CN103856621A - Method and device for authorization between user devices - Google Patents

Method and device for authorization between user devices Download PDF

Info

Publication number
CN103856621A
CN103856621A CN201210519658.4A CN201210519658A CN103856621A CN 103856621 A CN103856621 A CN 103856621A CN 201210519658 A CN201210519658 A CN 201210519658A CN 103856621 A CN103856621 A CN 103856621A
Authority
CN
China
Prior art keywords
equipment
subscriber
credible
mandate
authorizing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210519658.4A
Other languages
Chinese (zh)
Other versions
CN103856621B (en
Inventor
张喜涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CN201210519658.4A priority Critical patent/CN103856621B/en
Priority to CN201610455029.8A priority patent/CN106060259B/en
Publication of CN103856621A publication Critical patent/CN103856621A/en
Application granted granted Critical
Publication of CN103856621B publication Critical patent/CN103856621B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a method for authorization between user devices. The method includes the steps that a user device obtains authorization from a reliable device connected with the user device when the user device runs an application which needs to be authorized; after authorization is obtained, the user device runs the authorized application. The embodiment of the invention further provides the user device. According to the technical scheme, behaviors of other terminal devices are authorized through the reliable device, and due to the fact that authorization is conducted by the reliable device which is set in advance, natural safety and natural reliability are achieved. According to the scheme, an existing device is slightly changed, compatibility of a system can not be affected, and simple and efficient operation is achieved.

