Information processing method, client, and server

An information processing method and server technology, applied in electrical components, transmission systems, etc., can solve the problems of inability to perform authentication normally, the authentication process is time-consuming, and the authentication response is not timely enough, so as to reduce the pressure on servers and bandwidth costs, Time-saving, highly reliable results

Active Publication Date: 2015-08-12
TENCENT TECH (BEIJING) CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the cloud authentication method requires multiple network interactions between the client and the cloud, the authentication process is time-consuming, and the authentication response is not timely enough; in addition, the cloud authentication method is limited by the network status Uncertainty, when the network condition is bad or there is no network connection, the authentication cannot be performed normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method, client, and server
  • Information processing method, client, and server
  • Information processing method, client, and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] An information processing method provided by Embodiment 1 of the present invention is applied to a client requesting to use the SDK, such as: a client of a third-party application developer requesting to use the SDK, etc.; figure 1 As shown, the method mainly includes:

[0064] Step 101, sending the first information of the application using the SDK to the server; wherein, the first information is used to uniquely identify the application, and the first information is used by the server to determine the legality.

[0065] Since the method in Embodiment 1 of the present invention is applied to a client requesting to use the SDK, step 101 can also be described as: the client sends the first information of its own application using the SDK to the server.

[0066] Every application that needs to use the SDK must pass the authentication of the authentication system, and the authentication needs to provide the first information of the application.

[0067] In a preferred emb...

Embodiment 2

[0110] An information processing method provided by Embodiment 2 of the present invention is applied to the background server of the SDK provider, such as figure 2 As shown, the method mainly includes:

[0111] Step 201, receiving the first information of the application using the SDK sent by the client; wherein, the first information is used to uniquely identify the application, and the first information is used as the basis for the server to determine the legality of the application .

[0112] Since the method in Embodiment 1 of the present invention is applied to the background server of the SDK provider, step 201 can also be described as: the server receives the first information of the application using the SDK sent by the client.

[0113] Every application that needs to use the SDK must pass the authentication of the authentication system, and the authentication needs to provide the first information of the application to the background server of the SDK provider.

[...

Embodiment 3

[0138] Corresponding to the method in Embodiment 1 of the present invention, Embodiment 3 of the present invention also provides a client, such as image 3 As shown, it mainly includes: a first sending unit 31, a first receiving unit 32 and an authentication unit 33; wherein,

[0139] The first sending unit 31 is configured to send the first information of the application using the SDK to the server; wherein, the first information is used to uniquely identify the application, and the first information is used by the server to perform legal sex identification;

[0140] The first receiving unit 32 is configured to receive the second information returned by the server when the first information is determined to be legal, and the second information is generated after being encrypted according to the first information; wherein, the second information is used as a client local authentication;

[0141] The authentication unit 33 is configured to decrypt the received second informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information processing method, a client, and a server. The information processing method is characterized in that first information adopting a software development kit (SDK) can be transmitted to the server; second information returned by the server can be received, when the first information is defined as legal, and the second information can be generated after the encryption of the first information; third information can be acquired by decrypting the received second information according to a decryption key from the server, and by comparing the third information with the first information, the authentication result can be acquired.

Description

technical field [0001] The present invention relates to authentication technology in the field of information security, in particular to an information processing method, a client and a server. Background technique [0002] At present, many software services on the market are provided to third-party software developers in the form of SDK (Software Development Kit). In order to prevent the SDK from being stolen, it is usually necessary to use an authentication system to authenticate the client using the SDK. right. The existing authentication system implements the authentication of the client through cloud authentication, that is, the client sends an authentication key (key) to the cloud, and the cloud determines whether the client is legal through authentication. [0003] However, the cloud authentication method requires multiple network interactions between the client and the cloud, the authentication process is time-consuming, and the authentication response is not timely...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 左洪涛
Owner TENCENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products