Unlock instant, AI-driven research and patent intelligence for your innovation.

An application verification method and device

A verification method and application identification technology, which is applied to computer security devices, instruments, calculations, etc., can solve the problems of poor operability and lack of flexibility, and achieve the effect of strong operability and high flexibility

Active Publication Date: 2020-03-06
NEW H3C TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] But this method lacks flexibility, and the component needs to modify the code of the component itself for each authorized application, so the operability is not strong

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An application verification method and device
  • An application verification method and device
  • An application verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0030] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an application check method and an application check device. An application is integrated with a component. The method is applied to the component, and comprises the steps of sending a unique feature code acquisition request to a server side, when the component is called by the application; receiving a response returned by the server side; if the response carries a unique feature code of the application, acquiring the unique feature code of the application; checking whether the unique feature code acquired from the application is accordant with the unique feature code returned by the server side, if yes, determining that the application passes the check, and if no, determining that the application does not pass the check. According to the method provided by the invention, the component can be effectively prevented from being illegally used by the fake application, and codes of the component and the application do not need to be excessively modified, the flexibility is high, and the operability is strong.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to an application verification method and device. Background technique [0002] A component can be used to implement a certain function of a software product, such as push technology, image recognition technology, mobile payment technology, etc. By selecting a suitable component and integrating it in the application, the developer can make the application directly call the function of the component, and no longer need to develop each function of the application. [0003] At present, some components have implemented charging. In order to protect the interests of customers and itself, this part of the charged components needs to have the permission to identify whether each application has the right to use this component. [0004] One way is to pre-write the signature of the authorized application in the code of the component. When an application integrated with ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCG06F21/121H04L2463/101
Inventor 王洪彬孙文武
Owner NEW H3C TECH CO LTD