Application authentication system and authentication method
An application and authentication system technology, applied in the direction of program/content distribution protection, instruments, computing, etc., to avoid theft and ensure security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0062] In order to solve the defect in the prior art that the application program can be used at will after being downloaded and installed, the present invention provides an application program authentication module. The structure of the authentication module is as follows: figure 1 shown, including:
[0063] The first true random number generation module is used to generate the first true random number, and this random number is used as an input parameter for authentication key generation;
[0064] a first authentication key generation module, configured to generate a first authentication key according to the first true random number and the second true random number obtained from the authentication terminal;
[0065] The authentication submodule is used to compare whether the first authentication key is consistent with the second authentication key obtained from the authentication terminal. If they are consistent, the function of the application program is allowed to be call...
Embodiment 2
[0094] The present invention provides an application program authentication module, comprising:
[0095] a first true random number generating module for generating a first true random number;
[0096] The first authentication key verification module is used to verify the first true random number and the second true random number generated by decryption from the second authentication key obtained from the authentication terminal and the first true random number generated by the first true random number generation module If the number is consistent with the second true random number obtained from the authentication terminal, the function of the application is allowed to be called by the external device; otherwise, it is not allowed to be called.
[0097] The first authentication key generation module includes:
[0098] The first authentication key verification sub-module is used to decrypt the second authentication key obtained from the authentication terminal to generate the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com