Authorization management method and system

An authorization management and authorization code technology, applied in the field of embedded system development, can solve the problems of increasing management costs, static link libraries cannot guarantee legal permissions, and poor security, so as to avoid the increase of management costs and reduce the risk of being cracked.

Active Publication Date: 2020-12-29
WUHAN JIULE TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, simply providing a static link library cannot guarantee whether the other party has legal authority, so authorization management of static library files is also necessary
In the prior art, an external IC or an encryption algorithm is often used to verify the authorization, but the way of external IC increases the management cost, and the encryption method commonly used in the prior art is relatively difficult to crack, and the security is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization management method and system
  • Authorization management method and system
  • Authorization management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The inventors have found through research that the commonly used authorization methods for embedded systems in the prior art include using encryption ICs for authorization verification. However, this method requires an external IC, which increases the cost for the use of library files. At the same time, external ICs generally use random numbers for verification, but the generation of random numbers depends on the generation of the platform, and static library files cannot be fully controlled. After the platform redirects the random number generation function, it can generate a fixed value, and the code can be cracked. The encryption scheme, based on the above two points, is not suitable for the authorization of static library files.

[0050]In addition, in the prior art, the authorization client uses the hardware ID of the embedded platform to generate the authorization code Key1, and the embedded device receives the authorization code sent by the client for FLASH stora...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authorization management method and system. A hardware client side is additionally arranged; after being received at the hardware client side, an encryptedplatform hardware ID sent by an authorization client side is decrypted; furthermore, an authorization code is obtained by calculation according to the decrypted platform hardware ID; the authorizationcode is encrypted, so that a ciphertext is obtained; furthermore, the ciphertext is sent to the authorization client side; after decrypting the ciphertext, the authorization client side obtains the authorization code, and sends the authorization code to an embedded platform; the embedded platform stores the authorization code in a storage device; after the embedded platform is re-started, a verification authorization code is generated, so that the stored authorization code is verified; and, after verification is passed, a static library file in the embedded platform can work normally. According to the authorization management scheme, the interaction information is encrypted through additional arrangement of the hardware client side; therefore, the risk that the authorization information is cracked can be reduced; and furthermore, the disadvantage that the management cost is increased due to external connection of the IC in the prior art can be avoided.

Description

technical field [0001] The invention relates to the technical field of embedded system development, in particular to an authorization management method and system. Background technique [0002] In the development of embedded systems, to realize a function, it is necessary to write source code files (.c and .h files, the file language is a computer programming language, which can be read) to control the embedded system and its peripherals, and realize the corresponding functions. In order to protect the code written by the author, a static link library (.a or .lib) can be generated through tool compilation. In this way, you only need to provide the .h index header file and the static library file to get the support of this function. This method can ensure that the developer and his organization can make it available to other people or organizations without disclosing the source code. However, simply providing a static link library cannot guarantee whether the other party ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0863H04L9/0866H04L63/0428H04L63/083H04L63/0876
Inventor 王帮德王涛高飞周冰张园赵向东
Owner WUHAN JIULE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products