CN108023727A - A kind of authorization method and its system - Google Patents

A kind of authorization method and its system Download PDF

Info

Publication number
CN108023727A
CN108023727A CN201711205512.1A CN201711205512A CN108023727A CN 108023727 A CN108023727 A CN 108023727A CN 201711205512 A CN201711205512 A CN 201711205512A CN 108023727 A CN108023727 A CN 108023727A
Authority
CN
China
Prior art keywords
ciphertext
service
mandate
authentication terminal
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711205512.1A
Other languages
Chinese (zh)
Other versions
CN108023727B (en
Inventor
张宁
王冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Nanxiang Science And Technology Co Ltd
Original Assignee
Shenzhen Nanxiang Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Nanxiang Science And Technology Co Ltd filed Critical Shenzhen Nanxiang Science And Technology Co Ltd
Priority to CN201711205512.1A priority Critical patent/CN108023727B/en
Publication of CN108023727A publication Critical patent/CN108023727A/en
Application granted granted Critical
Publication of CN108023727B publication Critical patent/CN108023727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention is suitable for data encryption technology field, there is provided a kind of authorization method and its system, including:User terminal is sent to authorization server authorizes ciphertext to obtain request;According to default random ciphertext generating algorithm, generation authorizes ciphertext to obtain and asks corresponding mandate ciphertext authorization server, and ciphertext will be authorized to be sent to user terminal;Whether authentication terminal receives the mandate ciphertext of user terminal input, and identified by default ciphertext decipherment algorithm and authorize ciphertext legal;If legal, authentication terminal extraction authorizes the effective time included in ciphertext and service identifiers;Authentication terminal updates effective service duration of service identifiers corresponding with service according to effective time.The present invention solve need product effective period of service expire after, it can just carry out renewing operation, so as to use viability in user, service disruption is caused because of expire-services, the usage experience of user is reduced, also increases the problem of user renews the difficulty of operation.

