CN107889104A - Authorization method and authoring system, the storage device of root authority - Google Patents

Authorization method and authoring system, the storage device of root authority Download PDF

Info

Publication number
CN107889104A
CN107889104A CN201711246193.9A CN201711246193A CN107889104A CN 107889104 A CN107889104 A CN 107889104A CN 201711246193 A CN201711246193 A CN 201711246193A CN 107889104 A CN107889104 A CN 107889104A
Authority
CN
China
Prior art keywords
terminal
parameter
ciphertext
default
deciphering algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711246193.9A
Other languages
Chinese (zh)
Inventor
郭名义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Mobile Technology Co Ltd
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Mobile Technology Co Ltd
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Mobile Technology Co Ltd, Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Mobile Technology Co Ltd
Priority to CN201711246193.9A priority Critical patent/CN107889104A/en
Publication of CN107889104A publication Critical patent/CN107889104A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses the authorization method and authoring system, storage device of a kind of root authority.The authorization method includes:The connection established between first terminal and second terminal;First terminal randomly generates the first parameter;Second terminal judges whether the identity of itself belongs to preset identity;When the identity of second terminal belongs to preset identity, second terminal is handled the first parameter using default enciphering and deciphering algorithm and is obtained the second parameter;First terminal judges whether the second parameter and the first parameter match according to default enciphering and deciphering algorithm;When the second parameter and the first parameter match, first terminal allows to open root authority to second terminal.Based on this, the present invention can authorize root authority while security is met, be easy to Commissioning Analysis.