Description

The method of authorizing between subscriber equipment and device
Technical field
The present invention relates to terminal equipment technical field, particularly, the method that the present invention relates to authorize between subscriber equipment and device.
Background technology
In recent years, along with the develop rapidly of electronic industry and the communication technology, taking data, speech, video as basic new business development swift and violent.The fast development of microelectric technique, computer hardware technique, the work becoming increasingly complex for terminal equipment processing lays the foundation, realize possibility for terminal equipment personalization provides, make terminal break away to a certain extent the restriction of network, can possess function from strength to strength.In addition, user itself also has urgent demand to terminal, wish termination function more powerful, more flexibly, simpler and more direct.The development of information technology, makes terminal technology move towards intellectuality, mobile, multifunction.
The present development along with subscriber equipment, authority and safety requirements to subscriber equipment are also more and more higher, except interconnecting by mobile radio communication, computer network, between subscriber equipment also by near-field communication NFC, WIFI Direct, Bluetooth(bluetooth) etc. technology communicate, be for example used for transmitting data, file etc.
But the communication between subscriber equipment, normally based on equity, independently form interconnects, does not consider to utilize other-end equipment to realize the access rights of mobile terminal device and safety is proposed to the technical scheme of dealing with problems.
Therefore, be necessary to propose effective technical scheme, solve access rights and safety issue between subscriber equipment.
Summary of the invention
Object of the present invention is intended at least solve one of above-mentioned technological deficiency, by credible equipment, subscriber equipment is limited and is monitored especially, improves the safety and reliability of subscriber equipment.
The embodiment of the present invention has proposed a kind of method of authorizing between subscriber equipment on the one hand, comprises the following steps:
Subscriber equipment, in the time that the machine operation needs the application through authorizing, obtains mandate to credible equipment;
When obtaining after mandate, the described application through authorizing of described subscriber equipment operation.
The embodiment of the present invention has proposed a kind of subscriber equipment on the other hand, comprises authorization module and operation module,
Described authorization module, for obtaining mandate to credible equipment;
Described operation module, in the time that the machine operation needs the application through authorizing, when described authorization module obtains after credible equipment mandate, for moving the described application through authorizing.
The present invention proposes technical scheme, utilizes credible equipment to authorize the behavior of other-end equipment, such as forgetting Password when, when moving some program or want to control online etc., all can utilize this mode to authorize.Owing to being credible equipment mandate by setting in advance, therefore there is natural safety and reliability.The such scheme that the present invention proposes, very little to the change of existing equipment, can not affect the compatibility of system, and realize simple, efficient.
The aspect that the present invention is additional and advantage in the following description part provide, and these will become obviously from the following description, or recognize by practice of the present invention.
Brief description of the drawings
The present invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments obviously and easily and understand, wherein:
Fig. 1 is the method flow diagram of authorizing between embodiment of the present invention subscriber equipment;
Fig. 2 A is the schematic diagram A of the setting of credible equipment;
Fig. 2 B is the schematic diagram B of the setting of credible equipment;
Fig. 3 is the schematic diagram that needs the behavior of authorizing;
Fig. 4 is the routine access list schematic diagram that needs mandate;
Fig. 5 is embodiment of the present invention user device architecture schematic diagram;
Fig. 6 utilizes believable equipment to carry out the flow chart of release;
Fig. 7 utilizes believable equipment to carry out the flow chart of function of surfing the Net restriction;
Fig. 8 utilizes believable equipment to carry out the flow chart of routine access restriction;
Fig. 9 is the schematic diagram of realizing credible equipment identification by NFC mode;
Figure 10 connects by WIFI Direct the schematic diagram of realizing credible equipment identification;
Figure 11 is the schematic diagram of realizing credible equipment identification by bluetooth approach;
Figure 12 is credible equipment licensing process schematic diagram.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of identical or similar functions from start to finish.Be exemplary below by the embodiment being described with reference to the drawings, only for explaining the present invention, and can not be interpreted as limitation of the present invention.
Unless those skilled in the art of the present technique are appreciated that specially statement, singulative used herein " ", " one ", " described " and " being somebody's turn to do " also can comprise plural form.Should be further understood that, the wording using in specification of the present invention " comprises " and refers to and have described feature, integer, step, operation, element and/or assembly, exists or adds one or more other features, integer, step, operation, element, assembly and/or their group but do not get rid of.Should be appreciated that, when we claim element to be " connected " or " coupling " when another element, it can be directly connected or coupled to other elements, or also can have intermediary element.In addition, " connection " used herein or " coupling " can comprise wireless connections or couple.Wording "and/or" used herein comprises arbitrary unit of listing item and all combinations that one or more is associated.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (comprising technical term and scientific terminology) have with the present invention under the identical meaning of the general understanding of those of ordinary skill in field.Should also be understood that such as those terms that define in general dictionary and should be understood to have the meaning consistent with meaning in the context of prior art, unless and definition as here, can not explain by idealized or too formal implication.