Description

A kind of authorization method and its system
Technical field
The invention belongs to data encryption technology field, more particularly to a kind of authorization method and its system.
Background technology
Existing substantial amounts of product is by the way of lease is sold, i.e., each product has certain service time limit, in the clothes Be engaged in the valid period in time limit, user can the normal use product all or part of functions;And after time limit failure is serviced, the product It will stop response user service request, until user is again to the product mandate.But existing authorization method is, it is necessary to product Effective period of service expire after, can just carry out renewing operation, so as to use viability in user, because of expire-services And cause service disruption, the usage experience of user is reduced, also increases the difficulty that user renews operation.
The content of the invention
In view of this, an embodiment of the present invention provides a kind of authorization method and its system, to solve existing authorization method, After existing authorization method is, it is necessary to which effective period of service of product expires, it can just carry out renewing operation, so as in user Using viability, service disruption is caused because of expire-services, reduces the usage experience of user, user is increased and renews operation Difficulty the problem of.
The first aspect of the embodiment of the present invention provides a kind of authorization method, applied to authoring system, it is characterised in that institute Stating authorization method includes:
User terminal is sent to authorization server authorizes ciphertext to obtain request;Wherein, the mandate ciphertext is obtained in request The effective time and service identifiers authorized comprising request;
The authorization server generates the mandate ciphertext acquisition request and corresponds to according to default random ciphertext generating algorithm Mandate ciphertext, and by it is described mandate ciphertext be sent to the user terminal;
Authentication terminal receives the mandate ciphertext of the user terminal input, and is known by default ciphertext decipherment algorithm Whether not described mandate ciphertext is legal;Wherein, the ciphertext decipherment algorithm is specially that the random ciphertext generating algorithm is corresponding Decipherment algorithm;
If the mandate ciphertext is legal, authentication terminal extraction is described authorize the effective time that is included in ciphertext and Service identifiers;
The authentication terminal updates effective service duration of the service identifiers corresponding with service according to the effective time.
The second aspect of the embodiment of the present invention provides a kind of authoring system, it is characterised in that the authoring system includes: Authorization server, user terminal and authentication terminal;
The user terminal, authorizes ciphertext to obtain request for being sent to authorization server;Wherein, the mandate ciphertext obtains Take the effective time authorized in request comprising request and service identifiers;
The authorization server, for according to default random ciphertext generating algorithm, generating the mandate ciphertext acquisition please Corresponding mandate ciphertext is sought, and the mandate ciphertext is sent to the user terminal;
The authentication terminal, for receiving the mandate ciphertext of the user terminal input, and passes through default ciphertext Whether the decipherment algorithm identification mandate ciphertext is legal;Wherein, the ciphertext decipherment algorithm is specially the random ciphertext generation The corresponding decipherment algorithm of algorithm;
The authentication terminal, if for it is described mandate ciphertext it is legal, extract it is described mandate ciphertext in include it is effective when Long and service identifiers;
The authentication terminal, for updating when effectively servicing of the service identifiers corresponding with service according to the effective time It is long.
Implement a kind of authorization method provided in an embodiment of the present invention and its system has the advantages that:
The embodiment of the present invention sends one to authorization server by user terminal and authorizes ciphertext to obtain request, will pass through Authorization server gets the mandate ciphertext that can use authentication terminal built-in services.Authorization server is receiving awarding for user After weighing ciphertext acquisition request, one will be requested to generate according to the mandate ciphertext and meets predetermined encryption mode and possesses what request authorized The mandate ciphertext of effective time information and service identity information, and return to user terminal.User terminal is receiving mandate After ciphertext, then the mandate ciphertext can be input to authentication terminal, if authentication terminal recognize the mandate ciphertext can be by default Decipherment algorithm be decrypted, then it by it is legal mandate ciphertext to be, and updates service identifiers in the mandate ciphertext and correspond to clothes Effective service duration of business, after being zero without effective service duration, can carry out renewing operation, can appoint in authentication terminal Under meaning state, extend effective service duration of a certain service, reduce the probability of happening for causing service disruption because of expire-services, Also the difficulty for renewing operation of user is reduce further, improves the usage experience of user.
Brief description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, drawings in the following description be only the present invention some Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is a kind of structure diagram for right discriminating system that one embodiment of the invention provides;
Fig. 2 is that a kind of authorization method that first embodiment of the invention provides realizes flow chart;
Fig. 3 is a kind of specific implementation flow chart for authorization method S203 that second embodiment of the invention provides;
Fig. 4 is a kind of specific implementation flow chart for authorization method S203 that third embodiment of the invention provides;
Fig. 5 is a kind of specific implementation flow chart for authorization method that fourth embodiment of the invention provides;
Fig. 6 is a kind of specific implementation flow chart for authorization method that fifth embodiment of the invention provides.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Fig. 1 shows a kind of structure diagram for authoring system that one embodiment of the invention provides, which includes awarding Weigh server, user terminal and authentication terminal.For convenience of description, it illustrate only part related to the present embodiment.
Referring to Fig. 1, the authoring system includes:Authorization server 11, user terminal 12 and authentication terminal 13;
The user terminal 12, authorizes ciphertext to obtain request for being sent to authorization server 11;Wherein, the mandate is close Text obtains the effective time authorized in request comprising request and service identifiers;
The authorization server 11, for according to default random ciphertext generating algorithm, generating the mandate ciphertext and obtaining Corresponding mandate ciphertext is asked, and the mandate ciphertext is sent to the user terminal 12;
The authentication terminal 13, the mandate ciphertext inputted for receiving the user terminal 12, and by default Whether the ciphertext decipherment algorithm identification mandate ciphertext is legal;Wherein, the ciphertext decipherment algorithm is specially the random ciphertext The corresponding decipherment algorithm of generating algorithm;
The authentication terminal 13, if for it is described mandate ciphertext it is legal, extract it is described mandate ciphertext in include it is effective Duration and service identifiers;
The authentication terminal 13, for updating effective service of the service identifiers corresponding with service according to the effective time Duration.
Alternatively, the mandate ciphertext is specially image in 2 D code, and the authentication terminal 13 is whole for receiving the user The mandate ciphertext of the input of end 12, and identify whether the mandate ciphertext is legal by default ciphertext decipherment algorithm, specifically Including:
The authentication terminal 13, the image in 2 D code shown for scanning the user terminal 12, obtains described two The information that dimension code image includes;
The authentication terminal 13, the information for being included by the ciphertext decipherment algorithm to the image in 2 D code carry out Decryption obtains uniform resource position mark URL, parses whether the URL is legal URL.
Alternatively, the mandate ciphertext is specially authorization code, the authentication terminal 13, for receiving the user terminal 12 The mandate ciphertext of input, and identify whether the mandate ciphertext is legal, specifically includes by default ciphertext decipherment algorithm:
The user terminal 12, for establishing communication channel with the authentication terminal 13;
The user terminal 12, for authorization code input by user to be sent to the authentication eventually by the communication channel End 13;
The authentication terminal 13, for identifying whether the authorization code is legal by the ciphertext decipherment algorithm.
Alternatively, the authentication terminal 13 is additionally operable to:
The authentication terminal 13, if for receiving Client-initiated device service request, detects the effectively service Whether duration is more than 0;
