Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method, terminal and server for obtaining terminal authorization

A server and receiving server technology, applied in the field of communication, can solve problems such as unstable terminal use, lack of official approval, and decreased security

Active Publication Date: 2013-06-12
MEIZU TECH CO LTD
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, since the key information is directly stored locally, it is easy to cause a decrease in security due to the cracking of local data.
[0004] The methods for obtaining terminal ROOT authority in the prior art are generally more complicated, and the existing ROOT methods are often provided unofficially, which are not officially recognized, and there are also risks such as causing unstable use of the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, terminal and server for obtaining terminal authorization
  • Method, terminal and server for obtaining terminal authorization
  • Method, terminal and server for obtaining terminal authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] The present invention provides a method for obtaining terminal authority, such as figure 1 As shown, the method includes:

[0056] 101. Receive the public key provided by the server that matches the private key generated by the server;

[0057] 102. Receive and send the user's identity information to the server;

[0058] 103. Receiving the identity confirmation information fed back by the server according to the identity information;

[0059] 104. Receive an instruction input by the user to acquire terminal authority;

[0060] 105. Send the identification information of the terminal to the server according to the instruction and the identity confirmation information;

[0061] 106. Receive the permission information sent by the server and encrypted with the private key signature according to the identification information and fed back to the terminal;

[0062] 107. Use the public key to decrypt the authority information to obtain the terminal authority.

[0063] Whe...

Embodiment 2

[0073] The present invention also provides a method for feeding back permission information to the terminal, such as figure 2 As shown, the method includes:

[0074] 201. Generate a public key and a private key matching the public key;

[0075] 202. Provide the public key to the terminal;

[0076] 203. Receive the user's identity information sent by the terminal;

[0077] 204. Feedback identity confirmation information to the terminal according to the identity information;

[0078] 205. Receiving terminal identification information sent by the terminal according to the instruction for acquiring terminal authority and identity confirmation information input by the user;

[0079] That is, if the user needs to obtain the terminal authority, he can input an instruction to the terminal to obtain the terminal authority. After receiving the instruction and the identity confirmation information, the terminal sends the identification information of the terminal to the server accord...

Embodiment 3

[0091] The present invention also provides a terminal, such as image 3 As shown, the terminal includes:

[0092] Decryption unit 301, configured to receive a public key provided by the server that matches the private key generated by the server;

[0093] An identity information unit 302, configured to receive and send the user's identity information to the server;

[0094] The identity information unit 302 is also used to receive identity confirmation information fed back by the server;

[0095] A terminal authority acquiring unit 303, configured to receive an instruction input by a user to acquire terminal authority;

[0096] The terminal authority acquisition unit 303 is configured to send the identification information of the terminal to the server according to the above instruction and the identity confirmation information received by the identity information unit 302;

[0097] The decryption unit 301 is further configured to receive permission information sent by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of communication, and discloses a method, a terminal and a server for obtaining the terminal authorization. The method comprises the following steps of receiving a public key, which is matched with a private key generated by a server and is provided by the server; receiving and sending the identity information of a user to the server; receiving identity confirming information fed from the server; receiving a command which is input by a user for obtaining the terminal authorization; according to the command and the identity confirming information, sending terminal identification information to the server; receiving the authorization information which is sent by the server and fed to the terminal by the private key according to the identification information; and deciphering the authorization information by the public key to obtain the terminal authorization. When the embodiment of the invention is implemented, the method for obtaining the authorization can be simplified, and the key breaking risk is effectively avoided, thereby being safer and more reliable.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method for obtaining terminal authority, a terminal and a server. Background technique [0002] In the use of user terminals (such as mobile phones and other devices), it is often necessary to obtain some special permissions. For example, when changing the security settings of mobile phones, it is generally necessary to verify the PIN code (Personal Identification Number, personal identification password); Some operations must obtain ROOT (super user) authority. [0003] In the prior art, a local authentication method is provided, in which the key information is directly stored locally, and when an instruction input by the user is received, it is compared with the key information locally, and if the comparison is successful, the local authentication Right to pass. In this approach, since the key information is directly stored locally, it is easy to cause a decr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 马麟梁东明
Owner MEIZU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products