Method and system for encryption and authorization of algorithm library

An authorization system and algorithm library technology, which is applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as difficulty in setting charging prices, loss of algorithm suppliers, and false authorization quantity, etc., to achieve transaction security Guarantee, convenient cost statistics, convenient authorization management effect

Active Publication Date: 2022-02-11
福州符号信息科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the algorithm library is directly provided without encryption processing, the algorithm supplier will suffer huge losses, and the simple encryption method is less difficult to crack, and some manufacturers may be able to crack it through certain means, so that the algorithm can be used at no cost library; if a manufacturer is charged for authorization by year or time, it is not easy to formulate a reasonable charging price without knowing the manufacturer's annual output, and manufacturers tend to falsely report the number of authorizations, making the algorithm library Supplier suffers financial loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for encryption and authorization of algorithm library

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] see figure 1 , an algorithm library encryption authorization method, the algorithm library is installed on a client device, and when the client device enables the algorithm library, the following steps are performed:

[0030] Detect whether the authentication file is stored in the client device, if there is, execute the decoding step; if not, send an authorization request: collect the identification information of the client device, and then together with the account information and token of the client device (Chinese translation: order card) to the background server, the background server verifies the account information and token to determine the legitimacy of the authorization request, after the verification is passed, the core parameters corresponding to the algorithm library are called from the background server, and then combined with the device identification information to create an authentication file , and then sent to the client device; the client device save...

Embodiment 2

[0041] An encryption authorization system for an algorithm library, including a client device and a background server, the client device is loaded with an algorithm library;

[0042] see figure 1 , when the client device enables the algorithm library, it detects whether the authentication file is stored in the client device, and if so, decodes it; if not, sends an authorization request: collect the identification information of the client device, and then together with the client device account The information and the token are sent to the backend server together; the backend server confirms the legitimacy of the authorization request by verifying the account information and the token, and after the verification is passed, calls the core parameters corresponding to the algorithm library from the backend server, and then combines the device identification information making an authentication file, and then sending it to the client device; the client device saves the received au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption authorization method for an algorithm library. The algorithm library is loaded on a client device, and when the client device starts the algorithm library, it detects whether an authentication file is stored in the client device, and if so, performs a decoding step; if not , then send an authorization request: collect the identification information of the client device, and then send it to the background server together with the account information and token of the client device; The core parameters corresponding to the algorithm library are combined with the device identification information to make an authentication file, and then sent to the client device; the client device saves the file, and then performs the decoding step. The invention can not only ensure the security of the algorithm library, but also facilitate the algorithm supplier to manage the authorization of each device. Even if the customer's algorithm library is stolen, it can be found and processed in time, effectively preventing illegal clients from using the algorithm library .

Description

technical field [0001] The invention relates to an encryption authorization method and system for an algorithm library, belonging to the field of information security. Background technique [0002] Traditional POS machines often only have the function of swiping cards. With the maturity of the Android system, there are more and more smart POS machines using the Android system on the market; at the same time, with the maturity of barcode payment technology, the functions of POS machines can no longer be limited It needs to adapt to barcode payment, so it needs to add the function of QR code scanning to receive and pay; most POS machine manufacturers do not have 2D decoding algorithms that meet the decoding capabilities of UnionPay standards, so they need to use algorithm suppliers Algorithm libraries for decoding are provided for licensed production. For the protection of the algorithm library, the algorithm library cannot be directly provided to the POS machine manufacturer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45H04L9/32
CPCH04L9/3213H04L9/3226G06F21/45
Inventor 刘武薛雄龙林信斌陈小杰
Owner 福州符号信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products