The authentication terminal 13, if being less than or equal to 0 for the effectively service duration, is not responding to the device service Request;
The authentication terminal 13, if being more than 0 for the effectively service duration, responds the device service request.
Alternatively, in the authentication terminal 13, if being more than 0 for the effectively service duration, set described in response After standby service request, further include:
The authentication terminal 13, the service duration of the service is provided for recording;
The authentication terminal 13, for calculating the difference between the effectively service duration and the service duration, Obtain remaining service duration;
The authentication terminal 13, if being less than or equal to 0 for the remaining service duration, stops providing the service.
The embodiment of the present invention sends one to authorization server by user terminal and authorizes ciphertext to obtain request, will pass through Authorization server gets the mandate ciphertext that can use authentication terminal built-in services.Authorization server is receiving awarding for user After weighing ciphertext acquisition request, one will be requested to generate according to the mandate ciphertext and meets predetermined encryption mode and possesses what request authorized The mandate ciphertext of effective time information and service identity information, and return to user terminal.User terminal is receiving mandate After ciphertext, then the mandate ciphertext can be input to authentication terminal, if authentication terminal recognize the mandate ciphertext can be by default Decipherment algorithm be decrypted, then it by it is legal mandate ciphertext to be, and updates service identifiers in the mandate ciphertext and correspond to clothes Effective service duration of business, after solving existing authorization method, it is necessary to which effective period of service of product expires, can just carry out Operation is renewed, so as to use viability in user, service disruption is caused because of expire-services, reduces the use of user Experience, also increases the problem of user renews the difficulty of operation.
As another embodiment of the present invention, there is provided a kind of authorization method.In embodiments of the present invention, the authorization method Applied to authoring system, which includes authorization server, user terminal and authentication terminal.Wherein, the authorization service Device is used to issue the corresponding mandate ciphertext of authentication terminal to each user terminal, so that each user terminal can be according to mandate ciphertext Get and use the service available authority of authentication terminal;User terminal is specially the terminal device that user uses, and can be such as The mobile terminals such as mobile phone, tablet computer;Authentication terminal is specifically used for carrying out authentication operations to Client-initiated service request, if with The service request at family is legal, then provides corresponding service for the user;It should be noted that above three equipment can be by wired Communication or communication are communicatively coupled.Fig. 2 shows the realization for the authorization method that first embodiment of the invention provides Flow chart, details are as follows:
In S201, user terminal is sent to authorization server authorizes ciphertext to obtain request;Wherein, the mandate ciphertext obtains Take the effective time authorized in request comprising request and service identifiers.
In the present embodiment, if desired user extends the service duration of authentication terminal, can be taken by user terminal to mandate One mandate ciphertext of device transmission of being engaged in obtains request.User can input required extend and take when generation mandate ciphertext obtains request It is engaged in the service identifiers of the corresponding service of duration, and request extends the length for authorizing the time, i.e. effective time, user terminal is by root The parameter inputted according to user's above-mentioned two, generates corresponding mandate ciphertext and obtains request.Alternatively, if not inputted in generation Two parameters are stated, user terminal will be configured according to default value, and generation default authorisation ciphertext obtains request.For example, user is whole It is 15 days to hold default setting effective time, and corresponding service identifiers, in this case, Yong Hudian are serviced based on service identifiers Hit and authorize ciphertext generation instruction and above-mentioned two parameter is not configured, then user terminal will generate an effective time and be The mandate ciphertext serviced based on 15 days and service identifiers obtains request.
In the present embodiment, user terminal can be communicated with authorization server by wireless network, wherein the channel radio Letter mode includes a variety of wireless access ways such as WLAN and mobile radio communication, if user terminal is using mobile logical Communication network, then can communicate for example, by modes such as short message or multimedia messages;If the side for the WLAN that user terminal uses Formula, then can be attached by client (such as wechat, QQ etc.) with authorization server.
In the present embodiment, user terminal will inquire about the clothes after receiving mandate ciphertext input by user and obtaining request Business identifies the mailing address of corresponding authorization server, and is communicatively coupled according to the mailing address with authorization server, after And authorization service request is sent to authorization server.
Alternatively, further included before S201:User terminal sends an authority to purchase (AP) instruction to authorization server, authorizes Server instructs to user terminal according to the authority to purchase (AP) and returns to an authority to pay link.Authorization server will detect the mandate Whether the corresponding delivery operation of payment link has been completed, if so, can will then pay successful token returns to user terminal, uses Family terminal will generate above-mentioned mandate ciphertext and obtain request according to the successful token of the payment.Authorization server will detect each use The mandate ciphertext that family terminal is sent obtains in instruction whether include the successful token of the payment, so that it is determined that the acquisition instruct whether Instructed for legal acquisition.If the mandate ciphertext is obtained in instruction comprising successful token is paid, the related behaviour of S202 is performed Make;It is invalid to user terminal range of requests if paying successful token conversely, not including in mandate ciphertext acquisition instruction Information, the mandate ciphertext of refusal respond user obtain instruction.
In the present embodiment, authentication terminal can provide multinomial service for user terminal, in order to distinguish each single item service, mirror It will be that each service distributes a service identifiers to weigh terminal, generate a service identifiers correspondence, and upload to authentication end Hold in corresponding server.User terminal will download the service identifiers correspondence by authorization server, in user's selection pair After the service answered, it will inquire about from the service identifiers correspondence list and obtain the corresponding service identifiers of the service, and be packaged in The mandate ciphertext is obtained in instruction.
In S202, the authorization server generates the mandate ciphertext and obtains according to default random ciphertext generating algorithm The corresponding mandate ciphertext of request is taken, and the mandate ciphertext is sent to the user terminal.
In the present embodiment, authorization server will be held after the mandate ciphertext for receiving user terminal transmission obtains request The generation operation of row ciphertext, extracts the mandate ciphertext and obtains the effective time that includes and service identifiers in request, and by above-mentioned two A parameter is imported into the random ciphertext generating algorithm of default volume, and it is close to have generated the mandate that the mandate ciphertext is obtained corresponding to request Text, and by user terminal and the established communication connection of authorization server, which is returned into user terminal.
In the present embodiment, which can be the ciphertext that character string is formed, and include but not limited to:Pure digi-tal password, word The female cipher code set combined with numeral or letter, numeral, meet the cipher code set collectively formed.The ciphertext can also be image ciphertext, Including but not limited to:Quick Response Code ciphertext graph picture, bar code ciphertext graph picture.The ciphertext can also be voice ciphertext, for example, by not this The voice signal that ciphertext is formed.
Alternatively, as described above, before S202, validity decision behaviour can also be carried out to authorizing ciphertext to obtain request Make.If authorization server identifies the acquisition, request is legal request, performs the relevant operation of S202;If conversely, authorize clothes Business device identifies that acquisition request is illegal request, then stops ciphertext generation operation.Alternatively, if authorization server receives together One user terminal continuously transmits repeatedly illegal mandate ciphertext and obtains request, and continuously transmits the number of illegal request more than default Threshold value, then disconnect the communication connection between the user's terminal, and identify that the user's terminal is illegal terminal, so as to no longer with its It is communicatively coupled, the service request for forbidding the illegal terminal to initiate.