Description

Authorization method and authoring system, the storage device of root authority
Technical field
The present invention relates to IT (Information Technology, information technology) technical field, and in particular to a kind of Authorization method and authoring system, the storage device of root authority.
Background technology
With the development of mobile communication technology, various intelligent terminals have become in daily routines indispensable one Point, and along with this, there are many root application tools in the market, and the root application tools are installed once downloading, terminal The system application can such as main interface be arbitrarily modified, anyone can steal or change the data of terminal storage, this Its safety and reliability can undoubtedly be substantially reduced.In order to solve the problem, each manufacturer can typically limit the mandate of root authority Examination & verification, the access to terminal resource is strictly controlled, such as only research staff is allowed to call debugging version software and obtains system Root authority, and the USER versions software installed when terminal is dispatched from the factory does not open root authority.But after terminal is sold and used After a period of time, its system can still report various problems, such as the problems such as crash, restart, and now USER versions software does not have Root authority, many Debugging message of terminal can not obtain, very unfavorable for Commissioning Analysis.
For this, prior art typically recompilates debugging version software according to the version number information of USER version softwares, leads to Cross the debugging version software recompilated and carry out mode analysis.But requirement of such a mode to programming specialty is higher, debugging point It is very low to analyse efficiency, and is difficult to debug some probability sex chromosome mosaicisms, such as some problems only can be in USER version running softwares Occur and be not in when debugging version running software, so as to further reduce Commissioning Analysis efficiency.
The content of the invention
In view of this, the present invention provides a kind of authorization method and authoring system, storage device of root authority, can be full Root authority is authorized while sufficient security, is easy to Commissioning Analysis.
The authorization method of the root authority of one embodiment of the invention, including:
The connection established between first terminal and second terminal;
First terminal randomly generates the first parameter;
Second terminal judges whether the identity of itself belongs to preset identity;
When the identity of second terminal belongs to preset identity, second terminal is using default enciphering and deciphering algorithm to the One parameter is handled and obtains the second parameter;
First terminal judges whether the second parameter and the first parameter match according to default enciphering and deciphering algorithm;
When the second parameter and the first parameter match, first terminal allows to open root authority to second terminal.
Alternatively, second terminal the first parameter is handled using default enciphering and deciphering algorithm and obtain the second parameter it Before, methods described also includes:After first terminal uses the parameter of public key encryption first of default enciphering and deciphering algorithm and obtains encryption Ciphertext;
Second terminal is handled the first parameter using default enciphering and deciphering algorithm and is obtained the second parameter, including:Second Terminal decrypts the ciphertext using the private key matched with public key of default enciphering and deciphering algorithm and obtains the plaintext after decryption;
First terminal judges whether the second parameter and the first parameter match according to default enciphering and deciphering algorithm, including:First eventually End judges whether the plaintext and the first parameter are identical.
Alternatively, second terminal the first parameter is handled using default enciphering and deciphering algorithm and obtain the second parameter it Before, methods described also includes:After first terminal uses the parameter of public key encryption first of default enciphering and deciphering algorithm and obtains encryption First ciphertext;
Second terminal is handled the first parameter using default enciphering and deciphering algorithm and is obtained the second parameter, including:Second Terminal is using the parameter of public key encryption first and obtains the second ciphertext after encryption;
First terminal judges whether the second parameter and the first parameter match according to default enciphering and deciphering algorithm, including:First eventually End judges whether the first ciphertext and the second ciphertext are identical.
Alternatively, when first terminal judges that the second ciphertext is identical with the first ciphertext, methods described also includes:Second terminal Judge that can it access default network;
When second terminal judges that it has access to default network, first terminal opens root authority to second terminal.
Alternatively, the identity includes MAC Address.
The authoring system of the root authority of one embodiment of the invention, including the first terminal and second terminal of connection are established,
First terminal is used to randomly generate the first parameter;
Second terminal is used to judge whether the identity of itself and preset identity are identical;
When the identity of second terminal belongs to preset identity, second terminal is additionally operable to using preset algorithm to the One parameter is handled and obtains the second parameter;
First terminal is further used for judging whether the second parameter and the first parameter match according to default enciphering and deciphering algorithm;
When the second parameter and the first parameter match, first terminal allows to open root authority to second terminal.
Alternatively, second terminal the first parameter is handled using default enciphering and deciphering algorithm and obtain the second parameter it Before, first terminal is additionally operable to the parameter of public key encryption first using default enciphering and deciphering algorithm and obtains the ciphertext after encryption;
After second terminal is decrypted the ciphertext and is obtained decryption using the private key of default enciphering and deciphering algorithm and public key match Plaintext, and using the plaintext as the second parameter;
First terminal judges whether the plaintext and the first parameter are identical, and first terminal is whole to second when both are identical The open root authority in end.