Those skilled in the art of the present technique are appreciated that, here " terminal " or " subscriber equipment " that used had both comprised the equipment only possessing without the wireless signal receiver of emissivities, comprised again having on bidirectional communication link, carrying out the reception of two-way communication and the equipment of transmitting hardware.This equipment can comprise: tool is with or without honeycomb or other communication equipments of multi-line display; Can combine voice and the PCS Personal Communications System (PCS) of data processing, fax and/or its communication ability; Can comprise the PDA(Personal Digital Assistant) of radio frequency receiver and beep-pager, the Internet/intranet access, web browser, notepad, calendar and/or global positioning system (GPS) receiver; And/or the routine that comprises radio frequency receiver is on knee and/or palmtop computer or other equipment.Here " terminal " that used or " subscriber equipment " can be portable, can transport, be arranged in the vehicles (aviation, sea-freight and/or land), or be suitable for and/or be configured to local runtime and/or with distribution form in the operation of any other position in the earth and/or space.Here " terminal " that used or " subscriber equipment " can also be communication terminal, access terminals, music/video playback terminal.Here " terminal " that used or " subscriber equipment " can also be PDA, MID and/or the mobile phone with music/video playing function etc.Here " terminal " that used or " subscriber equipment " can also be the equipment such as intelligent television, Set Top Box.
In order to realize the present invention's object, the present invention proposes, under given conditions, utilize credible equipment to authorize the behavior of other-end equipment, such as forgetting Password when, when moving some program, or want to control online etc., all can utilize this mode to authorize.Owing to being credible equipment mandate by setting in advance, therefore there is natural safety and reliability.
The embodiment of the present invention has proposed a kind of method of authorizing between subscriber equipment on the one hand, comprises the following steps:
Subscriber equipment, in the time that the machine operation needs the application through authorizing, obtains mandate to credible equipment;
When obtaining after mandate, the described application through authorizing of described subscriber equipment operation.
As shown in Figure 1, be the method flow diagram of authorizing between embodiment of the present invention subscriber equipment, comprise the following steps:
S110: subscriber equipment, in the time that the machine operation needs the application through authorizing, obtains mandate to credible equipment.
In step S110, subscriber equipment, in the time that the machine operation needs the application through authorizing, if connected with trusted users equipment, obtains mandate to the credible equipment connecting, otherwise needs to initiate to connect with other subscriber equipmenies, need look for credible equipment.
In addition, subscriber equipment before the machine operation needs the application through authorizing, also comprises credible equipment is set: subscriber equipment arranges credible equipment list, for example, corresponding subscriber equipment is recorded as to credible equipment; Or subscriber equipment and other subscriber equipmenies connect, and corresponding subscriber equipment is recorded as to credible equipment.
Therefore,, in order to realize the function such as mandate, monitoring between subscriber equipment, as embodiments of the invention, also comprise:
Credible equipment is other subscriber equipmenies that set in advance; Or
Subscriber equipment and other subscriber equipmenies connect, and judge the attribute of other subscriber equipmenies, determine whether other subscriber equipmenies are set to credible equipment.
Particularly, record credible equipment and be generally the indications that records credible equipment, wherein, indications includes but not limited to the mark of following one or more information energy unique identification subscriber equipmenies: MAC Address, Bluetooth address or MEID.
Thereafter, when subscriber equipment need to move through mandate application, to credible equipment obtain authorize time, connect with other subscriber equipmenies, obtain the indications of other subscriber equipmenies, in the time that indications indicates this subscriber equipment to be credible equipment, obtain mandate to this credible equipment.Particularly, connect following one or more modes that include but not limited to:
By mobile cellular network or computer network is long-range connects;
Connect by WIFI focus;
By near-field communication, NFC connects;
Connect by WIFI Direct;
Connect by Bluetooth.
By mobile cellular network or computer network is long-range connects, conventionally need to pass through long-range network equipment supplemental support, could realize and interconnecting.By direct-connected communication modes such as near-field communication NFC, WIFI Direct, bluetooths, can directly realize interconnecting of point-to-point.
As shown in Figure 2 A, be the schematic flow sheet A of the setting of credible equipment.
Enter and arrange after credible equipment, if user has known the indications of other subscriber equipmenies, credible equipment list can be directly set, for example, corresponding subscriber equipment is recorded as to credible equipment; More common mode is, select connected mode, the modes such as such as NFC, WIFI are direct-connected, Bluetooth are connected with other equipment, receive the data structure that comprises equipment indications that other equipment send after successful connection, obtain the indications information of other equipment; The data structure that comprises equipment indications is for example as shown in the table:
