SDK verification method based on elliptic equation
An elliptic equation and verification method technology, applied in the field of information security, can solve problems such as security authorization algorithm, hacker cracking, and inability to provide
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] combine figure 1 , this embodiment provides an SDK authorization algorithm based on ellipse authentication, which specifically includes: Step 101: register the application program unit to be authorized at the server end, submit the fingerprint of the application program unit to be authorized, generate a public key y, and generate a public key y corresponding to the The large number corresponding to the above fingerprint;
[0028] Step 102: The client fills in the public key y, obtains the fingerprint of the application unit to be authorized, and decomposes the large number corresponding to the fingerprint according to the impact factor unit;
[0029] Step 103: the client sends an impact factor unit to the server;
[0030] Step 104: The server receives the client flag as an impact factor unit, generates a large number for the fingerprint, and decomposes it into a prime number a and a prime number b according to the impact factor in the impact factor unit;
[0031] Step...
Embodiment 2
[0039] combine image 3 , this embodiment provides an elliptic equation-based SDK verification method, specifically including:
[0040] Step 201: Register the application unit to be authorized at the server, submit the fingerprint of the application unit to be authorized, generate a public key y, and generate a large number corresponding to the fingerprint;
[0041] Step 202: The client fills in the public key y, obtains the fingerprint of the application program unit to be authorized, and decomposes the large number corresponding to the fingerprint according to the impact factor unit;
[0042] Step 203: the client sends an impact factor unit to the server;
[0043] Step 204: The server receives the client flag as an impact factor unit, generates a large number for the fingerprint, and decomposes it into a prime number a and a prime number b according to the impact factor in the impact factor unit;
[0044] Step 205: The influence factor unit of the server grows according to t...
Embodiment 3
[0066] combine image 3 , on the basis of Embodiment 1, this embodiment is an application embodiment, the application program unit to be authorized in this embodiment is APP, and the impact factor unit has an impact factor.
[0067] Step 301: Register the APP to be authorized on the server side, submit the APP fingerprint, generate a public key y, and generate a large number corresponding to the fingerprint;
[0068] Step 302: The client fills in the public key, obtains the APP fingerprint, and decomposes the large number corresponding to the fingerprint according to the impact factor;
[0069] Here, step 301 and step 302 are carried out simultaneously, and the sequence part is before and after.
[0070] Step 303: the client sends the impact factor to the server;
[0071] Step 304: The server receives the client's mark bit as an impact factor, generates a large number for the fingerprint, and decomposes it into prime numbers a and b according to the impact factor;
[0072] ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


