Embedded product access authorization method and device

An authorization device and embedded technology, which is applied in the direction of secure communication devices, computer security devices, digital transmission systems, etc., can solve the problems of the short rise of artificial intelligence hardware products and the innovation speed that has not caught up.

Active Publication Date: 2022-02-22
AISPEECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Since the rise of artificial intelligence hardware products is still relatively short, most domestic artificial intelligence open platforms are still in the stage of imitating and exploring foreign artificial intelligence platforms, so the speed of innovation in licensing has not kept up

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded product access authorization method and device
  • Embedded product access authorization method and device
  • Embedded product access authorization method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0025] Please refer to figure 1 , which shows a flow chart of an embodiment of the embedded product access authorization method of the present application, the embedded product access authorization method of this embodiment can be applicable to embedded smart devices that need to access the artificial intelligence open platform , such as smart vo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded product access authorization method and device, wherein the embedded product access authorization method includes: reading the authorization file stored in the device during initialization, wherein the authorization file at least includes The way of using a secret key; perform authorization verification on the user terminal side for the authorization file and the device and determine whether the verification is passed; in response to passing the verification, send an authentication request to the authorization server, wherein the authentication request adopts the Signing with the authorization key; in response to the authentication of the user terminal by the authorization server, accessing the system corresponding to the authorization server. The authorization management solution provided by the method and device of the present application greatly reduces the requirements and costs of production line production, reduces the workload of production line production, and creates value for it from the perspective of developers.

Description

technical field [0001] The invention belongs to the technical field of embedded products, in particular to a method and device for access authorization of embedded products. Background technique [0002] Among the related technologies, the intelligent voice open platforms currently on the market, such as the DuerOS open platform and the AliGenie developer platform, mostly use the method of burning authorization files on the production line to authorize smart devices on the embedded operating platform. No artificial intelligence open platform for dynamic authorization of embedded smart devices has been found. [0003] The inventor found in the process of implementing the present application that the existing solutions have at least the following defects: [0004] It is required that the equipment production line has the ability to burn in the authorization certificate, which has relatively high requirements on the production line, and the burning process needs to be burned i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/06G06F21/60
CPCH04L63/0876H04L63/10H04L67/06G06F21/604
Inventor 周莉张顺闻洪凯
Owner AISPEECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products