Connected mode Whether support For the unique ID identifying
01:NFC mode 1: support 0: do not support MEID
02:WIFI is direct-connected The same MAC?address
03: bluetooth The same BlueTooth?Address
Obtain after indications, if record before indications shows that this equipment has been credible equipment, otherwise keeps the indications of new credible equipment.In addition, for the already present situation of credible equipment, can select to keep trusted status, or select to delete this credible equipment.For example, people trusty changes mobile phone, needs to delete the record of original equipment.
For the ease of understanding the present invention, after by emphasis, in the mode that interconnects of point-to-point, the present invention will be described.
As shown in Figure 2 B, be the schematic flow sheet B of the setting of credible equipment.
Conventionally, subscriber equipment is all supported one or more in NFC, WIFI Direct, bluetooth, so when setting, at least need to support a kind of function wherein.Need to select the mode of both simultaneously supporting to arrange, when entering for the first time or be not also arranged to merits and demerits, can directly enter by input default password.Idiographic flow as shown in Figure 2.
NFC mode arranges credible equipment:
This short-range communication of NFC has natural fail safe.Open the NFC function of equipment, credible equipment is pressed close to, after sensing, NFC chip communicates, preserve a unique identification of credible equipment, can get a unique sequence number, or the unique coding of other hardware IDs with uniqueness as authentication time, whether this unique coding is used for difference equipment is credible equipment.NFC chip itself does not have unique ID, for example, so need to transmit other hardware ID, MAC Address, the mark of the energy such as MEID unique identification subscriber equipment.
The direct-connected mode of WIFI arranges credible equipment:
The direct-connected function of WIFI of opening subscriber equipment and other equipment, subscriber equipment preserves the MAC Address of the credible equipment of needs setting as unique legal mark, and this mark is as the later whether believable unique coding of authentication equipment.
Bluetooth approach arranges credible equipment:
Bluetooth approach is similar with the direct-connected mode of WIFI, preserves the bluetooth hardware address of equipment as the whether believable unique coding of authentication equipment.
In order to realize the effective control to application, as shown in Figure 3, Figure 4, for the behavior that subscriber equipment need to be authorized is set.After these behaviors are set, only have by the behavior of credible equipment mandate later and could carry out.Wherein, Fig. 3 is the schematic diagram that needs the behavior of authorizing, and Fig. 4 is the routine access list schematic diagram that needs mandate.
Particularly, described needs includes but not limited to following one or more application through the application of mandate:
Modify password; Change subscriber card; Access the Internet; Data access; Run application.
Furthermore, when subscriber equipment obtains mandate to credible equipment, in mandate, also comprise the time range of accessing application-specific.
S120: when obtaining after mandate, the application of subscriber equipment operation through authorizing.
Therefore, under given conditions, the said method proposing according to the present invention, utilize credible equipment to authorize the behavior of other-end equipment, such as forgetting Password when, when moving some program, or want to control online etc., all can utilize this mode to authorize.Owing to being credible equipment mandate by setting in advance, therefore there is natural safety and reliability.
Based on said method, as shown in Figure 5, the embodiment of the present invention has also proposed a kind of subscriber equipment 100 on the other hand, comprises authorization module 110 and operation module 120.
Wherein, authorization module 110 is for obtaining mandate to credible equipment; In the time that the machine operation needs the application through authorizing, when authorization module 110 obtains after credible equipment mandate, operation module 120 is for moving the application through authorizing.
As the embodiment of above-mentioned subscriber equipment 100, also comprise communication module 130 and memory module 140,
Communication module 130 is for connecting with other subscriber equipmenies;
Memory module 140 is for being recorded as credible equipment by corresponding subscriber equipment.
As the embodiment of above-mentioned subscriber equipment 100, memory module 140 is for recording the indications of credible equipment, and indications comprises following one or more information:
MAC Address, Bluetooth address or MEID.
As the embodiment of above-mentioned subscriber equipment 100, authorization module 110 comprises for obtaining to credible equipment to authorize:
Communication module 130 connects with other subscriber equipmenies, obtains the indications of other subscriber equipmenies; In the time that authorization module 110 judges that indications indicates other subscriber equipmenies to be credible equipment, obtain mandate to credible equipment.
As the embodiment of above-mentioned subscriber equipment 100, the connection that communication module 130 is set up comprises following one or more modes:
By mobile cellular network or computer network is long-range connects;
Connect by WIFI focus;
By near-field communication, NFC connects;
Connect by WIFI Direct;
Connect by Bluetooth.
As the embodiment of above-mentioned subscriber equipment 100, need the application through authorizing to include but not limited to following one or more application:
Modify password;
Change subscriber card;
Access the Internet;
Data access;
Run application.
As the embodiment of above-mentioned subscriber equipment 100, when authorization module 110 obtains mandate to credible equipment, authorize and also comprise the time range that allows access application.
As the embodiment of above-mentioned subscriber equipment 100, subscriber equipment 100 includes but not limited to mobile phone, personal digital assistant PDA or panel computer etc.