In the present embodiment, user terminal will be provided with maximum waiting time, if the stand-by period is more than maximum waiting time The mandate ciphertext of authorization server return is not received yet, then user terminal will perform the relevant operation of S201 again, to award Power server, which re-issues, authorizes ciphertext, it is necessary to explanation, the ciphertext that user terminal is resend because the stand-by period exceeds The request mark in request is obtained, the request mark that should be sent with the moment before is consistent, so that authorization server identification receives Service request be the service request resend, and simultaneously non-user initiates a new mandate name ciphertext and obtains request again, The situation for avoiding repeating to send occurs.
In S203, authentication terminal receives the mandate ciphertext of the user terminal input, and passes through default ciphertext Whether the decipherment algorithm identification mandate ciphertext is legal;Wherein, the ciphertext decipherment algorithm is specially the random ciphertext generation The corresponding decipherment algorithm of algorithm.
In the present embodiment, user terminal can will authorize ciphertext input after the mandate ciphertext of server return is received To authentication terminal, to extend effective service duration of authentication terminal service identifiers corresponding with service.Specifically, authentication terminal is provided with Interactive module, such as the module such as touch screen, soft keyboard, the mandate ciphertext that user receives according to user terminal, in authentication terminal Interactive module in input the mandate ciphertext, authorize ciphertext input after the completion of, click on confirm instruction, authentication terminal by identify use Family, which has inputted, to be finished, and performs the relevant operation of S203.
In the present embodiment, authentication terminal be configured with authorization server to authorize ciphertext obtain request be encrypted with The corresponding decipherment algorithm of secret text generating algorithm, i.e. ciphertext decipherment algorithm, so as to which the ciphertext that user terminal inputs is decrypted Operation.If authentication terminal can be by ciphertext decipherment algorithm to authorizing ciphertext to be decrypted, then it represents that the mandate ciphertext is legal Ciphertext, performs the relevant operation of S204;Conversely, if authentication terminal can not be by the ciphertext decipherment algorithm to authorizing ciphertext to solve Close, that is, the data decrypted are unreadable, then it is illegal ciphertext to judge the mandate ciphertext, and it is whole to user to return to authorization failure information End.
Alternatively, in the present embodiment, authentication terminal can provide service for multiple users at the same time.Therefore, it is whole in user , it is necessary to which user terminal carries out register, the user's account for confirmation extended corresponding to service duration before end input mandate ciphertext Family.Preferably, for user terminal to during authorization server transmission mandate ciphertext acquisition request, user identifier is packaged in the acquisition please In asking, therefore during authorization server generation mandate ciphertext, operation also is encrypted in user identifier, so that authentication terminal directly connects Receive and grant power ciphertext and can determine that corresponding user account, carry out register without user, reduce the behaviour carried out needed for user Make.
In S204, if the mandate ciphertext is legal, the authentication terminal extraction is described to authorize what is included in ciphertext to have Imitate duration and service identifiers.
In the present embodiment, can if authentication terminal identifies that the mandate ciphertext is legal ciphertext by ciphertext decipherment algorithm With according to the service identifiers for authorizing ciphertext to determine this extended effective time of user terminal application and corresponding with service.It is optional Ground, as described above, user identifier can also be included by authorizing in ciphertext, in this case, S204 can also include:Authentication terminal root The user, which is logined, according to the user's mark identifies corresponding user account.
In the present embodiment, authentication terminal can be integrated in an equipment with providing the equipment of service, in this case, Authentication terminal can directly update corresponding effective service duration in local storage according to the effective time, and in effective service In the case that length is not zero, corresponding service is provided to the user.Authentication terminal can be respectively two with the equipment for providing service Different equipment, such as authentication terminal can be an external switch of the equipment for providing service, if user's initiation service please Ask and when authentication terminal judges that current service duration is more than zero, then open the starting switch of the equipment of the offer service or open to The instruction of shaking hands of the equipment, so that user can perform corresponding service operations by the equipment;Conversely, then it is not turned on offer service Equipment.
In S205, the authentication terminal updates effective clothes of the service identifiers corresponding with service according to the effective time Business duration.
In the present embodiment, authentication terminal record has the corresponding effective service duration of each service identifiers, and authentication terminal exists Receive after authorizing ciphertext and decrypting the corresponding service identifiers of mandate ciphertext and effective time, will be in the service identifiers pair On the basis of the effective service duration for answering service log, then this extended effective time of needs is superimposed, for example, authentication terminal is remembered Record have effective service duration of first service for 5 it is small when, and effective time that this request authorizes for 3 it is small when, then authentication terminal After performing S205, by the effective time of first service be updated to 8 it is small when, realize when can extend effective service without expire-services Long purpose.
Above as can be seen that a kind of authorization method provided in an embodiment of the present invention is sent out by user terminal to authorization server Send one authorize ciphertext obtain request, with will pass through authorization server get can use authentication terminal built-in services mandate Ciphertext.Authorization server will request to generate one after the mandate ciphertext for receiving user obtains request according to the mandate ciphertext Meet predetermined encryption mode and possess the effective time information of request mandate and the mandate ciphertext of service identity information, and return To user terminal.The mandate ciphertext can be then input to authentication terminal, authentication terminal by user terminal after mandate ciphertext is received If recognizing the mandate ciphertext can be decrypted by default decipherment algorithm, it by it is legal mandate ciphertext to be, and Effective service duration of service identifiers corresponding with service in the mandate ciphertext is updated, after being zero without effective service duration, It can carry out renewing operation, effective service duration of a certain service under authentication terminal free position, can be extended, reduce because of clothes Business expires and causes the probability of happening of service disruption, also reduce further the difficulty for renewing operation of user, improves user Usage experience.
Fig. 3 shows a kind of specific implementation flow chart for authorization method S203 that second embodiment of the invention provides.Referring to Shown in Fig. 3, relative to embodiment described in Fig. 2, a kind of authorization method S203 provided in this embodiment includes S301 and S302, in detail State as follows:
Further, the mandate ciphertext is specially image in 2 D code, and it is defeated that the authentication terminal receives the user terminal The mandate ciphertext entered, and identify whether the mandate ciphertext is legal, specifically includes by default ciphertext decipherment algorithm:
In S301, the authentication terminal scans the image in 2 D code of the user terminal displays, obtains described two The information that dimension code image includes.
In the present embodiment, authentication terminal is provided with the scan module for scanning the two-dimensional code.User terminal is receiving Authorization server return mandate ciphertext, i.e., after image in 2 D code, by the display module set by user terminal show this two Code image is tieed up, wherein, which can be display screen or projection module etc..Then, user can be by user terminal close to mirror Terminal is weighed, and the image in 2 D code of display is aligned to the scan module of authentication terminal, when the scan module of authentication terminal is blocked When, then scan operation is activated, obtains the image in 2 D code of the user's terminal.
In the present embodiment, which is specially after default random ciphertext generating algorithm is encrypted Image in 2 D code, therefore after authentication terminal scans the two-dimensional code image by scan module, what is obtained will be encrypted information, because This, terminal device will perform the operation of S302, to determine the content corresponding to the encrypted information.
