An encryption authorization scheme of an algorithm library

An algorithm library and authorization request technology, applied in the field of encryption authorization method of algorithm library, can solve the problems of difficult to set charging price, loss of algorithm supplier, falsely reported authorization quantity, etc. The effect of authorization management

Active Publication Date: 2019-03-29
福州符号信息科技有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the algorithm library is directly provided without encryption processing, the algorithm supplier will suffer huge losses, and the simple encryption method is less difficult to crack, and some manufacturers may be able to crack it through certain means, so that the algorithm can be used at no cost library; if a manufacturer is charged for authorization by year or time, it is not easy to formulate a reasonable charging price without knowing the manufacturer's annual output, and manufacturers tend to falsely report the number of authorizations, making the algorithm library Supplier suffers financial loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption authorization scheme of an algorithm library

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] see figure 1 , an algorithm library encryption authorization method, the algorithm library is installed on a client device, and when the client device enables the algorithm library, the following steps are performed:

[0030] Detect whether the authentication file is stored in the client device, if there is, execute the decoding step; if not, send an authorization request: collect the identification information of the client device, and then together with the account information and token of the client device (Chinese translation: order card) to the background server, the background server verifies the validity of the authorization request by verifying the account information and token, after the verification is passed, calls the core parameters corresponding to the algorithm library from the background server, and then combines the device identification information to create an authentication file , and then sent to the client device; the client device saves the receiv...

Embodiment 2

[0041] An encryption authorization system for an algorithm library, including a client device and a background server, the client device is loaded with an algorithm library;

[0042] see figure 1 , when the client device enables the algorithm library, it detects whether the authentication file is stored in the client device, and if so, decodes it; if not, sends an authorization request: collect the identification information of the client device, and then together with the client device account The information and the token are sent to the backend server together; the backend server confirms the legitimacy of the authorization request by verifying the account information and the token, and after the verification is passed, calls the core parameters corresponding to the algorithm library from the backend server, and then combines the device identification information making an authentication file, and then sending it to the client device; the client device saves the received au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption authorization method of an algorithm library. The algorithm library is loaded on a client device. When the client device activates the algorithm library, whetheran authentication file is stored in the client device is detected, and if so, the decoding step is executed. If not, an authorization request is sent: the identification information of the client device is collected and then sent to the background server together with the account information of the client device and token; After verifying the account information and token, the background server calls the corresponding core parameters of the algorithm library from the background server, and then makes an authentication file combined with the device identification information, and then sends the authentication file to the client device. The client device saves the file and then performs the decoding step. The invention not only guarantees the safety of the algorithm library, but also facilitates the algorithm supplier to manage the authorization of each equipment. Even if the algorithm library of the customer is embezzled, the algorithm library can be found in time, and the illegal client end is prevented from using the algorithm library effectively.

Description

technical field [0001] The invention relates to an encryption authorization method for an algorithm library, which belongs to the field of information security. Background technique [0002] Traditional POS machines often only have the function of swiping cards. With the maturity of the Android system, there are more and more smart POS machines using the Android system on the market; at the same time, with the maturity of barcode payment technology, the functions of POS machines can no longer be limited It needs to adapt to barcode payment, so it needs to add the function of QR code scanning to receive and pay; most POS machine manufacturers do not have 2D decoding algorithms that meet the decoding capabilities of UnionPay standards, so they need to use algorithm suppliers Algorithm libraries for decoding are provided for licensed production. For the protection of the algorithm library, the algorithm library cannot be directly provided to the POS machine manufacturer, but t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45H04L9/32
CPCH04L9/3213H04L9/3226G06F21/45
Inventor 陈小杰
Owner 福州符号信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products