Therefore, under given conditions, the said equipment proposing according to the present invention, utilize credible equipment to authorize the behavior of other-end equipment, such as forgetting Password when, when moving some program, or want to control online etc., all can utilize this mode to authorize.Owing to being credible equipment mandate by setting in advance, therefore there is natural safety and reliability.
For the ease of understanding the present invention, below in conjunction with concrete application and concrete communication mode, the said method that the present invention is proposed or equipment are done further for example.
As embodiments of the invention, for example, in the time that smart phone user unlocking pin is forgotten, cannot enter main interface, now need a reliable method to authorize also release so that reset password.Owing to having set before the NFC authorization of credible equipment, and be also provided with unlocking pin and forget the mode of mandate.Now can allow another mobile phone that is configured to credible equipment authorize mobile phone near waiting for gently, enter password reset interface after authorizing successfully.
Again for example, mobile phone is lost, and is found while wanting to use by other people, carries out subscriber card replacing, and subscriber card includes but not limited to SIM card or UIM card.Other people again start shooting and enter need to authorize interface time, because there is no credible equipment mandate, so cannot enter main menu, cannot use, have effectively protected owner's personal information.If oneself changes card, only need to pass through credible mobile phone mandate, just can enter main menu and normally use.
As shown in Figure 6, for utilizing believable equipment to carry out the flow chart of release.After unlocking pin is forgotten, enter the state of authorizing release; Selecting the authorization of credible equipment, for example, is the direct-connected or bluetooth of NFC, WIFI, correspondingly, connects, identifies credible equipment by corresponding mode; Its backward credible equipment obtains mandate, if authorize authentication success, new unlocking pin is set, otherwise returns to screen locking interface for password input.
As embodiments of the invention, for example, student's carrying mobile phone is gone to school, and in school, taking study as main, function of surfing the Net, games cannot move due to no authorized.After student comes back home, complete after homework, want to relax, due to credible equipment setting is the head of a family's mobile phone, the head of a family agrees to, after student's request, authorize by the mobile phone of oneself, decontrols the online of certain hour and the access function of Games Software.
As shown in Figure 7, for utilizing believable equipment to carry out the flow chart of function of surfing the Net restriction.When user thinks accesses network, enter the state of function of surfing the Net mandate; Selecting the authorization of credible equipment, for example, is the direct-connected or bluetooth of NFC, WIFI, correspondingly, connects, identifies credible equipment by corresponding mode; Its backward credible equipment obtains mandate, if authorize authentication success, reads and authorizes the time the granted access network that allow.
As shown in Figure 8, for utilizing believable equipment to carry out the flow chart of routine access restriction.In the time wanting to move angry bird application program, enter the state of authorizing release; Selecting the authorization of credible equipment, for example, is the direct-connected or bluetooth of NFC, WIFI, correspondingly, connects, identifies credible equipment by corresponding mode; Its backward credible equipment obtains mandate, if authorize authentication success, reads the time the working procedure that allow to authorize working procedure, otherwise returns out of service.
Correspondingly, furthermore, Fig. 9 is the schematic diagram of realizing credible equipment identification by NFC mode; Figure 10 connects by WIFI Direct the schematic diagram of realizing credible equipment identification; Figure 11 is the schematic diagram of realizing credible equipment identification by bluetooth approach.After connecting, obtain the indications such as coding, ID or physical address of equipment, if consistent with the indications of the credible equipment of record, by credible equipment authentication, send authenticating result to credible equipment.
As shown in figure 12, be credible equipment licensing process schematic diagram, subscriber equipment sends request Request, then credible equipment response Response.
Particularly, the data structure of subscriber equipment transmission Request is for example as shown in the table:
Request type Required parameter
01: password is forgotten Null
02: change card Null
03: program operation Program name
04: other Other
The data structure of credible equipment Response is for example as shown in the table:
Request type Whether agree to Parameter
01: password is forgotten 1: agree to; 0: disagree with ?
03: program operation 1: agree to; 0: disagree with Time span
Other: type is mated with request The same ?
Thereafter, subscriber equipment is carried out corresponding operation according to the result of Response, if agreed to, and the behavior of operation request; If request is not agreed, returns and exit.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is can carry out the hardware that instruction is relevant by program to complete, described program can be stored in a kind of computer-readable recording medium, this program, in the time carrying out, comprises step of embodiment of the method one or a combination set of.
In addition, the each functional unit in each embodiment of the present invention can be integrated in a processing module, can be also that the independent physics of unit exists, and also can be integrated in a module two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and also can adopt the form of software function module to realize.If described integrated module realizes and during as production marketing independently or use, also can be stored in a computer read/write memory medium using the form of software function module.The above-mentioned storage medium of mentioning can be read-only memory, disk or CD etc.
The above is only part execution mode of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (15)

