for the target application when the authentication result is that the authentication is passed . 根據請求項1所述的授權認證方法,其中,所述目標認證工具還配置有預設加密金鑰,所述軟體開發套件中的至少兩個目標開發工具配置有預設解密金鑰;所述向所述軟體開發套件中的至少兩個目標開發工具發送所述認證結果包括: 基於所述預設加密金鑰對所述認證結果進行加密,得到加密資訊; 向所述軟體開發套件中的至少兩個目標開發工具發送所述加密資訊,以使所述至少兩個目標開發工具基於所述預設解密金鑰對所述加密資訊進行解密,得到所述認證結果。 The authorization authentication method according to claim 1, wherein the target authentication tool is further configured with a preset encryption key, and at least two target development tools in the software development kit are configured with a preset decryption key; the Sending the authentication result to at least two target development tools in the software development kit includes: Encrypting the authentication result based on the preset encryption key to obtain encrypted information; Sending the encrypted information to at least two target development tools in the software development kit, so that the at least two target development tools decrypt the encrypted information based on the preset decryption key to obtain the authentication result. 根據請求項2所述的授權認證方法,其中,所述目標認證工具還配置有預設認證時效資訊,在所述基於所述目標應用的標識資訊和所述授權應用的標識資訊進行授權認證,得到認證結果之後,所述方法還包括: 根據所述預設認證時效資訊生成所述認證結果的有效期資訊; 所述基於所述預設加密金鑰對所述認證結果進行加密,得到加密資訊包括: 基於所述預設加密金鑰對所述認證結果和所述有效期資訊進行加密,得到所述加密資訊。 The authorization authentication method according to claim 2, wherein the target authentication tool is further configured with preset authentication aging information, and the authorization authentication is performed based on the identification information of the target application and the identification information of the authorized application, After obtaining the authentication result, the method further includes: generating validity period information of the authentication result according to the preset authentication validity period information; Encrypting the authentication result based on the preset encryption key to obtain encrypted information includes: The authentication result and the validity period information are encrypted based on the preset encryption key to obtain the encrypted information. 根據請求項2或3所述的授權認證方法,其中,在所述基於所述預設加密金鑰對所述認證結果進行加密,得到加密資訊之前,所述方法還包括: 根據所述授權應用的標識資訊和所述認證結果,生成校驗碼; 所述基於所述預設加密金鑰對所述認證結果進行加密,得到加密資訊包括: 基於所述預設加密金鑰對所述校驗碼進行加密,得到所述加密資訊。 The authorization authentication method according to claim 2 or 3, wherein, before the authentication result is encrypted based on the preset encryption key to obtain encrypted information, the method further includes: generating a check code according to the identification information of the authorized application and the authentication result; Encrypting the authentication result based on the preset encryption key to obtain encrypted information includes: The check code is encrypted based on the preset encryption key to obtain the encrypted information. 根據請求項1所述的授權認證方法,其中,所述向所述軟體開發套件中的至少兩個目標開發工具發送所述認證結果包括: 在所述認證結果為認證通過的情況下,向所述軟體開發套件中的至少兩個目標開發工具發送所述認證結果。 The authorization authentication method according to claim 1, wherein the sending the authentication result to at least two target development tools in the software development kit includes: If the authentication result is that the authentication is passed, the authentication result is sent to at least two target development tools in the software development kit. 一種授權認證方法,所述方法應用於軟體開發套件中的至少兩個目標開發工具,所述方法包括: 接收目標認證工具發送的認證結果,所述認證結果為所述目標認證工具回應於目標應用對所述軟體開發套件的啟動指令,基於所述目標應用的標識資訊和所述目標認證工具配置有的授權應用的標識資訊進行授權認證得到的; 在所述認證結果為認證通過的情況下,針對所述目標應用啟動調用功能。 An authorization authentication method, the method is applied to at least two target development tools in a software development kit, and the method includes: Receive an authentication result sent by the target authentication tool, where the authentication result is that the target authentication tool responds to the target application's startup instruction to the software development kit, based on the identification information of the target application and the information configured by the target authentication tool. The identification information of the authorized application is obtained through authorization and authentication; If the authentication result is that the authentication is passed, the calling function is started for the target application. 