Unlock instant, AI-driven research and patent intelligence for your innovation.

SDK verification method based on elliptic equation

An elliptic equation and verification method technology, applied in the field of information security, can solve problems such as security authorization algorithm, hacker cracking, and inability to provide

Active Publication Date: 2017-02-08
康泰智爱(北京)医疗控股有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing mobile application usage scenarios, users need to register a set of login information for different mobile applications, or use third-party applications such as WeChat and QQ to log in, which is easy to be cracked by hackers and cannot provide a more secure authorization algorithm.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SDK verification method based on elliptic equation
  • SDK verification method based on elliptic equation
  • SDK verification method based on elliptic equation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] combine figure 1 , this embodiment provides an SDK authorization algorithm based on ellipse authentication, which specifically includes: Step 101: register the application program unit to be authorized at the server end, submit the fingerprint of the application program unit to be authorized, generate a public key y, and generate a public key y corresponding to the The large number corresponding to the above fingerprint;

[0028] Step 102: The client fills in the public key y, obtains the fingerprint of the application unit to be authorized, and decomposes the large number corresponding to the fingerprint according to the impact factor unit;

[0029] Step 103: the client sends an impact factor unit to the server;

[0030] Step 104: The server receives the client flag as an impact factor unit, generates a large number for the fingerprint, and decomposes it into a prime number a and a prime number b according to the impact factor in the impact factor unit;

[0031] Step...

Embodiment 2

[0039] combine image 3 , this embodiment provides an elliptic equation-based SDK verification method, specifically including:

[0040] Step 201: Register the application unit to be authorized at the server, submit the fingerprint of the application unit to be authorized, generate a public key y, and generate a large number corresponding to the fingerprint;

[0041] Step 202: The client fills in the public key y, obtains the fingerprint of the application program unit to be authorized, and decomposes the large number corresponding to the fingerprint according to the impact factor unit;

[0042] Step 203: the client sends an impact factor unit to the server;

[0043] Step 204: The server receives the client flag as an impact factor unit, generates a large number for the fingerprint, and decomposes it into a prime number a and a prime number b according to the impact factor in the impact factor unit;

[0044] Step 205: The influence factor unit of the server grows according to t...

Embodiment 3

[0066] combine image 3 , on the basis of Embodiment 1, this embodiment is an application embodiment, the application program unit to be authorized in this embodiment is APP, and the impact factor unit has an impact factor.

[0067] Step 301: Register the APP to be authorized on the server side, submit the APP fingerprint, generate a public key y, and generate a large number corresponding to the fingerprint;

[0068] Step 302: The client fills in the public key, obtains the APP fingerprint, and decomposes the large number corresponding to the fingerprint according to the impact factor;

[0069] Here, step 301 and step 302 are carried out simultaneously, and the sequence part is before and after.

[0070] Step 303: the client sends the impact factor to the server;

[0071] Step 304: The server receives the client's mark bit as an impact factor, generates a large number for the fingerprint, and decomposes it into prime numbers a and b according to the impact factor;

[0072] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an SDK verification method based on an elliptic equation. The method comprise: a server registers an application program unit to be authorized, submits the fingerprint to generate a public key y and a big number corresponding to the fingerprint; a client fills out the public key y to obtain the fingerprint of the application program unit to be authorized, and resolve the big number corresponding to the fingerprint according to the influence factor unit; the client sends the influence factor unit to the server; the sever receives the mark positions of the client to take as the influence factor units and generate the big number for the fingerprint to allow the big number to be resolved into prime numbers a and b according to the influence factors in the influence factor units; the influence factors of the server are increased to obtain private keys x according to the elliptic equation, the prime numbers a and b and the y, and the server sends the influence factors and the private key x to the client; and the client receives the influence factors and the x and generates the big number for the fingerprint to allow the big number to be resolved into the prime numbers a and b, and when it is determined that the a, the b, the x and the y satisfy the elliptic equation, the determination result is sent to the server, and the application program unit to be authorized is authorized.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an SDK verification method based on elliptic equations. Background technique [0002] SDK is a collection of development tools used by software engineers to create application software for specific software packages, software frameworks, hardware platforms, operating systems, etc. Generally speaking, SDK is the SDK used to develop applications under the Windows platform. It can be as simple as some files that provide an application programming interface API for a programming language, but it may also include complex hardware that can communicate with an embedded system. General tools include utilities for debugging and other purposes. SDKs also often include sample code, supporting technical notes, or other supporting documentation that clarifies basic reference material. [0003] Mobile applications (Mobile Application, referred to as Mobile App, apps), or mobile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3033H04L9/3066H04L9/3228
Inventor 张凯黄超郭晨阳宋晓天
Owner 康泰智爱(北京)医疗控股有限公司