1. a method of authorizing between subscriber equipment, is characterized in that, comprises the following steps:
Subscriber equipment, in the time that the machine operation needs the application through authorizing, obtains mandate to credible equipment;
When obtaining after mandate, the described application through authorizing of described subscriber equipment operation.
2. the method for authorizing between subscriber equipment as claimed in claim 1, is characterized in that, subscriber equipment, before the machine operation needs the application through authorizing, also comprises credible equipment is set:
Described subscriber equipment arranges credible equipment list corresponding subscriber equipment is recorded as to credible equipment; Or described subscriber equipment and other subscriber equipmenies connect, and corresponding subscriber equipment is recorded as to credible equipment.
3. the method for authorizing between subscriber equipment as claimed in claim 2, is characterized in that, the described credible equipment that records is the indications that records described credible equipment, and described indications comprises following one or more information:
MAC Address, Bluetooth address or MEID.
4. the method for authorizing between subscriber equipment as claimed in claim 3, is characterized in that, obtains to authorize to comprise to credible equipment:
Described subscriber equipment and other subscriber equipmenies connect, and obtain the indications of described other subscriber equipmenies, in the time that described other subscriber equipmenies of described indications instruction are credible equipment, obtain mandate to described credible equipment.
5. the method for authorizing between the subscriber equipment as described in one of as any in claim 2 or 4, is characterized in that, described connection comprises following one or more modes:
By mobile cellular network or computer network is long-range connects;
Connect by WIFI focus;
By near-field communication, NFC connects;
Connect by WIFI Direct;
Connect by Bluetooth.
6. the method for authorizing between subscriber equipment as claimed in claim 1, is characterized in that, described needs comprises following one or more application through the application of mandate:
Modify password;
Change subscriber card;
Access the Internet;
Data access;
Run application.
7. the method for authorizing between subscriber equipment as claimed in claim 6, is characterized in that, when described subscriber equipment obtains mandate to credible equipment, described mandate also comprises the time range that allows the described application of access.
8. a subscriber equipment, is characterized in that, comprises authorization module and operation module,
Described authorization module, for obtaining mandate to credible equipment;
Described operation module, in the time that the machine operation needs the application through authorizing, when described authorization module obtains after credible equipment mandate, for moving the described application through authorizing.
9. subscriber equipment as claimed in claim 8, is characterized in that, also comprises communication module and memory module,
Described communication module, for connecting with other subscriber equipmenies;
Described memory module, for being recorded as credible equipment by corresponding subscriber equipment.
10. subscriber equipment as claimed in claim 9, is characterized in that, described memory module is for recording the indications of described credible equipment, and described indications comprises following one or more information:
MAC Address, Bluetooth address or MEID.
11. subscriber equipmenies as claimed in claim 10, is characterized in that, described authorization module comprises for obtaining to credible equipment to authorize:
Described communication module and other subscriber equipmenies connect, and obtain the indications of described other subscriber equipmenies; In the time that described authorization module judges that described other subscriber equipmenies of described indications instruction are credible equipment, obtain mandate to described credible equipment.
12. subscriber equipmenies as described in one of as any in claim 9 or 11, the connection that described communication module is set up comprises following one or more modes:
By mobile cellular network or computer network is long-range connects;
Connect by WIFI focus;
By near-field communication, NFC connects;
Connect by WIFI Direct;
Connect by Bluetooth.
13. subscriber equipmenies as claimed in claim 8, is characterized in that, described needs comprises following one or more application through the application of mandate:
Modify password;
Change subscriber card;
Access the Internet;
Data access;
Run application.
14. subscriber equipmenies as claimed in claim 13, is characterized in that, when described authorization module obtains mandate to credible equipment, described mandate also comprises the time range that allows the described application of access.
15. subscriber equipmenies as claimed in claim 9, is characterized in that, described subscriber equipment comprises mobile phone, personal digital assistant PDA or panel computer.
CN201210519658.4A 2012-12-06 2012-12-06 The method and device authorized between subscriber equipment Active CN103856621B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210519658.4A CN103856621B (en) 2012-12-06 2012-12-06 The method and device authorized between subscriber equipment
CN201610455029.8A CN106060259B (en) 2012-12-06 2012-12-06 Method and device for authorization between user equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210519658.4A CN103856621B (en) 2012-12-06 2012-12-06 The method and device authorized between subscriber equipment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201610455029.8A Division CN106060259B (en) 2012-12-06 2012-12-06 Method and device for authorization between user equipment