In the present embodiment, due to scan module cost compared with the cost of interactive module it is relatively low, Therefore the cost of authentication terminal complete machine can be saved.On the other hand, the space shared by scan module is also relatively small, also allows for applying In on the authentication terminal of small volume.
In S302, the authentication terminal by the ciphertext decipherment algorithm to the information that the image in 2 D code includes into Row decryption obtains universal resource locator (Uniform Resource Locator, URL), parses whether the URL is legal URL。
In the present embodiment, the information that the image in 2 D code got includes is imported into ciphertext decipherment algorithm by authentication terminal In, to determine the URL corresponding to the information that includes of the image in 2 D code.Each image in 2 D code is substantially by same resource Finger URL URL is converted to the process of image, thus each image in 2 D code can correspond to a URL.Authorization server will need to award The effective time and service identifiers of power are recorded in the corresponding memory spaces of the URL.Therefore, authentication terminal is somebody's turn to do in decryption After the URL of image in 2 D code, the corresponding memory spaces of the URL are will jump to, whether are inquired about in the memory space according to appointing in advance Fixed storage rule is stored with effective time and the corresponding service identifiers that request authorizes.
Alternatively, in the present embodiment, whether authentication terminal parsing URL is that legal URL is specifically included:Authentication terminal according to Decrypt obtained URL and jump to the network address that the URL is specified, it is then determined that whether the network is under the jurisdiction of the conjunction of authorization server Method network address, if so, then identifying that the URL is legal URL, performs the relevant operation of S204;If the network address redirected belongs to The local address of authentication terminal or the network address of instruction are not to be under the jurisdiction of the legitimate network address of authorization server, then judging should URL is illegal URL.
In embodiments of the present invention, authentication terminal is used as the Quick Response Code for authorizing ciphertext by scan module acquisition user terminal Image, and judge whether the corresponding URL of the image in 2 D code is legal URL by ciphertext decipherment algorithm, so as to fulfill to authorizing The purpose of the identification of ciphertext, reduces the input operation of user, directly by the i.e. recognizable legitimacy of scanning, improves mandate effect Rate.
Fig. 4 shows a kind of specific implementation flow chart for authorization method that third embodiment of the invention provides.Referring to Fig. 4 institutes Show, relative to embodiment described in Fig. 2, S204 in a kind of authorization method provided in this embodiment, including S401~S402, it is described in detail such as Under:
Further, the mandate ciphertext is specially authorization code, and the authentication terminal receives the user terminal input The mandate ciphertext, and identify whether the mandate ciphertext is legal, specifically includes by default ciphertext decipherment algorithm:
In S401, the user terminal establishes communication channel with the authentication terminal.
In the present embodiment, user terminal will establish a dedicated communication channel with authentication terminal, which can Think wireline communication channels, or radio communication channel.
If that is established between user terminal and authentication terminal passes through data for wireline communication channels, specially user terminal Transmission line is connected with authentication device, which can be that USB interface transmission line or Serial Port Transmission line etc. possess data biography The data cable of transmission function.In this case, only corresponding communication interface need to be set on authentication terminal, such as USB interface or serial interface Mouthful, then user terminal can be attached thereto by matching data line.
If established between user terminal and authentication terminal for radio communication channel, be specifically as follows authentication terminal and perform fighting Wireless communication module, the corresponding wireless signal of transmitting authentication terminal, user terminal pass through wireless mould corresponding with the wireless signal Block search is to after the wireless signal, you can establishes radio communication channel.Specifically, which can be:Bluetooth mould Block, low-power consumption bluetooth module, ZigBee communication module, WIFI communication modules etc..
In S402, authorization code input by user is sent to the authentication by the user terminal by the communication channel Terminal.
In the present embodiment, due to can be carried out data transmission between user terminal and authentication terminal by communication channel, Therefore, corresponding interactive interface need not be set on authentication terminal, it is seen that the transition of operation of user's input authorization code to user terminal Upper progress.After the completion of the communication channel between user terminal and authentication terminal is established, the current display interface of user terminal Authorization code inputting interface is will jump to, for user after the authorization code inputting interface completes input operation, user terminal is defeated by this Enter the key information that operation collects and be converted to authorization code, and be sent to authentication terminal.
Alternatively, in the present embodiment, after user terminal and authentication terminal establish communication channel, authentication terminal will pass through The authorization code returned in the buffer zone of communication channel inquiry user terminal with the presence or absence of server.If in the presence of directly reading Take the authorization code and be automatically filled in authorization code inputting interface, so as to reduce the input operation of user.
In S403, the authentication terminal identifies whether the authorization code is legal by the ciphertext decipherment algorithm.
In the present embodiment, authentication terminal can lead to after user terminal is received by the authorization code of traffic channel Cross default ciphertext decipherment algorithm and operation be decrypted to the authorization code, if can successful decryption, judge the authorization code for close Method authorization code;If conversely, the coding rule of authorization code decryption rule corresponding with the ciphertext decipherment algorithm mismatches, then it represents that Can not successful decryption, it is illegal authorization code to judge the authorization code.
In embodiments of the present invention, interactive interface need not be set on authentication terminal, only communication module need to be set, be multiplexed The interactive interface of user terminal, so as to greatly reduce the cost of authentication terminal.
Fig. 5 shows a kind of specific implementation flow chart for authorization method that fourth embodiment of the invention provides.Referring to Fig. 5 institutes Show, relative to embodiment described in Fig. 2 to Fig. 4, a kind of authorization method provided in this embodiment, can also include S501~S503, Details are as follows:
In S501, if the authentication terminal receives Client-initiated device service request, the effectively clothes are detected Whether duration be engaged in more than 0.
In the present embodiment, authentication terminal can respond Client-initiated device service request, wherein the device service request In include service identifiers, for specify needed for provide service type.Wherein, the specific side of Client-initiated device service request Formula can be:User is communicatively coupled by user terminal and authentication terminal, establishes communication channel, and point on the subscriber terminal Corresponding service icon is hit, user terminal encapsulates the service identifiers according to the corresponding service identifiers of service Iconic queries In in device service request, and the device service request is sent to authentication terminal.
Alternatively, can also include before S501:Authentication terminal receives user information input by user, and according to the use Family information registration obtains the corresponding effectively service duration list of the user's account to corresponding user account, and then basis should Effective service duration list, determines effective service duration of the corresponding service identifiers of device service request, and detect effective clothes Whether business duration is 0, if detecting, effective service duration is less than or equal to 0, performs the relevant operation of S502;If conversely, inspection Effective service duration is measured more than 0, then performs the relevant operation of S503.
In S502, if the effectively service duration is less than or equal to 0, the authentication terminal is not responding to the equipment clothes Business request.
In the present embodiment, it is small to recognize the corresponding effectively service duration of Client-initiated device service request for authentication terminal In or equal to 0, then it represents that after the service that user buys or leases has expired, it is necessary to renew, extend effective service duration It can be continuing with the service corresponding to the device service request.Therefore, in this case, authentication terminal does not respond to user's hair The device service request risen.
