Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization management method and system, server and client

An authorization management and server technology, applied in the field of authorization security management, can solve problems such as difficulty in obtaining credible time, and achieve the effects of improving effectiveness, preventing tampering, and enhancing effectiveness

Pending Publication Date: 2021-11-16
SHENZHEN KAIFA TECH (CHENGDU) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the system is used offline, authorization cannot be achieved through this method. In this case, even if an authorization code is issued to the user, if the user's local environment is reset or changed, the license may be reused. License authorization in the offline environment It is impossible to be completely effective. The difficulty of offline verification lies in how to obtain trusted time. Since the system time can be tampered with, obtaining trusted time in an offline environment is a difficult problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization management method and system, server and client
  • Authorization management method and system, server and client
  • Authorization management method and system, server and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] as attached figure 1 Shown is a flow chart of an authorization management method provided in this embodiment, and the method specifically includes the following steps:

[0047] Step 1: Generate an authorization code. Specifically, the authorization code generation steps are as attached figure 2 As shown, the client clicks on the embedded page through the server to generate a key, where the key is the machine information string of the server, and the machine information string is encrypted. The customer gives the machine information string to the administrator of the service provider, and the administrator configures the expiration time, operating parameters and machine information according to the machine information string to generate an authorization code. The administrator then asymmetrically encrypts the authorization code to obtain a public-private key pair, and hands over the public key and authorization code to the client, and keeps the private key for himself...

Embodiment 2

[0057] as attached image 3 As shown, it is a structural block diagram of an authorization management system provided by this embodiment, and the system specifically includes a server and several client terminals that communicate encryptedly with the server.

[0058] Among them, the server is used to configure and verify the authorization code, obtain the trusted time from the external network or the client cluster, judge whether the time has been tampered with, and broadcast the verification result of the authorization code. Specifically, the server includes a first credible time acquisition module, which is used to obtain the international standard time when the client is connected to the external network; a second credible time acquisition module, which is used to collect Time value; credible time management module, used to store credible time and judge whether the time has been tampered with; authorization code management module, used to configure and verify the authorizat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization management method and system, a server and a client. The method comprises the following steps: generating an authorization code; configuring the authorization code into a server for activation; when the server is connected with an external network, obtaining international standard time as credible time at intervals of preset time; when the server cannot obtain the international standard time from the external network within a preset period of time, obtaining the maximum time value in the data regularly sent to the server by the client cluster as credible time; storing each acquired credible time, and when the later written credible time value is smaller than the currently written credible time value, determining that the system is tampered, and modifying the state of the authorization code as expired. According to the method, the accurate credible time can be effectively obtained, and meanwhile, the system can be effectively prevented from being tampered. In an off-line environment, the effectiveness of service authorization provided for users by system research, development and sales enterprises is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of authorization security management, and in particular relates to an authorization management method, system, server and client. Background technique [0002] After the system R&D and sales enterprise deploys the system in the customer environment, if they want to limit the usage time limit of the customer system, the concurrent scale of the system and other parameters, they must connect to the authorization center developed by themselves through the Internet for authorization. If the system is used offline, authorization cannot be achieved through this method. In this case, even if an authorization code is issued to the user, if the user's local environment is reset or changed, the license may be reused. License authorization in the offline environment It is impossible to be completely effective. The difficulty of offline verification lies in how to obtain trusted time. Since the system time can be tampere...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445G06F21/60
CPCG06F9/44505G06F21/602G06F21/604
Inventor 崔鸿余贵
Owner SHENZHEN KAIFA TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products