根據請求項6所述的授權認證方法,其中,所述至少兩個目標開發工具配置有預設解密金鑰;所述接收目標認證工具發送的認證結果包括: 接收所述目標認證工具發送的加密資訊,所述加密資訊為所述目標認證工具基於與所述預設解密金鑰對應的預設加密金鑰對所述認證結果進行加密得到的; 基於所述預設解密金鑰對所述加密資訊進行解密,得到所述認證結果。 The authorization authentication method according to claim 6, wherein the at least two target development tools are configured with a preset decryption key; and the authentication result sent by the receiving target authentication tool includes: receiving encryption information sent by the target authentication tool, where the encryption information is obtained by the target authentication tool encrypting the authentication result based on a preset encryption key corresponding to the preset decryption key; Decrypt the encrypted information based on the preset decryption key to obtain the authentication result. 根據請求項7所述的授權認證方法,其中,所述加密資訊為所述目標認證工具基於所述預設加密金鑰對所述認證結果和所述認證結果的有效期資訊進行加密得到的,所述基於所述預設解密金鑰對所述加密資訊進行解密,得到所述認證結果包括: 基於所述預設解密金鑰對所述加密資訊進行解密,得到所述認證結果和所述認證結果的有效期資訊; 在所述針對所述目標應用啟動調用功能之前,所述方法還包括: 根據所述認證結果的有效期資訊對所述認證結果進行有效性識別,得到有效性識別結果; 在所述有效性識別結果為有效的情況下,執行所述針對所述目標應用啟動調用功能的操作。 The authorization authentication method according to claim 7, wherein the encryption information is obtained by encrypting the authentication result and the validity period information of the authentication result by the target authentication tool based on the preset encryption key, and the Decrypting the encrypted information based on the preset decryption key, and obtaining the authentication result includes: Decrypt the encrypted information based on the preset decryption key to obtain the authentication result and the validity period information of the authentication result; Before starting the calling function for the target application, the method further includes: Perform validity identification on the authentication result according to the validity period information of the authentication result to obtain a validity identification result; In the case that the validity identification result is valid, the operation of invoking a function for the target application is executed. 根據請求項7或8所述的授權認證方法,其中,所述加密資訊為所述目標認證工具基於所述預設加密金鑰對校驗碼進行加密得到的,所述校驗碼為根據所述授權應用的標識資訊和所述認證結果生成的,所述至少兩個目標開發工具還配置有所述授權應用的標識資訊,所述基於所述預設解密金鑰對所述加密資訊進行解密,得到所述認證結果包括: 基於所述預設解密金鑰對所述加密資訊進行解密,得到解密後的認證結果和解密後的授權應用的標識資訊; 基於所述至少兩個目標開發工具配置的授權應用的標識資訊和所述解密後的授權應用的標識資訊進行授權認證,得到二次認證結果; 在所述二次認證結果為認證通過的情況下,將所述解密後的認證結果作為所述認證結果。 The authorization authentication method according to claim 7 or 8, wherein the encryption information is obtained by the target authentication tool encrypting a check code based on the preset encryption key, and the check code is obtained according to the The identification information of the authorized application and the authentication result are generated, the at least two target development tools are also configured with the identification information of the authorized application, and the encrypted information is decrypted based on the preset decryption key. , and obtaining the authentication result includes: Decrypt the encrypted information based on the preset decryption key to obtain the decrypted authentication result and the decrypted identification information of the authorized application; Perform authorization authentication based on the identification information of the authorized application configured by the at least two target development tools and the decrypted identification information of the authorized application to obtain a secondary authentication result; When the secondary authentication result is that the authentication is passed, the decrypted authentication result is used as the authentication result. 一種軟體開發套件生成方法,包括: 接收套件申請指令,所述套件申請指令包括授權應用的標識資訊; 獲取與所述套件申請指令對應的至少兩個目標開發工具和初始認證工具; 將所述授權應用的標識資訊配置至所述初始認證工具,得到目標認證工具,所述目標認證工具用於對所述至少兩個目標開發套件進行統一授權認證; 基於所述至少兩個目標開發工具生成軟體開發套件,或基於所述至少兩個目標開發工具和所述目標認證工具生成所述軟體開發套件。 