Publications (2)

Publication Number Publication Date
CN103856621A true CN103856621A (en) 2014-06-11
CN103856621B CN103856621B (en) 2016-08-17

Family

ID=50863818

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201210519658.4A Active CN103856621B (en) 2012-12-06 2012-12-06 The method and device authorized between subscriber equipment
CN201610455029.8A Active CN106060259B (en) 2012-12-06 2012-12-06 Method and device for authorization between user equipment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201610455029.8A Active CN106060259B (en) 2012-12-06 2012-12-06 Method and device for authorization between user equipment

Country Status (1)

Country Link
CN (2) CN103856621B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104166818A (en) * 2014-07-02 2014-11-26 百度在线网络技术(北京)有限公司 Authority control method, device and system
CN104751035A (en) * 2015-03-26 2015-07-01 广东欧珀移动通信有限公司 Unlocking method and device of intelligent terminal
CN105592071A (en) * 2015-11-16 2016-05-18 ***股份有限公司 Method and device for authorization between devices
CN106791037A (en) * 2016-11-30 2017-05-31 腾讯科技(深圳)有限公司 Operation triggering method, equipment and system
CN113111316A (en) * 2021-04-22 2021-07-13 北京天空卫士网络安全技术有限公司 Method, device and system for application authorization management

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614785B (en) * 2018-11-01 2021-05-25 Oppo广东移动通信有限公司 Application operation control method and device, storage medium and electronic equipment
CN111783065A (en) * 2020-06-30 2020-10-16 上海闻泰电子科技有限公司 Authorization method and device based on two-dimension code, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068383A (en) * 2007-06-18 2007-11-07 中兴通讯股份有限公司 Student terminal configuration method and system based on terminal management business
CN101790126A (en) * 2009-12-16 2010-07-28 惠州Tcl移动通信有限公司 Mobile communication terminal with limitative function and realizing method thereof
CN101951495A (en) * 2010-09-10 2011-01-19 深圳市华曦达科技股份有限公司 System and method for authorizing digital television to play television program by mobile communication terminal
CN102340400A (en) * 2010-03-26 2012-02-01 英特尔公司 Method and apparatus for bearer and server independent parental control of a smartphone, using a second smartphone
CN102413236A (en) * 2011-11-09 2012-04-11 希姆通信息技术(上海)有限公司 Method for managing functions of mobile phone and mobile phone