Alternatively, second terminal the first parameter is handled using default enciphering and deciphering algorithm and obtain the second parameter it Before, first terminal is additionally operable to the parameter of public key encryption first using default enciphering and deciphering algorithm and obtains the first ciphertext after encryption;
Second terminal is using the parameter of public key encryption first and obtains the second ciphertext after encryption, and the second ciphertext is made For the second parameter;
First terminal judges whether the first ciphertext and the second ciphertext are identical, and first terminal allows to when both are identical Two open-destination root authorities.
Alternatively, when first terminal judges that the second ciphertext is identical with the first ciphertext, second terminal is additionally operable to judge its energy The no default network of access;
When second terminal judges that it has access to default network, first terminal opens root authority to second terminal.
The storage device of one embodiment of the invention, have program stored therein parameter, and described program parameter can be performed above-mentioned The authorization method of root authority.
Beneficial effect:The present invention adds a trigger condition equivalent to the root authority for open first terminal, only When meeting this trigger condition, first terminal just opens root authority to second terminal, and the trigger condition is based on default plus solution Close algorithm is encrypted what is be achieved with decryption verification, ensures that root authority is awarded by encrypting with the security of decryption verification The security of power, so as to authorize root authority while security is met, it is easy to Commissioning Analysis.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the authorization method of the root authority of first embodiment of the invention;
Fig. 2 is the schematic flow sheet of the authorization method of the root authority of second embodiment of the invention;
Fig. 3 is the schematic flow sheet of the authorization method of the root authority of third embodiment of the invention;
Fig. 4 is the schematic flow sheet of the authorization method of the root authority of fourth embodiment of the invention.
Embodiment
The main object of the present invention is:Root authority for open first terminal increases a trigger condition, is only according with First terminal just allows to open root authority to second terminal when closing this trigger condition, and the trigger condition is based on default encryption and decryption Algorithm is encrypted to be achieved with decryption verification, and root authority mandate is ensured by encrypting with the security of decryption verification Security, root authority thus is authorized while security is met, is easy to Commissioning Analysis.
The first terminal can be considered the terminal for needing to carry out mode analysis that consumer holds, and accordingly, second terminal is Need the equipment for obtaining the root authority of first terminal and performing mode analysis.In view of the root authority acquiescence of present terminal system It is nonopen, the present invention increases an enabled switch, the enabled switch is silent firstly the need of the system code of modification first terminal Recognize closing, only meet that its is just opened during trigger condition, thus first terminal opens root authority.
The first terminal can be smart mobile phone, the second terminal can be PC (Personal Computer, it is individual People's computer), certainly, any one of first terminal and second terminal can also be PDA (Personal Digital Assistant, personal digital assistant or tablet personal computer), be worn on limbs or be embedded in wearing in clothing, jewellery, accessory Wear equipment.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, to the skill of each exemplary embodiment provided by the present invention Art scheme is clearly and completely described.In the case where not conflicting, following each embodiments and its technical characteristic can be mutual Combination.
Fig. 1 is the schematic flow sheet of the authorization method of the root authority of first embodiment of the invention.Referring to Fig. 1, this reality Applying the authorization method of the root authority of example includes step S11~S16.
S11:The connection established between first terminal and second terminal.
According to first terminal and the type of second terminal, the suitable mode of the present embodiment selection establishes company between the two Connect, the connection includes the wired connection based on the progress such as USB data line, and the nothing based on the progress such as bluetooth, LAN optimization Line connects.So that first terminal is smart mobile phone, second terminal is PC as an example, can be established by USB data line has between the two Line connects.
S12:First terminal randomly generates the first parameter.
By taking android system as an example, first terminal can be added with shell trigger commands, such as " adbshell Persist.xxx.debug* ", wherein " * " represents input parameter, and control command is inputted by the shell trigger commands, So as to perform various operations.For example, input parameter 1 on first terminal, the shell trigger commands that now first terminal receives For " adb shell persist.xxx.debug1 ", based on this, the first terminal randomly generates first parameter of 128.
S13:Second terminal judges whether the identity of itself belongs to preset identity.
This step main purpose is:Non-trusted equipment is excluded, and only allows trusted device to obtain first terminal Root authority, so as to further ensure the security of root authority mandate.So-called trusted device is that identity belongs to pre- Put the terminal of identity.
Wherein, it is MAC (Media Access Control Address, medium that the identity, which includes but is not limited to, Accessing to control address, physical address or hardware address).
If the identity of second terminal is not belonging to preset identity, step S141 is performed.If the body of second terminal Part mark belongs to preset identity, then performs step S142 and S15.
S141:Authorization failure, terminate process.
S142:Second terminal is handled the first parameter using default enciphering and deciphering algorithm and is obtained the second parameter.
S15:First terminal judges whether the second parameter and the first parameter match according to default enciphering and deciphering algorithm.
If the second parameter and the first parameter mismatch, step S141 is performed.If the second parameter and the matching of the first parameter, Perform step S16.
S16:First terminal allows to open root authority to second terminal.
Wherein, processing of the second terminal to the first parameter is included using default enciphering and deciphering algorithm (such as RSA Algorithm) to the The encryption and decryption that one parameter is carried out, in this, the second parameter can be the ciphertext after encryption, or the plaintext after decryption.
This is described with reference to Fig. 2 and embodiment illustrated in fig. 3.
Fig. 2 is the schematic flow sheet of the authorization method of the root authority of second embodiment of the invention.Referring to Fig. 2, this reality Applying the authorization method of the root authority of example includes step S21~S26.
S21:The connection established between first terminal and second terminal.
S22:First terminal randomly generates the first parameter, and the parameter of public key encryption first using default enciphering and deciphering algorithm And obtain the ciphertext after encryption.
S23:Second terminal judges whether the identity of itself belongs to preset identity.
If the identity of second terminal is not belonging to preset identity, step S241 is performed.If the body of second terminal Part mark belongs to preset identity, then performs step S242 and S25.
S241:Authorization failure, terminate process.
S242:Second terminal decrypts the ciphertext using the private key matched with public key of default enciphering and deciphering algorithm and obtains solution Plaintext after close.
S25:First terminal judges whether the plaintext and the first parameter are identical.
If the plaintext and the first parameter differ, step S241 is performed.If the plaintext and the first parameter are identical, Perform step S26.
S26:First terminal opens root authority to second terminal.
In the present embodiment, processing of the second terminal to the first parameter is the decryption carried out based on default enciphering and deciphering algorithm, Second parameter is the plaintext after decryption.
In an application scenarios, research staff passes through shell trigger commands, such as " adb Shellpersist.xxx.debug 1 ", input parameter 1, first terminal randomly generate the first parameter A of 128 and preserved, and The public key encryption of RSA Algorithm the first parameter A is used afterwards and obtains the ciphertext A after encryption1.Second terminal is preinstalled with a decryption Instrument, preset identity and the private key matched with the RSA Algorithm of first terminal, the private key are built-in with the decoding tool For the ciphertext from first terminal to be decrypted.In second terminal after first terminal receives decoding request, second Terminal first determines whether the identity of itself belongs to preset identity, and after authentication is identified through, is calculated using RSA The private key decryption ciphertext A with public key pairing of method1And obtain the plaintext A after decryption2, second terminal can be by plaintext A2 It is displayed or printed for.Research staff shell trigger commands " adb shell persist.xxx.debug on first terminal A2", input parameter is plaintext A2, now first terminal is automatically by plaintext A2Compared with the first parameter A, when both are identical, First terminal opens root authority to second terminal.
The present embodiment goes for obtaining the adb root authorities of USER version softwares, and by adbroot authorities to the The system of one terminal carries out any operation.Prior art is compared to, the present embodiment is without the version number according to USER version softwares Information recompilate debugging version software, can not only reduce to programming specialty requirement, and can Commissioning Analysis can only go out Some probability sex chromosome mosaicisms during present USER version running softwares, so as to improve Commissioning Analysis efficiency.
Fig. 3 is the schematic flow sheet of the authorization method of the root authority of third embodiment of the invention.Referring to Fig. 3, this reality Applying the authorization method of the root authority of example includes step S31~S36.
S31:The connection established between first terminal and second terminal.
S32:First terminal randomly generates the first parameter, and first terminal using the public key encryption of default enciphering and deciphering algorithm First parameter simultaneously obtains the first ciphertext after encryption.
S33:Second terminal judges whether the identity of itself belongs to preset identity.
If the identity of second terminal is not belonging to preset identity, step S341 is performed.If the body of second terminal Part mark belongs to preset identity, then performs step S342 and S35.
S341:Authorization failure, terminate process.
S342:Second terminal is using the parameter of public key encryption first and obtains the second ciphertext after encryption.
S35:First terminal judges whether the first ciphertext and the second ciphertext are identical.
If the first ciphertext and the second ciphertext differ, step S341 is performed.If the first ciphertext is identical with the second ciphertext, Perform step S36.
S36:First terminal allows to open root authority to second terminal.
In the present embodiment, processing of the second terminal to the first parameter is the encryption carried out based on default enciphering and deciphering algorithm, Second parameter is the second ciphertext after encryption.
In an application scenarios, when first terminal and second terminal are established after connection, establishing pipeline between the two leads to Letter, all data and request message, response message between the two can be transmitted by pipeline communication.Second terminal Can be under Linux system by shell trigger commands, such as " adb shell persist.xxx.debug 1 ", input are joined Number 1, start the root application tools of prepackage with this, the root application tools be built-in with preset identity and with first eventually The public key of the RSA Algorithm matching at end, the public key are used to the first parameter from first terminal be encrypted.Then, second eventually Whether end judges whether first terminal is currently in root authority checking states, i.e., entered in another root checkings authorized Journey, if so, then directly exiting;If it is not, then continue executing with subsequent operation.Then, second terminal by pipeline communication mode to One terminal sets property to trigger the startup of one in first terminal system independent cryptographic check process, specifically, the Whether the property value of one terminal (such as 2 seconds) detection shell trigger commands at a predetermined interval is 1, if 1, then first terminal Randomly generate the first parameter