Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

349 results about "Authorization certificate" patented technology

In computer security, an attribute certificate, or authorization certificate (AC) is a digital document containing attributes associated to the holder by the issuer. When the associated attributes are mainly used for the purpose of authorization, AC is called authorization certificate. AC is standardized in X.509. RFC 5755 further specifies the usage for authorization purpose in the Internet.

Method and system for authorizing a client computer to access a server computer

The present invention includes a client computer, a first server computer, and a second server computer. The first server provides an authorization ticket containing a time stamp to the client computer when the client computer is authorized to access the first server. An elapsed time counter is started at the client computer when access is provided to the first server. When a request is received at the client computer to access the second server, the client computer determines the session length based upon the elapsed time counter. The client computer calculates a hash value for the authorization ticket, the session length, and a secret shared with the second server computer. The client computer transmits a login request to the second server including the authorization ticket, the session length, and the hash. The second server decrypts the authorization ticket and retrieves a copy of the shared secret. The second server executes a hash function on the authorization ticket, the session length, and the shared secret. The second server then compares the computed hash to the hash value received from the second client application. If the two hash values are identical, the second server retrieves the time stamp from the authorization ticket and adds the session length to the time stamp. The second server then compares the resulting value to the current time. If the resulting value and the current time are within a preset threshold value, the client computer is provided.
Owner:MICROSOFT TECH LICENSING LLC

Copyright authorization method based on block chain

The invention discloses a copyright authorization method based on a block chain. The method comprises steps of: 1, uploading a work to a client so as to enable the work to become a multi-level hash value code identification document; 2, generating a self identity identifier in a copyright block chain database; 3, enabling a digital copyright gateway server to store the generated multi-level hash value code identification document uploaded by an applicant in self identity into a copyright block chain database; 4, enabling the applicant to fill in a copyright application agreement in detail through a digital copyright application website; 5, enabling the digital copyright application website system to search the duplicate records of various levels of digital identification codes in the block chain database, and to give a copyright authorization conclusion; 6, determining the ownership of copyright according to the copyright authorization conclusion, and sending to the applicant a copyright authorization certificate or an electronic copyright authorization certificate; and 7, enabling two copyright traders to apply for authorization and an authorization transaction at the digital copyright application website system. The method solves the shortcomings of conventional copyright authorization and ensures the high security and reliability of the copyright.
Owner:无锡井通网络科技有限公司

Open authorization method, open authorization system and authentication and authorization server

The embodiment of the invention discloses an open authorization method, an open authorization system and an authentication and authorization server. The method comprises the following steps: receiving a call request initiated by a third party application for resource contained in a resource server; authenticating the identity of a user using the third party application; allocating an authorization license code to the third party application in response to the success of identity authentication and calling of the third party application on the resource contained in the resource server under authorization of a resource user; receiving a request of the third party application for an authorization certificate, and generating an authorization certificate in a private key encryption method based on an authorized resource identifier, the identity information of the user using the third party application, and the authorization license code and a timestamp which are contained in the authorization certificate request; and sending the authorization certificate to the third party application to enable the third party application to carry the authorization certificate and directly access the resource authorized by the resource server. According to the embodiment of the invention, the success rate of user authorization of a distributed system architecture is improved.
Owner:CHINA TELECOM CORP LTD

Software authorization system based on public key cryptosystem

The invention discloses a software authorization system based on public key cryptosystem. The software authorization system comprises a server end and a client end, wherein the server end comprises an institution authorization certification generation module, a receiving module, a verification module and a user authorization certificate generation module. The user authorization certificate generation module comprises a digital signing module used for carrying out digital signing on computer hardware characteristics h0 in a user registration file with an RSA private key to generate S0, an encryption string generation module used for carrying out preset hybrid operations on obtained software version information v, user information u, an authorization term ex, current time cur and s0 to generate an encryption string signB64 and a certificate generation module used for generating a user authorization certificate with the encryption string signB64 and the RSA public key. The method can prevent software from being illegally copied, meanwhile, the software can be managed by a software issuer in a concentrated mode, and upgrading and tracking of the software, pushing personalized services for users and other after-sale management are facilitated.
Owner:HUAZHONG NORMAL UNIV

Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server

The embodiment of the invention provides an authorization method and an authorization system of an intelligent key in a wireless terminal as well as the terminal and a server. The method comprises the following steps: receiving a log-in message of an authorization mobile terminal and the authorized mobile terminal by the server, wherein the authorization mobile terminal has a permission for controlling a vehicle; establishing connection between the authorization mobile terminal and the authorized mobile terminal, and receiving authorized information transmitted from the authorized mobile terminal by the authorization mobile terminal; generating an authorization certificate according to the authorized information by the authorization mobile terminal, and transmitting the authorization certificate to the server; and transmitting the authorization certificate to the authorized mobile terminal by the server, so that the permission for controlling the vehicle is authorized to the authorized mobile terminal. According to the method, the authorization for giving the permission for other people to utilize the vehicle can be realized in a wireless communication way, inconvenience caused by private information or no other key of a user at the moment when the vehicle is lent to other people can be avoided, and the user experience can be enhanced.
Owner:BYD CO LTD

Method for realizing authorization management of vehicle networking device, device and systems

ActiveCN103986687AVerify validityImplement authorization managementTransmissionAuthorization certificateAuthentication system
The invention discloses a method for realizing authorization management of a vehicle networking device, a device and systems. The method includes the following steps: the vehicle networking device sends an authentication certificate application to an authentication system when determining that a device authentication certificate needs to be applied by the vehicle networking device, wherein the authentication certificate application carries identification information of the vehicle networking device; after the device authentication certificate issued by the authentication system for the vehicle networking device is received, according to the device authentication certificate, a registration certificate application is sent to a registration system, wherein the registration certificate application carries the device authentication certificate; and after a device registration certificate issued by the registration system for the vehicle networking device is received, according to the device registration certificate, an authorization certificate application is sent to an authorization system and a device authorization certificate issued by the authorization system for the vehicle networking device is received, wherein the authorization certificate application carries the device registration certificate.
Owner:DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products