Unlock instant, AI-driven research and patent intelligence for your innovation.

A permission verification method, storage medium and electronic device

A verification method and technology of electronic equipment, applied in the field of data transmission, can solve the problems of low security, difficulty in guaranteeing the privacy and security of key leaked data, etc., so as to enhance security and reduce the process and steps of decrypting data information without cumbersome steps. Effect

Active Publication Date: 2021-12-14
GREE ELECTRIC APPLIANCES INC +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The object of the present invention is: to address the above problems, the present invention provides a permission verification method, storage medium and electronic equipment, which solves the problem of low security and difficulty in ensuring data privacy when the key is leaked in the existing permission verification method For security issues, first perform the corresponding permission verification through the verification type of the first verification request; when the verification type is the initial verification type, first perform the initial permission verification and feed back the verification response information to the terminal, and then Perform another permission check or re-perform the initial permission check according to the check result to allow the terminal to obtain the real-time data of the target device after the verification is successful; otherwise, directly perform another permission check to allow the terminal after the verification is successful The terminal obtains the real-time data of the target device; by performing double-authority verification on the initial verification type, it prevents malicious terminals from illegally obtaining the data information of the target device, thereby ensuring the security of real-time data transmission between the terminal and the target device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A permission verification method, storage medium and electronic device
  • A permission verification method, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] see figure 1 , this embodiment provides a permission verification method, which is applied to a target device, and when the method is applied to the target device, the following steps are performed:

[0052] Step 1: Receive the first verification request and the first verification information sent by the terminal, wherein the first verification request is used to request to obtain the data information of the target device, and the first verification information includes the first The verification command word of the verification request, the identification code of the terminal and the fixed key;

[0053] In this embodiment, the target device is an electronic device with an image acquisition device, such as a network camera, a mobile phone, a computer, a tablet computer, etc., and the terminal is a peripheral device, applying for acquiring image data of the target device; The terminal generates a first verification request and first verification information, and sends t...

Embodiment 2

[0084] see figure 2 , this embodiment provides a permission verification method, which is applied to a terminal, and when the method is applied to the terminal, the following steps are performed:

[0085] Step 1: Generate a first verification request and first verification information, and send them to the target device, wherein the first verification request is used to request to obtain data information of the target device;

[0086] Step 2: Receive the verification response information fed back by the target device, when the response information is the initial verification and the verification is successful, generate second verification information based on the response information, and send the verification information to the target device Feedback the second verification information; when the response information is the initial verification and the verification fails, generate a second verification request and third verification information, and send them to the target de...

Embodiment 3

[0092] This embodiment provides a computer-readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), static random access memory (SRAM), Read memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read-only memory (PROM), magnetic memory, magnetic disk, optical disk, server, App application store, etc., on which computer programs are stored, When the computer program is executed by the processor, the following method steps can be realized:

[0093] S1. Receive the first verification request and the first verification information sent by the terminal, wherein the first verification request is used to request to obtain data information of the target device;

[0094] S2. Determine the verification type of the first verification request based on the first verification information, if the verification type is an initial verification type, execute ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of data transmission, in particular to an authority verification method, a storage medium and an electronic device, which solves the problems in the prior art of low security and difficulty in guaranteeing data privacy when a key is leaked. The method includes: performing the corresponding permission verification through the verification type of the first verification request; when the verification type is the initial verification type, first performing the initial verification and feeding back the response information of the verification to the terminal, and then according to the verification. Check the result of the verification again or re-perform the initial permission verification to allow the terminal to obtain the real-time data of the target device after the verification is successful; otherwise, directly perform the permission verification again to allow the terminal to obtain the The real-time data of the target device; through the method of double-authority verification for the initial verification type, it can prevent malicious terminals from illegally obtaining the data information of the target device and ensure the security of real-time data transmission between the terminal and the target device.

Description

technical field [0001] The invention relates to the technical field of data transmission, in particular to an authority checking method, a storage medium and electronic equipment. Background technique [0002] With the development of computer technology and network technology, people pay more and more attention to the security of network data transmission. The current network camera mainly performs data interaction with peripheral devices through central control devices, such as switches or gateways, and generally adopts the authority verification method of key authentication. When the peripheral device is connected, the key authentication is performed, and the key can be connected to the system normally to obtain the real-time information of the network camera. This method of security authentication only through the key between the peripheral device and the central control device, once the key is leaked, any peripheral device can access the system to obtain real-time data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/1441
Inventor 朱鹏飞曾安福余意君李茹陈彦宇马雅奇
Owner GREE ELECTRIC APPLIANCES INC