Wherein, this is not responding to device service request and is specially:Stop authentication device and perform the service corresponding function module, and The information of an expire-services is returned to prompt user to buy service duration again to user.
Illustratively, which is automatic water-drinking or feeding equipment, and the ciphertext that authorization server buys user is sent out Give user terminal, user terminal manually inputs, phonetic entry, I2C universal serial bus, serial paralled interface, USB, TYPE-C, indigo plant Tooth, WIFI, 433 or two-dimensional code scanning input etc. mode, be input to authentication terminal, the ciphertext include user apply authorize have Duration is imitated, wherein, which is drinking-water or food throwing machine in the present embodiment, and drinking-water or food throwing machine are by the effective time It is added to original effective service duration, with effective service duration after being updated, and is exported by display module to user. If receiving, user initiates feeding enabled instruction and effective service duration is more than 0, and food throwing machine control motor launches feed;If have Imitate service duration and be less than 0, then close effective output order or cut-out equipment master control power supply and motor, stop launching feed, directly Authorized again to user, extend effective service duration.
Illustratively, which is embedded in the combination of other service equipments, and the ciphertext that authorization server buys user is sent out Give user terminal, user terminal manually inputs, phonetic entry, I2C universal serial bus, serial paralled interface, USB, TYPE-C, indigo plant Tooth, WIFI, 433 or two-dimensional code scanning input etc. mode, be input to authentication terminal, the ciphertext include user apply authorize have Duration is imitated, when the authentication terminal and other equipment communicate, can be used:I2C universal serial bus, serial paralled interface, USB, TYPE-C, bluetooth, The various ways such as WIFI, 433 carry out carrying out shake communication.So as to control the effective time of the service equipment or directly be set using control The effective time pattern of stand-by power source.
In S503, if the effectively service duration is more than 0, the authentication terminal responds the device service request.
In the present embodiment, if authentication terminal detects that effective service duration is more than 0, then it represents that user still has permission can To use the authentication terminal, therefore, authentication terminal will respond the device service request, there is provided the corresponding clothes of the device service request Business.
In embodiments of the present invention, whether authentication terminal can be more than 0 according to effective service duration of user, it is determined whether The service that response user is initiated, so as to fulfill the purpose of automatic management lease service function.
Fig. 6 shows a kind of specific implementation flow chart for authorization method that fifth embodiment of the invention provides.Referring to Fig. 6 institutes Show, relative to Fig. 5 the embodiment described, if in effective service duration in a kind of authorization method provided in this embodiment More than 0, then after the authentication terminal responds the device service request, S604~S606 is further included, details are as follows:
Since S601~S603 is identical with the implementation of S501~S503, it is specifically described and can be found in S501~S503 Associated description, details are not described herein.
Further, if being more than 0 in the effectively service duration, the authentication terminal responds the device service After request, further include:
In S604, the authentication terminal record provides the service duration of the service.
In the present embodiment, authentication terminal is more than in the corresponding effectively service duration of the requested service of definite user terminal After 0, then Client-initiated device service request can be responded, there is provided the corresponding service of the device service request, and record mirror in real time Power terminal provides this service corresponding service duration.Specifically, authentication terminal obtains this at predetermined intervals Duration is serviced, and performs the relevant operation of S605.
Alternatively, in the present embodiment, if user is after corresponding service operations are completed, one can be sent to authentication terminal Service stopping instruct, in this case, authentication terminal will stop calculate the service duration, and according to effective service duration with And service stopping instruction moment corresponding service duration is received, determine the remaining service duration of user, and by the residue Service duration is as the corresponding effective service duration of the service after renewal, so that user can stop servicing at any time, and user In the case of service, authentication terminal will not carry out Clocked operation to service.
In S605, the authentication terminal calculates the difference between the effectively service duration and the service duration Value, obtains remaining service duration.
In the present embodiment, after authentication terminal goes service duration after, then calculate effective service duration and held with service Difference between continuous duration, determines whether user still possesses the service that authority uses authentication terminal to provide.Specifically, if when remaining It is long to be more than 0, then it represents that the access right of user is still not out of date, can continue offer service, continues to execute service response operation;Instead It, if residual time length is less than or equal to 0, then it represents that the access right of user is out of date, haves no right to be continuing with authentication terminal offer Service, perform the relevant operation of S606.
Alternatively, in the present embodiment, authentication terminal calculate residual time length mode can according in set one fall Timer, records remaining effective time in real time.The mode of realization is specially:Authentication terminal please in the device service for receiving user Ask and determine that effective service duration of user is more than 0, then the initial value using effective service duration as the count-down device, Authentication terminal opens the count-down device at the time of providing service, carry out countdown, obtains remaining effective time in real time.
In S606, if the residue service duration is less than or equal to 0, the authentication terminal stops providing the clothes Business.
In the present embodiment, authentication terminal monitors the remaining service duration that S605 is calculated in real time, if the residue services Duration is less than or equal to 0, then stops providing the service, specifically, that is, stops performing the corresponding function module of the service, until this After user regains the authority using the service, the device service request of user is just responded again.
In embodiments of the present invention, authentication terminal just updates effective service duration only when user is using servicing, so that Duration based accounting need not be carried out when user is without using service, improves flexibility of the user using service.
It is to be understood that the size of the sequence number of each step is not meant to the priority of execution sequence, each process in above-described embodiment Execution sequence should determine that the implementation process without tackling the embodiment of the present invention forms any limit with its function and internal logic It is fixed.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work( Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used To be that unit is individually physically present, can also two or more units integrate in a unit, it is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.In addition, each function list Member, the specific name of module are not limited to the protection domain of the application also only to facilitate mutually distinguish.Said system The specific work process of middle unit, module, may be referred to the corresponding process in preceding method embodiment, details are not described herein.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and is not described in detail or remembers in some embodiment The part of load, may refer to the associated description of other embodiments.
Those of ordinary skill in the art may realize that each exemplary list described with reference to the embodiments described herein Member and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, application-specific and design constraint depending on technical solution.Professional technician Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed The scope of the present invention.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical location, you can with positioned at a place, or can also be distributed to multiple In network unit.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to foregoing reality Example is applied the present invention is described in detail, it will be understood by those of ordinary skill in the art that:It still can be to foregoing each Technical solution described in embodiment is modified, or carries out equivalent substitution to which part technical characteristic;And these are changed Or replace, the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical solution, should all Within protection scope of the present invention.