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098230B (en) * 2006-06-29 2010-12-08 联想(北京)有限公司 Method and system for checking user facility operation application
US8474004B2 (en) * 2006-07-31 2013-06-25 Telecom Italia S.P.A. System for implementing security on telecommunications terminals
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068383A (en) * 2007-06-18 2007-11-07 中兴通讯股份有限公司 Student terminal configuration method and system based on terminal management business
CN101790126A (en) * 2009-12-16 2010-07-28 惠州Tcl移动通信有限公司 Mobile communication terminal with limitative function and realizing method thereof
CN102340400A (en) * 2010-03-26 2012-02-01 英特尔公司 Method and apparatus for bearer and server independent parental control of a smartphone, using a second smartphone
CN101951495A (en) * 2010-09-10 2011-01-19 深圳市华曦达科技股份有限公司 System and method for authorizing digital television to play television program by mobile communication terminal
CN102413236A (en) * 2011-11-09 2012-04-11 希姆通信息技术(上海)有限公司 Method for managing functions of mobile phone and mobile phone

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104166818A (en) * 2014-07-02 2014-11-26 百度在线网络技术(北京)有限公司 Authority control method, device and system
CN104166818B (en) * 2014-07-02 2018-01-09 百度在线网络技术(北京)有限公司 authority control method, device and system
CN104751035A (en) * 2015-03-26 2015-07-01 广东欧珀移动通信有限公司 Unlocking method and device of intelligent terminal
CN105592071A (en) * 2015-11-16 2016-05-18 ***股份有限公司 Method and device for authorization between devices
WO2017084553A1 (en) * 2015-11-16 2017-05-26 ***股份有限公司 Method and apparatus for performing authorization between devices
TWI636373B (en) * 2015-11-16 2018-09-21 中國銀聯股份有限公司 Method and device for authorizing between devices
CN106791037A (en) * 2016-11-30 2017-05-31 腾讯科技(深圳)有限公司 Operation triggering method, equipment and system
CN113111316A (en) * 2021-04-22 2021-07-13 北京天空卫士网络安全技术有限公司 Method, device and system for application authorization management

Also Published As

Publication number Publication date
CN103856621B (en) 2016-08-17
CN106060259B (en) 2020-02-11
CN106060259A (en) 2016-10-26

Similar Documents

Publication Publication Date Title
CN103856621A (en) Method and device for authorization between user devices
JP4726950B2 (en) Mobile phone and access control method
CN101543099B (en) Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses
CN104637131B (en) A kind of access control system authorization method, device and access control system
CN100498690C (en) Secure device, terminal device, gate device, system and method
US9307317B2 (en) Wireless programmable microphone apparatus and system for integrated surveillance system devices
EP3116161B1 (en) Security unit management method and terminal
CN102243590B (en) Method for being communicated between the application program and Vehicular system on external equipment
KR102232966B1 (en) Un-tact digital key service system and method thereof
CN104618584A (en) Method and system for switching intelligent terminal safe work mode
JP2007537680A (en) Authentication wireless phone system
CN103686722A (en) Access control method and device
CN101493867A (en) Method and system for mutually transmitting shared data safely between mobile phone and computer
US20120259480A1 (en) Vehicle-mounted device, method for activating the vehicle-mounted device and vehicle-mounted system
CN102546530A (en) Method, device and ERP (enterprise resource planning) system for user identity and permission validation
CN100593786C (en) Sytem and method for providing access to OMA DRM protected files from JAVA applications
TW201330579A (en) Near field communication electronic device, login system using the same and method thereof
CN101145812A (en) Apparatus and method for controlling bluetooth in portable terminal
CN103905191A (en) Verification method applied to mobile terminal, mobile terminal and system
US20160381552A1 (en) Handling risk events for a mobile device
CN102542206A (en) Method and device for adding authorized users to terminal
CN106776066A (en) Multi-system function processing method and device
CN114554444A (en) Virtual SIM for vehicle
EP1860605A1 (en) Electronic money system, information storage medium, and mobile terminal device
KR100862742B1 (en) Method for computer preservation using mobile and device thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant