Application authentication system and authentication method

An application and authentication system technology, applied in the direction of program/content distribution protection, instruments, computing, etc., to avoid theft and ensure security

Active Publication Date: 2022-07-01
STATE GRID SHANGHAI ENERGY INTERCONNECTION RES INST CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the project cooperation is completed, the platform developer can continue to issue and use the application. In this way, for the application provider, there is a great risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application authentication system and authentication method
  • Application authentication system and authentication method
  • Application authentication system and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] In order to solve the defect in the prior art that the application program can be used at will after being downloaded and installed, the present invention provides an application program authentication module. The structure of the authentication module is as follows: figure 1 shown, including:

[0063] The first true random number generation module is used to generate the first true random number, and this random number is used as an input parameter for authentication key generation;

[0064] a first authentication key generation module, configured to generate a first authentication key according to the first true random number and the second true random number obtained from the authentication terminal;

[0065] The authentication submodule is used to compare whether the first authentication key is consistent with the second authentication key obtained from the authentication terminal. If they are consistent, the function of the application program is allowed to be call...

Embodiment 2

[0094] The present invention provides an application program authentication module, comprising:

[0095] a first true random number generating module for generating a first true random number;

[0096] The first authentication key verification module is used to verify the first true random number and the second true random number generated by decryption from the second authentication key obtained from the authentication terminal and the first true random number generated by the first true random number generation module If the number is consistent with the second true random number obtained from the authentication terminal, the function of the application is allowed to be called by the external device; otherwise, it is not allowed to be called.

[0097] The first authentication key generation module includes:

[0098] The first authentication key verification sub-module is used to decrypt the second authentication key obtained from the authentication terminal to generate the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application program authentication system and an authentication method. The authentication system includes an authentication terminal and an application program authentication module. The application program authentication module includes a first true random number generating module for generating a first true random number; according to the first true random number A first authentication key generation module that generates a first authentication key with the second true random number obtained from the authentication terminal; an authentication submodule that compares whether the first authentication key is consistent with the second authentication key obtained from the authentication terminal . The authentication terminal includes: a second true random number generation module for generating a second true random number; an authentication times identification module for comparing the number of times the application is used with a preset upper limit; A second authentication key generation module that generates a second authentication key. The technical solution provided by the present invention ensures the security of the application scope provided by the application developer and the controllability of the usage times.

Description

technical field [0001] The invention relates to application program authentication, in particular to an application program authentication system and an authentication method. Background technique [0002] COS is Chip Operating System, which is called an on-chip operating system. With the advent of smart cards and security chips with microprocessors inside, the complex task of managing the card itself has become a reality. The emergence of COS not only greatly improves the interaction between the card and the reader, making it safer to use, but also makes the smart card itself take a big step towards the direction of personal computerization. The main function of COS is to control the information exchange between the smart card and the outside world, manage the memory in the card and complete the processing of various commands inside the card. [0003] A card loaded with COS developed in local languages ​​such as assembly language and C language is called a native card. In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/10G06F21/12
CPCG06F21/105G06F21/121G06F21/107
Inventor 盛万兴李二霞史常凯李玉凌孟晓丽许保平刘海涛张波常方圆何连杰
Owner STATE GRID SHANGHAI ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products