A of 128 and preserve into authinfo property values, subsequently into loitering phase, wait second eventually Hold the result to first parameter A.Whether second terminal meeting cycle detection authinfo property values are empty, when it is not sky When, the first parameter A that first terminal is stored in authinfo property values is obtained by pipeline communication mode, and load RSA calculations Method, at the same time, second terminal obtain the MAC of itself and compared with preset MAC, after authentication is identified through, second Terminal uses public key encryption the first parameter A of RSA Algorithm and obtains the second ciphertext A after encryption2, then by the second ciphertext A2Protect Deposit into authinfo encrypt property values.First terminal circulation (such as at interval of 10 seconds) detection authinfo encrypt Whether property value is empty, when it be space-time, the second ciphertext A in acquisition authinfoencrypt property values2.Then, first Terminal transfers the first parameter A in authinfo property values, and uses the first parameter of public key encryption A, and encryption is obtained with this The first ciphertext A afterwards1.First terminal judges the first ciphertext A1With the second ciphertext A2Whether identical, if both are identical, first eventually Hold to second terminal and open root authority.
Fig. 4 is the schematic flow sheet of the authorization method of the root authority of fourth embodiment of the invention.Referring to Fig. 4, this reality Applying the authorization method of the root authority of example includes step S41~S47.
S41:The connection established between first terminal and second terminal.
S42:First terminal randomly generates the first parameter, and first terminal using the public key encryption of default enciphering and deciphering algorithm First parameter simultaneously obtains the first ciphertext after encryption.
S43:Second terminal judges whether the identity of itself belongs to preset identity.
If the identity of second terminal is not belonging to preset identity, step S441 is performed.If the body of second terminal Part mark belongs to preset identity, then performs step S442 and S45.
S441:Authorization failure, terminate process.
S442:Second terminal is using the parameter of public key encryption first and obtains the second ciphertext after encryption.
S45:First terminal judges whether the first ciphertext and the second ciphertext are identical.
If the first ciphertext and the second ciphertext differ, step S441 is performed.If the first ciphertext is identical with the second ciphertext, Perform step S46.
S46:Second terminal judges that can it access default network.
If second terminal can not access default network, step S441 is performed.If second terminal has access to default net Network, then perform step S47.
S47:First terminal opens root authority to second terminal.
On the basis of the description of embodiment illustrated in fig. 3, the network that the present embodiment is further accessed to second terminal is carried out Checking, to verify whether second terminal accesses trust network.The root that first terminal is obtained with the research staff of a certain manufacturer is weighed Exemplified by limiting this application scenarios, current embodiment require that verifying whether the second terminal operated by current research staff has access to this The company Intranet of manufacturer, the company Intranet of the manufacturer is only had access to, just allow second terminal to obtain the root of first terminal Authority, thereby further ensure that the security of data in first terminal.
Certainly, the present embodiment can be performed only in step S46:Second terminal judges whether it accesses default network.It is right Ying Di, if second terminal does not access default network, perform step S441.If second terminal has accessed default network, hold Row step S47.
Further, for the present embodiment and earlier figures 1- embodiment illustrated in fig. 3, root authority is obtained in second terminal And after the operation such as modified to first terminal system, second terminal can also pass through set in root application tools it is related The state that parameter reverts to first terminal before not open root authority, so ensure that the complete of data in first terminal Whole property.
The present invention also provides a kind of authoring system of root authority, the authoring system include the first terminal for establishing connection and Second terminal, the first terminal and second terminal can correspond to the authorization method for the root authority for performing above-mentioned each embodiment, With same technique effect.
It should be understood that can be combined with each other between above-mentioned each embodiment, and if above-mentioned function with the shape of software function Formula is realized and is used as stand-alone product to sell or taken in use, being storable in an electronic device-readable in storage medium, i.e. this hair Bright also to provide a kind of storage device for the parameter that has program stored therein, described program parameter can be performed to realize above-mentioned each implementation The method of example, the storage device can be such as USB flash disk, CD, server.That is, each embodiment of the present invention can be with Embodied in the form of software product, it includes some instructions to cause intelligent terminal to perform each embodiment methods described All or part of step.That is, the present invention can be realized by the installation script in terminal system or program it is above-mentioned each Individual step, terminal system is only needed to support operation, it is portable stronger, and hardware cost will not be increased.
Specifically, all or part of step of above-described embodiment can be encapsulated in an executable program by the present invention Face, equivalent to a root application tool is developed, as long as research staff opens the root application tools, it is possible to reach a key The effect of root first terminals.The root application tools are related to above-mentioned safety measure, such as RSA Algorithm or self-defining data add The default enciphering and deciphering algorithm such as close algorithm, MAC authentications, Intranet (default network) certification this three big safety measure, ensure only have with this Specific second terminal could obtain the root authority of first terminal.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, for example, between each embodiment technical characteristic it is mutual With reference to, or other related technical areas are directly or indirectly used in, it is included within the scope of the present invention.

