Terminal application legal-copy authentication method and system

A terminal application and authentication method technology, which is applied in the genuine authentication method and system field of terminal applications, can solve problems such as economic losses of enterprises, and achieve the effect of maintaining interests

Active Publication Date: 2017-03-29
SHANGHAI PEOPLENET SECURITY TECH
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the end, pirated mobile phone applications will cause very large economic losses to enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal application legal-copy authentication method and system
  • Terminal application legal-copy authentication method and system
  • Terminal application legal-copy authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0087] On the one hand, the present invention provides a genuine authentication method for terminal applications, such as figure 1 shown, including the following steps:

[0088] S100, the terminal application sends an access request to the service server;

[0089] S200, the service server receives the access request, and authenticates the terminal application through the authentication server, and if the authentication is passed, execute ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal application legal-copy authentication method. The terminal application legal-copy authentication method comprises the following steps: a terminal application sends an access request to a service server; the service server receives the access request, and authenticates the terminal application through an authentication server; if authentication is passed, the service server judges that the terminal application is the legal copy, and responds to the access request of the terminal application; and otherwise, the service server judges that the terminal application is pirated, and refuses the access request of the terminal application. On the other hand, the invention further discloses a terminal application legal-copy authentication system. The terminal application legal-copy authentication system comprises a terminal, the terminal application, the service server and the authentication server; the terminal application is positioned on the terminal; the service server is separately in communication connection with the terminal application and the authentication server, wherein the terminal application comprises a first information transceiving module; and the service server comprises a second information transceiving module and an information verification module connected with the second information transceiving module. By means of the terminal application legal-copy authentication method and system disclosed by the invention, the terminal application legal-copy authentication security is greatly improved; and the rights and interests of general legal-copy terminal applications can be effectively maintained.

Description

technical field [0001] The invention belongs to the technical field of communications, and in particular relates to a genuine authentication method and system for terminal applications. Background technique [0002] With the development of mobile applications, the number of developers who develop official mobile applications in enterprises is also increasing. Some "bad-hearted" developers will specially record the communication protocol and access method of the enterprise business server in the process of developing enterprise applications. After mastering this information, these "bad-hearted" developers will develop "pirated mobile phone applications" in private. [0003] Because the access method and communication protocol of the pirated mobile application are completely consistent with the official enterprise application, the server cannot distinguish the access of the pirated application, and will also provide business services to the pirated application. In this way, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0846H04L63/0876H04L2463/101
Inventor 谈剑锋朱瑞鹤姜立稳胡剑波谢勇钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products