A software development kit generation method, comprising: receiving a kit application instruction, where the kit application instruction includes identification information of an authorized application; Obtain at least two target development tools and initial certification tools corresponding to the kit application instruction; Configuring the identification information of the authorized application to the initial authentication tool to obtain a target authentication tool, where the target authentication tool is used to perform unified authorization authentication on the at least two target development kits; A software development kit is generated based on the at least two target development tools, or the software development kit is generated based on the at least two target development tools and the target authentication tool. 根據請求項10所述的軟體開發套件生成方法,其中,在基於所述至少兩個目標開發工具生成軟體開發套件,或基於所述至少兩個目標開發工具和所述目標認證工具生成所述軟體開發套件之前,所述方法還包括: 生成預設金鑰對,所述預設金鑰對包括預設加密金鑰和預設解密金鑰; 將所述預設加密金鑰配置至所述目標認證工具,以更新所述目標認證工具; 將所述預設解密金鑰配置至所述至少兩個目標開發工具,以更新所述至少兩個目標開發工具。 The method for generating a software development kit according to claim 10, wherein the software development kit is generated based on the at least two target development tools, or the software is generated based on the at least two target development tools and the target authentication tool Before developing the kit, the method further includes: generating a preset key pair, the preset key pair including a preset encryption key and a preset decryption key; Configuring the preset encryption key to the target authentication tool to update the target authentication tool; The preset decryption key is configured to the at least two target development tools to update the at least two target development tools. 根據請求項10或11所述的軟體開發套件生成方法,其中,所述方法還包括: 確定預設認證時效資訊; 將所述預設認證時效資訊配置至所述目標認證工具,以更新所述目標認證工具。 The method for generating a software development kit according to claim 10 or 11, wherein the method further comprises: Determine the information on the preset authentication time limit; The preset authentication aging information is allocated to the target authentication tool to update the target authentication tool. 根據請求項10或11所述的軟體開發套件生成方法,其中,所述方法還包括: 將所述授權應用的標識資訊配置至所述至少兩個目標開發工具,以更新所述至少兩個目標開發工具。 The method for generating a software development kit according to claim 10 or 11, wherein the method further comprises: Configuring the identification information of the authorized application to the at least two target development tools to update the at least two target development tools. 一種電子設備,包括: 處理器; 用於儲存所述處理器可執行指令的記憶體; 其中,所述處理器被配置為執行所述指令,以實現如請求項1至9中任一項所述的授權認證方法或如請求項10至13中任一項所述的軟體開發套件生成方法。 An electronic device comprising: processor; memory for storing instructions executable by the processor; Wherein, the processor is configured to execute the instructions to implement the authorization authentication method described in any one of claim items 1 to 9 or the software development kit generation described in any one of claim items 10 to 13 method. 一種電腦可讀儲存介質,當所述儲存介質中的指令由電子設備的處理器執行時,使得電子設備能夠執行如請求項1至9中任一項所述的授權認證方法或如請求項10至13中任一項所述的軟體開發套件生成方法。A computer-readable storage medium, when the instructions in the storage medium are executed by a processor of an electronic device, the electronic device can execute the authorization and authentication method as described in any one of claim items 1 to 9 or as claimed in item 10 The software development kit generation method described in any one of to 13.
TW110141938A 2021-01-29 2021-11-10 Authorization authentication, software development kit generation method, electronic equipment and computer-readable storage medium TW202230175A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110127163.6A CN112800393B (en) 2021-01-29 2021-01-29 Authorization authentication method, software development kit generation method, device and electronic equipment
CN202110127163.6 2021-01-29