Claims (10)

1. a kind of authorization method of root authority, it is characterised in that the authorization method includes:
The connection established between first terminal and second terminal;
The first terminal randomly generates the first parameter;
The second terminal judges whether the identity of itself belongs to preset identity;
When the identity of second terminal belongs to preset identity, the second terminal is using default enciphering and deciphering algorithm to institute The first parameter is stated to be handled and obtain the second parameter;
The first terminal judges whether second parameter and first parameter match according to the default enciphering and deciphering algorithm;
When second parameter and first parameter match, the first terminal allows to open root to the second terminal Authority.
2. authorization method according to claim 1, it is characterised in that
Before the second terminal is handled first parameter using default enciphering and deciphering algorithm and obtains the second parameter, Methods described also includes:The first terminal is using the first parameter described in the public key encryption of default enciphering and deciphering algorithm and obtains encryption Ciphertext afterwards;
The second terminal is handled first parameter using default enciphering and deciphering algorithm and is obtained the second parameter, including: The second terminal decrypts the ciphertext using the private key matched with the public key of the default enciphering and deciphering algorithm and obtains solution Plaintext after close;
The first terminal judges whether second parameter and first parameter match according to default enciphering and deciphering algorithm, bag Include:The first terminal judges whether the plaintext and the first parameter are identical.
3. authorization method according to claim 1, it is characterised in that
Before the second terminal is handled first parameter using default enciphering and deciphering algorithm and obtains the second parameter, Methods described also includes:The first terminal is using the first parameter described in the public key encryption of default enciphering and deciphering algorithm and obtains encryption The first ciphertext afterwards;
The second terminal is handled first parameter using default enciphering and deciphering algorithm and is obtained the second parameter, including: The second terminal is using the first parameter described in the public key encryption and obtains the second ciphertext after encryption;
The first terminal judges whether second parameter and first parameter match according to default enciphering and deciphering algorithm, bag Include:The first terminal judges whether the first ciphertext and the second ciphertext are identical.
4. authorization method according to claim 3, it is characterised in that
When the first terminal judges that second ciphertext is identical with the first ciphertext, methods described also includes:Described second eventually End judges that can it access default network;
When the second terminal judges that it has access to the default network, the first terminal opens to the second terminal Root authority.
5. authorization method according to claim 1, it is characterised in that the identity includes MAC.
A kind of 6. authoring system of root authority, it is characterised in that the authoring system include establish connection first terminal and Second terminal,
The first terminal is used to randomly generate the first parameter;
The second terminal is used to judge whether the identity of itself and preset identity are identical;
When the identity of second terminal belongs to preset identity, the second terminal is additionally operable to using preset algorithm to institute The first parameter is stated to be handled and obtain the second parameter;
The first terminal is further used for judging second parameter and first ginseng according to the default enciphering and deciphering algorithm Whether number matches;
When second parameter and first parameter match, the first terminal allows to open root to the second terminal Authority.
7. authoring system according to claim 6, it is characterised in that
Before the second terminal is handled first parameter using default enciphering and deciphering algorithm and obtains the second parameter, The first terminal is additionally operable to using the first parameter described in the public key encryption of default enciphering and deciphering algorithm and obtains the ciphertext after encryption;
The second terminal is decrypted the ciphertext using the private key matched with the public key of the default enciphering and deciphering algorithm and obtained The plaintext after decryption is taken, and using the plaintext as the second parameter;
The first terminal judges whether the plaintext and the first parameter identical, and when both are identical the first terminal to institute State second terminal and open root authority.
8. authoring system according to claim 6, it is characterised in that
Before the second terminal is handled first parameter using default enciphering and deciphering algorithm and obtains the second parameter, The first terminal is additionally operable to using the first parameter described in the public key encryption of default enciphering and deciphering algorithm and obtains first after encrypting Ciphertext;
The second terminal is using the first parameter described in the public key encryption and obtains the second ciphertext after encryption, and by described the Two ciphertexts are as the second parameter;
The first terminal judges whether first ciphertext and the second ciphertext are identical, and the first terminal when both are identical Allow to open root authority to the second terminal.
9. authoring system according to claim 8, it is characterised in that
When the first terminal judges that second ciphertext is identical with the first ciphertext, the second terminal is additionally operable to judge its energy The no default network of access;
When the second terminal judges that it has access to the default network, the first terminal opens to the second terminal Root authority.
10. a kind of storage device, it is characterised in that the storage device is had program stored therein parameter, and described program parameter can be by Perform to realize the method described in claim any one of 1-5.
CN201711246193.9A 2017-11-30 2017-11-30 Authorization method and authoring system, the storage device of root authority Pending CN107889104A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711246193.9A CN107889104A (en) 2017-11-30 2017-11-30 Authorization method and authoring system, the storage device of root authority

