Authorization processing method and equipment

A technology for accessing devices and authorization credentials, which is applied in the field of authorization processing and can solve the problem that access devices cannot use the original authorization relationship.

Active Publication Date: 2017-05-24
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The invention provides a method and device for processing authorization to solve the technical problem that the access device cannot use the original authorization relationship when the identifier of the access device changes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization processing method and equipment
  • Authorization processing method and equipment
  • Authorization processing method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the object, technical solution and advantages of the present invention clearer, the specific embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits, etc. have not been described in detail so as not to unnecessarily obscure the embodiments. Apparently, the embodiments described below are some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authorization method and equipment. An authorization server receives an authorization updating request including an access equipment first identifier; authorization updating response including signature request information is transmitted to access equipment, wherein the signature request information indicates the access equipment to sign verification information; a signature verification request transmitted by the access equipment is received, wherein the signature verification request includes the first identifier, the verification information and the signature of the verification information; the signature of the verification information is generated by signing the verification information by the access equipment; the saved authorization relationship is acquired according to the verification information; the signature of the verification information in the signature verification request is determined to be legal; and the authorization relationship is updated according to the first identifier. With application of the method, an M2M system can identify the identity of the access equipment by judging the legality of the signature of the verification information when the identifier of the access equipment in the M2M system changes so as to update the existing authorization relationship, and the access equipment is enabled to continue using the existing authorization relationship.

Description

technical field [0001] The invention relates to the technical field of machine communication, in particular to a method and device for processing authorization. Background technique [0002] Machine-to-Machine Communications (M2M) is a networked application and service centered on machine intelligence interaction. It embeds wireless or wired communication modules and application processing logic inside the machine to realize the user's informatization requirements for monitoring, command and dispatch, data collection and measurement. In the M2M system, various M2M devices, such as various sensors, are directly connected to the M2M service platform through the M2M gateway, so as to realize various M2M services. Such as power meter reading, smart home, etc. Through the service capability provided by the M2M service platform, the data collected by the M2M device can be obtained, or the M2M device can be controlled and managed. [0003] In the existing M2M specification, usin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/00H04L29/06H04W12/06H04L45/02H04W4/70
CPCH04W12/086H04W12/068H04W12/069H04W4/70H04W12/06H04W12/08H04L63/102H04L63/126
Inventor 张尧烨
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products