Publications (1)

Publication Number Publication Date
TW202230175A true TW202230175A (en) 2022-08-01

Family

ID=75812963

Family Applications (1)

Application Number Title Priority Date Filing Date
TW110141938A TW202230175A (en) 2021-01-29 2021-11-10 Authorization authentication, software development kit generation method, electronic equipment and computer-readable storage medium

Country Status (3)

Country Link
CN (1) CN112800393B (en)
TW (1) TW202230175A (en)
WO (1) WO2022160697A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800393B (en) * 2021-01-29 2022-08-26 深圳市商汤科技有限公司 Authorization authentication method, software development kit generation method, device and electronic equipment
CN113268268A (en) * 2021-06-09 2021-08-17 深圳市雷鸟网络传媒有限公司 Management and control method and device of software development kit, computer equipment and medium
CN114444029B (en) * 2022-01-11 2023-02-28 北京易智时代数字科技有限公司 Use right verification method and device during VR application operation and electronic equipment

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5471642B2 (en) * 2010-03-12 2014-04-16 株式会社リコー Electronic device, usage restriction method, and usage restriction program
CN103617394A (en) * 2013-12-04 2014-03-05 北京网秦天下科技有限公司 SDK providing and invoking method and associated device
CN104717648B (en) * 2013-12-12 2018-08-17 中国移动通信集团公司 A kind of uniform authentication method and equipment based on SIM card
CN104836784B (en) * 2014-09-25 2018-05-15 腾讯科技(北京)有限公司 A kind of information processing method, client and server
CN106209734B (en) * 2015-04-30 2019-07-19 阿里巴巴集团控股有限公司 The identity identifying method and device of process
US10546119B2 (en) * 2016-11-14 2020-01-28 Mastercard International Incorporated Methods for securely storing sensitive data on mobile device
CN106709280A (en) * 2016-12-08 2017-05-24 北京旷视科技有限公司 Method, client and server for processing information
CN109543433B (en) * 2018-11-27 2022-06-24 杭州网易智企科技有限公司 Software development kit encryption method, device, computer and storage medium
CN109756339A (en) * 2018-11-30 2019-05-14 航天信息股份有限公司 A kind of method and system carrying out unified certification to the multiple applications of terminal based on real name certificate
CN109981562B (en) * 2019-01-17 2023-05-12 平安科技(深圳)有限公司 Software development kit authorization method and device
CN110895493B (en) * 2019-11-29 2022-03-15 宜人恒业科技发展(北京)有限公司 Method, device and storage medium for accessing application program interface
CN111538965B (en) * 2020-04-15 2021-10-12 支付宝(杭州)信息技术有限公司 Authorized login method, device and system of application program
CN111552928A (en) * 2020-04-26 2020-08-18 北京学之途网络科技有限公司 Authentication method and device
CN111625781B (en) * 2020-08-03 2020-11-10 腾讯科技(深圳)有限公司 SDK authorization authentication method, device, equipment and storage medium
CN112800393B (en) * 2021-01-29 2022-08-26 深圳市商汤科技有限公司 Authorization authentication method, software development kit generation method, device and electronic equipment

Also Published As

Publication number Publication date
CN112800393A (en) 2021-05-14
WO2022160697A1 (en) 2022-08-04
CN112800393B (en) 2022-08-26

Similar Documents

Publication Publication Date Title
WO2022160697A1 (en) Authorization authentication and software development kit generation methods and apparatuses, and electronic device
TWI598814B (en) System and method for managing and diagnosing a computing device equipped with unified extensible firmware interface (uefi)-compliant firmware
CN108241517B (en) Software upgrading method, client and electronic equipment
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
US20080077592A1 (en) method and apparatus for device authentication
TW202109320A (en) Trusted execution environment-based application activation method and apparatus
US11853438B2 (en) Providing cryptographically secure post-secrets-provisioning services
US20180025332A1 (en) Transaction facilitation
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
WO2019051839A1 (en) Data processing method and device
CN112398826A (en) Data processing method and device based on state password, storage medium and electronic equipment
JPWO2004053664A1 (en) Program execution control device, OS, client terminal, server, program execution control system, program execution control method, program execution control program
CN112632573A (en) Intelligent contract execution method, device and system, storage medium and electronic equipment
CN112765637A (en) Data processing method, password service device and electronic equipment
CN109150811B (en) Method and device for realizing trusted session and computing equipment
EP3048553B1 (en) Method for distributing applets, and entities for distributing applets
CN112236770A (en) Data processing
CN117453343A (en) Virtual machine measurement and secret calculation authentication method, device, system and storage medium
CN111901287B (en) Method and device for providing encryption information for light application and intelligent equipment
CN115203708B (en) Method and system for deploying application data to coprocessor
CN108390758B (en) User password processing method and device and internal control security monitoring system
US9245097B2 (en) Systems and methods for locking an application to device without storing device information on server
US20240113898A1 (en) Secure Module and Method for App-to-App Mutual Trust Through App-Based Identity
CN114173327A (en) Authentication method and terminal based on 5G industry private network
CN114389790A (en) Secure multi-party computing method and device