Claims (10)

1. a kind of authorization method, applied to authoring system, it is characterised in that the authorization method includes:
User terminal is sent to authorization server authorizes ciphertext to obtain request;Wherein, the mandate ciphertext obtains includes in request Ask effective time and the service identifiers authorized;
The authorization server generates the mandate ciphertext acquisition and asks corresponding award according to default random ciphertext generating algorithm Ciphertext is weighed, and the mandate ciphertext is sent to the user terminal;
Authentication terminal receives the mandate ciphertext of the user terminal input, and identifies institute by default ciphertext decipherment algorithm State and authorize ciphertext whether legal;Wherein, the ciphertext decipherment algorithm is specially the corresponding decryption of the random ciphertext generating algorithm Algorithm;
If the mandate ciphertext is legal, the authentication terminal extraction is described to authorize the effective time included in ciphertext and service Mark;
The authentication terminal updates effective service duration of the service identifiers corresponding with service according to the effective time.
2. authorization method according to claim 1, it is characterised in that the mandate ciphertext is specially image in 2 D code, institute The mandate ciphertext that authentication terminal receives the user terminal input is stated, and by described in the identification of default ciphertext decipherment algorithm Authorize ciphertext whether legal, specifically include:
The authentication terminal scans the image in 2 D code of the user terminal displays, obtains what the image in 2 D code included Information;
The authentication terminal is decrypted by the information that the ciphertext decipherment algorithm includes the image in 2 D code and is united One Resource Locator URL, parses whether the URL is legal URL.
3. authorization method according to claim 1, it is characterised in that the mandate ciphertext is specially authorization code, the mirror Weigh terminal and receive the mandate ciphertext of the user terminal input, and the mandate is identified by default ciphertext decipherment algorithm Whether ciphertext is legal, specifically includes:
The user terminal establishes communication channel with the authentication terminal;
Authorization code input by user is sent to the authentication terminal by the user terminal by the communication channel;
The authentication terminal identifies whether the authorization code is legal by the ciphertext decipherment algorithm.
4. according to claim 1-3 any one of them authorization methods, it is characterised in that further include:
If the authentication terminal receives Client-initiated device service request, detect whether the effectively service duration is more than 0;
If the effectively service duration is less than or equal to 0, the authentication terminal is not responding to the device service request;
If the effectively service duration is more than 0, the authentication terminal responds the device service request.
5. authorization method according to claim 4, it is characterised in that if being more than 0 in the effectively service duration, After the authentication terminal responds the device service request, further include:
The authentication terminal record provides the service duration of the service;
The authentication terminal calculates the difference between the effectively service duration and the service duration, obtains remaining service Duration;
If the residue service duration is less than or equal to 0, the authentication terminal stops providing the service.
6. a kind of authoring system, it is characterised in that the authoring system includes:Authorization server, user terminal and authentication are eventually End;
The user terminal, authorizes ciphertext to obtain request for being sent to authorization server;Wherein, the mandate ciphertext, which obtains, asks The effective time and service identifiers authorized in asking comprising request;
The authorization server, for according to default random ciphertext generating algorithm, generating the mandate ciphertext and obtaining request pair The mandate ciphertext answered, and the mandate ciphertext is sent to the user terminal;
The authentication terminal, for receiving the mandate ciphertext of the user terminal input, and is decrypted by default ciphertext Whether the algorithm identification mandate ciphertext is legal;Wherein, the ciphertext decipherment algorithm is specially the random ciphertext generating algorithm Corresponding decipherment algorithm;
The authentication terminal, if legal for the mandate ciphertext, extract in the mandate ciphertext effective time that includes with And service identifiers;
The authentication terminal, for updating effective service duration of the service identifiers corresponding with service according to the effective time.
7. authoring system according to claim 6, it is characterised in that the mandate ciphertext is specially image in 2 D code, institute Authentication terminal is stated, for receiving the mandate ciphertext of the user terminal input, and is known by default ciphertext decipherment algorithm Whether not described mandate ciphertext is legal, specifically includes:
The authentication terminal, for scanning the image in 2 D code of the user terminal displays, obtains the image in 2 D code Comprising information;
The authentication terminal, the information for being included by the ciphertext decipherment algorithm to the image in 2 D code are decrypted To uniform resource position mark URL, parse whether the URL is legal URL.
8. authoring system according to claim 6, it is characterised in that the mandate ciphertext is specially authorization code, the mirror Terminal is weighed, for receiving the mandate ciphertext of the user terminal input, and institute is identified by default ciphertext decipherment algorithm State and authorize ciphertext whether legal, specifically include:
The user terminal, for establishing communication channel with the authentication terminal;
The user terminal, for authorization code input by user to be sent to the authentication terminal by the communication channel;
The authentication terminal, for identifying whether the authorization code is legal by the ciphertext decipherment algorithm.
9. according to claim 6-8 any one of them authoring systems, it is characterised in that further include:
The authentication terminal, if for receiving Client-initiated device service request, detecting the effectively service duration is It is no to be more than 0;
The authentication terminal, if being less than or equal to 0 for the effectively service duration, is not responding to the device service request;
The authentication terminal, if being more than 0 for the effectively service duration, responds the device service request.
10. authoring system according to claim 9, it is characterised in that in the authentication terminal, if having for described Imitate service duration and be more than 0, then after responding the device service request, further include:
The authentication terminal, the service duration of the service is provided for recording;
The authentication terminal, for calculating the difference between the effectively service duration and the service duration, is remained Remaining service duration;
The authentication terminal, if being less than or equal to 0 for the remaining service duration, stops providing the service.
CN201711205512.1A 2017-11-27 2017-11-27 Authorization method and system thereof Active CN108023727B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711205512.1A CN108023727B (en) 2017-11-27 2017-11-27 Authorization method and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711205512.1A CN108023727B (en) 2017-11-27 2017-11-27 Authorization method and system thereof

