Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization methods for end devices

A technology of terminal equipment and equipment, applied in the field of communication, can solve the problem of not being able to determine whether users use hardware, etc., to achieve the effect of ensuring uniqueness and controllability, and protecting interests

Active Publication Date: 2020-10-02
北京博瑞彤芸科技股份有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, for products bound with software and hardware, if only this authorization method is used, it is impossible to determine whether the user is using valid hardware.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization methods for end devices
  • Authorization methods for end devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0039] figure 1 The flow chart of the authorization method of the terminal device provided by the embodiment of the present invention, such as figure 1 shown, including:

[0040] Step 101, the database server receives the terminal equipment batch information;

[0041] Specifically, the terminal device described in this example is preferably a m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention relates to a terminal device authorization method, including: the database server receives the batch information of the terminal device; the batch information includes the batch ID, IMEI information and organization information of multiple terminal devices; and obtains the first The IMEI information of the terminal device; sending an access request message to the application server; when the application server searches the database server according to the IMEI information of the first terminal device and finds that there is the same IMEI information, obtains the institution information corresponding to the IMEI information, and sends The first terminal device sends an organization verification information request message; the first terminal device obtains the service user ID according to the organization verification information request message; the application server determines the corresponding service organization information according to the service user ID; when the service organization information corresponds to the organization information of the IMEI information At the same time, a key pair is generated, and the public key is sent to the first terminal device and stored.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an authorization method for terminal equipment. Background technique [0002] In order to realize software protection, authorization is often required when software is used. Currently commonly used authorization methods are based on user permissions. For example, providing a software serial number or a verification code to the user requires the user to input the software serial number or verification code during authorization verification. [0003] However, for products bound with software and hardware, if only this authorization method is used, it is impossible to determine whether the user has used valid hardware. If the software is pirated and used on unbound hardware, but the information for the software authorization verification is correct, the authorization verification can also pass. That is to say, the software can still be authorized on non-authorized ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04W8/20H04W12/06H04W12/08H04W12/069
CPCH04L9/0819H04L9/0894H04L63/10H04L63/12H04W8/205H04W12/06H04W12/08
Inventor 陈家制王开源汪秀兵
Owner 北京博瑞彤芸科技股份有限公司