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711246193.9A CN107889104A (en) 2017-11-30 2017-11-30 Authorization method and authoring system, the storage device of root authority

Publications (1)

Publication Number Publication Date
CN107889104A true CN107889104A (en) 2018-04-06

Family

ID=61776436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711246193.9A Pending CN107889104A (en) 2017-11-30 2017-11-30 Authorization method and authoring system, the storage device of root authority

Country Status (1)

Country Link
CN (1) CN107889104A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111787369A (en) * 2019-04-03 2020-10-16 深圳Tcl数字技术有限公司 Root authority control method and system for smart television and storage medium
CN112528267A (en) * 2019-09-19 2021-03-19 青岛海信移动通信技术股份有限公司 Root operation executing method and mobile terminal
CN113806718A (en) * 2021-08-31 2021-12-17 青岛海信移动通信技术股份有限公司 Access right management method and terminal device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN105512538A (en) * 2015-12-11 2016-04-20 北京元心科技有限公司 debugging method and system of intelligent mobile operating system
CN106789094A (en) * 2017-03-09 2017-05-31 龙尚科技(上海)有限公司 Dynamic confirming method based on random algorithm Yu AES

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN105512538A (en) * 2015-12-11 2016-04-20 北京元心科技有限公司 debugging method and system of intelligent mobile operating system
CN106789094A (en) * 2017-03-09 2017-05-31 龙尚科技(上海)有限公司 Dynamic confirming method based on random algorithm Yu AES

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111787369A (en) * 2019-04-03 2020-10-16 深圳Tcl数字技术有限公司 Root authority control method and system for smart television and storage medium
CN111787369B (en) * 2019-04-03 2022-05-03 深圳Tcl数字技术有限公司 Root authority control method and system for smart television and storage medium
CN112528267A (en) * 2019-09-19 2021-03-19 青岛海信移动通信技术股份有限公司 Root operation executing method and mobile terminal
CN113806718A (en) * 2021-08-31 2021-12-17 青岛海信移动通信技术股份有限公司 Access right management method and terminal device

Similar Documents

Publication Publication Date Title
CN106130982B (en) Intelligent household appliance remote control method based on PKI system
US20210350013A1 (en) Security systems and methods for continuous authorized access to restricted access locations
US7788494B2 (en) Link key injection mechanism for personal area networks
CN106034028B (en) A kind of terminal device authentication method, apparatus and system
CN113014539B (en) Internet of things equipment safety protection system and method
JP2015531184A (en) Protected communication between a medical device and its remote device
JP2004213216A (en) Information security microcomputer and its program developing device and program development system
KR20120030562A (en) Validation and/or authentication of a device for communication with a network
CN101984575A (en) Method and device for protecting mobile terminal software
US11057196B2 (en) Establishing shared key data for wireless pairing
CN107438849A (en) For the system and method for the integrality for verifying electronic equipment
CN106411830A (en) Method for preventing access data from being tampered and mobile terminal
CN105574963B (en) A kind of gate inhibition's verification method and door control terminal
CN112787813B (en) Identity authentication method based on trusted execution environment
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
CN103401880A (en) Automatic login industrial control system and control method
CN107889104A (en) Authorization method and authoring system, the storage device of root authority
CN104144411B (en) Encryption, decryption terminal and the encryption and decryption approaches applied to terminal
CN105763559A (en) Intelligent household control system and method
TR201807814T4 (en) Self-verification device and method.
CN107944234A (en) A kind of brush machine control method of Android device
CN110932951B (en) Intelligent household control method and device
CN113268752A (en) Data management method, device, equipment and storage medium
EP2701101B1 (en) Information processing devices and information processing methods
CN110838919B (en) Communication method, storage method, operation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20201106