Publications (2)

Publication Number Publication Date
CN108023727A true CN108023727A (en) 2018-05-11
CN108023727B CN108023727B (en) 2021-04-09

Family

ID=62077384

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711205512.1A Active CN108023727B (en) 2017-11-27 2017-11-27 Authorization method and system thereof

Country Status (1)

Country Link
CN (1) CN108023727B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109523948A (en) * 2018-12-28 2019-03-26 深圳市奥拓电子股份有限公司 LED display authentication control method, LED display and storage medium
CN109889342A (en) * 2018-12-15 2019-06-14 中国平安人寿保险股份有限公司 Interface testing method for authenticating, device, electronic equipment and storage medium
CN111224955A (en) * 2019-12-25 2020-06-02 中国平安人寿保险股份有限公司 Service response method and system
CN111710404A (en) * 2020-05-31 2020-09-25 南京麦澜德医疗科技有限公司 Method for authorizing and using equipment
CN114861154A (en) * 2022-07-04 2022-08-05 荣耀终端有限公司 Collaborative login method
CN116992424A (en) * 2023-09-28 2023-11-03 杭州行至云起科技有限公司 Authorization code using method, device and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050238325A1 (en) * 2004-04-09 2005-10-27 Sony Corporation Content reproduction apparatus, program, and content reproduction control method
CN102143468A (en) * 2010-09-25 2011-08-03 华为软件技术有限公司 Method and system for charging, tariff update and service provision
CN102546648A (en) * 2012-01-18 2012-07-04 Ut斯达康通讯有限公司 Resource access authorization method
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN106412108A (en) * 2016-11-09 2017-02-15 深圳云联讯数据科技有限公司 Cloud platform architecture-based user data deployment method and system
CN106921617A (en) * 2015-12-25 2017-07-04 腾讯科技(深圳)有限公司 Common equipment reservation control method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050238325A1 (en) * 2004-04-09 2005-10-27 Sony Corporation Content reproduction apparatus, program, and content reproduction control method
CN102143468A (en) * 2010-09-25 2011-08-03 华为软件技术有限公司 Method and system for charging, tariff update and service provision
CN102546648A (en) * 2012-01-18 2012-07-04 Ut斯达康通讯有限公司 Resource access authorization method
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN106921617A (en) * 2015-12-25 2017-07-04 腾讯科技(深圳)有限公司 Common equipment reservation control method and device
CN106412108A (en) * 2016-11-09 2017-02-15 深圳云联讯数据科技有限公司 Cloud platform architecture-based user data deployment method and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889342A (en) * 2018-12-15 2019-06-14 中国平安人寿保险股份有限公司 Interface testing method for authenticating, device, electronic equipment and storage medium
CN109889342B (en) * 2018-12-15 2023-07-18 中国平安人寿保险股份有限公司 Interface test authentication method and device, electronic equipment and storage medium
CN109523948A (en) * 2018-12-28 2019-03-26 深圳市奥拓电子股份有限公司 LED display authentication control method, LED display and storage medium
CN111224955A (en) * 2019-12-25 2020-06-02 中国平安人寿保险股份有限公司 Service response method and system
CN111224955B (en) * 2019-12-25 2023-02-03 中国平安人寿保险股份有限公司 Service response method and system
CN111710404A (en) * 2020-05-31 2020-09-25 南京麦澜德医疗科技有限公司 Method for authorizing and using equipment
CN111710404B (en) * 2020-05-31 2024-01-23 南京麦澜德医疗科技股份有限公司 Equipment authorization using method
CN114861154A (en) * 2022-07-04 2022-08-05 荣耀终端有限公司 Collaborative login method
CN114861154B (en) * 2022-07-04 2023-04-11 荣耀终端有限公司 Collaborative login method
CN116992424A (en) * 2023-09-28 2023-11-03 杭州行至云起科技有限公司 Authorization code using method, device and system
CN116992424B (en) * 2023-09-28 2024-02-02 杭州行至云起科技有限公司 Authorization code using method, device and system

Also Published As

Publication number Publication date
CN108023727B (en) 2021-04-09

Similar Documents

Publication Publication Date Title
CN108023727A (en) A kind of authorization method and its system
CN108496382B (en) Secure information transmission system and method for personal identity authentication
CN104253784B (en) Method, system, third party's terminal and the interconnected server for logging in and authorizing
CN104169935B (en) Information processor, information processing system, information processing method
JP4382498B2 (en) Instant login user authentication and settlement method using heterogeneous communication network and system thereof
EP1681828A1 (en) An access information relay device, a network device, an access information managing device, a resource managing device and an access control system
CN104936178A (en) Wireless power transmitting devices, methods for signaling access information for a wireless communication network and method for authorizing a wireless power receiving device
CN103733599A (en) Apparatus and method for supporting family cloud in cloud computing system
CN109474595B (en) Electronic equipment binding method, electronic equipment, mobile terminal and server
TW200806034A (en) Method for access control to a scrambled content
KR20120122616A (en) Method and apparatus for providing service
CN103095457A (en) Login and verification method for application program
CN104412561A (en) Voucher authorization for cloud server
WO2017206524A1 (en) Electronic device control method, terminal and control system
US8863241B2 (en) System and method for managing usage rights of software applications
CN114760112A (en) Wireless local area network-oriented intelligent household equipment network access method, system, equipment and storage medium
CN110224971B (en) Method, authorization server, system, device and storage medium for authorizing login
JP2009075987A (en) Network content management method, content server, reproduction equipment, authentication server, and authentication terminal
JP4239066B2 (en) Cloning prevention method
CN102264069B (en) Authentication control method, device and system based on universal guide architecture
JP5178128B2 (en) Communications system
KR20100136306A (en) System and method for registering otp creation condition for mobile settlement and recording medium
KR101842678B1 (en) Payment control apparatus and payment server
CN106161187B (en) Method, equipment and system for providing public information service based on instant message
US9071617B2 (en) Method and apparatus for disclosing personal network information in converged personal network service environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant