Authorization authentication method and device of application program and medium

A technology of application programs and authentication methods, which is applied in the field of network communication, can solve problems such as developer losses, and achieve the same effect as above

Pending Publication Date: 2021-12-03
HANGZHOU TUYA INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there is a cracking method, by dialing back the local time, so that the local time is always within the authorized operating time range, so that criminals can continue to use the application, causing losses to the developer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization authentication method and device of application program and medium
  • Authorization authentication method and device of application program and medium
  • Authorization authentication method and device of application program and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In conjunction with the following drawings of the present application example embodiments, the technical solutions in the embodiments of the present application will be clearly and completely described, obviously, the described embodiments are merely part of embodiments of the present application, but not all embodiments. Based on the embodiments in the present application, those of ordinary skill in the art without creative efforts shall, all other embodiments obtained are within the scope of protection of the present application.

[0038] Incidentally, applications typically require the processor to be loaded, for example, using a CPU (Central ProcessingUnit, central processing unit), each application has its corresponding key, the application developer when sold to the user when, also corresponding to the application key to the user, the user can use the application through the input key. When the processor to get the key, through decryption algorithm to decrypt the key,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authorization authentication method for an application program, which comprises the following steps of: acquiring the authorization running time of the application program, calling the backup time of the local time copied in advance, if the local time is within the authorization running time and the backup time is not later than the local time, authorizing, otherwise, terminating the authorization. Compared with the prior art that authorization authentication of the application program is cracked by callback of the local time, in the technical scheme, the local time is compared with the backup time, if the backup time is later than the local time, callback occurs in the local time, and authorization is terminated. By the adoption of the technical scheme, the situation that lawbreakers crack authorization authentication of the application program by calling back the local time, and losses of developers are caused is effectively prevented. The invention further discloses an authorization authentication device for the application program and a medium, which correspond to the authorization authentication method of the application program and have the same effect.

Description

Technical field [0001] The present application relates to the field of network communication, particularly to a method for authorizing an application of the authentication apparatus and a medium. Background technique [0002] In recent years, applications often need to run only after the use of authorized certification. When a key for authorization and authentication is acquired, through the key for decryption, obtains authorization application running time, the local time is confirmed to be authorized to run authorization is within the time range, the operator can use the application , while confirming the local time is not authorized to run time is terminated within the authorization, the operator can no longer use the application. [0003] Currently there is a method to break through the callback local time, the local time is always running in the authorized time frame, so that criminals can continue to use the application, resulting in a loss of developers. [0004] Thus, how...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44
CPCG06F21/44G06F21/107
Inventor 高飞
Owner HANGZHOU TUYA INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products