A permission verification method, storage medium and electronic device
A verification method and technology of electronic equipment, applied in the field of data transmission, can solve the problems of low security, difficulty in guaranteeing the privacy and security of key leaked data, etc., so as to enhance security and reduce the process and steps of decrypting data information without cumbersome steps. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] see figure 1 , this embodiment provides a permission verification method, which is applied to a target device, and when the method is applied to the target device, the following steps are performed:
[0052] Step 1: Receive the first verification request and the first verification information sent by the terminal, wherein the first verification request is used to request to obtain the data information of the target device, and the first verification information includes the first The verification command word of the verification request, the identification code of the terminal and the fixed key;
[0053] In this embodiment, the target device is an electronic device with an image acquisition device, such as a network camera, a mobile phone, a computer, a tablet computer, etc., and the terminal is a peripheral device, applying for acquiring image data of the target device; The terminal generates a first verification request and first verification information, and sends t...
Embodiment 2
[0084] see figure 2 , this embodiment provides a permission verification method, which is applied to a terminal, and when the method is applied to the terminal, the following steps are performed:
[0085] Step 1: Generate a first verification request and first verification information, and send them to the target device, wherein the first verification request is used to request to obtain data information of the target device;
[0086] Step 2: Receive the verification response information fed back by the target device, when the response information is the initial verification and the verification is successful, generate second verification information based on the response information, and send the verification information to the target device Feedback the second verification information; when the response information is the initial verification and the verification fails, generate a second verification request and third verification information, and send them to the target de...
Embodiment 3
[0092] This embodiment provides a computer-readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), static random access memory (SRAM), Read memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read-only memory (PROM), magnetic memory, magnetic disk, optical disk, server, App application store, etc., on which computer programs are stored, When the computer program is executed by the processor, the following method steps can be realized:
[0093] S1. Receive the first verification request and the first verification information sent by the terminal, wherein the first verification request is used to request to obtain data information of the target device;
[0094] S2. Determine the verification type of the first verification request based on the first verification information, if the verification type is an initial verification type, execute ste...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

