CN107005578A - Authority control method, authority controlled device, electronic equipment and system - Google Patents
Authority control method, authority controlled device, electronic equipment and system Download PDFInfo
- Publication number
- CN107005578A CN107005578A CN201780000069.6A CN201780000069A CN107005578A CN 107005578 A CN107005578 A CN 107005578A CN 201780000069 A CN201780000069 A CN 201780000069A CN 107005578 A CN107005578 A CN 107005578A
- Authority
- CN
- China
- Prior art keywords
- authority
- control
- information
- region
- controlled end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Embodiment of the invention discloses that authority control method, authority controlled device, electronic equipment and system, are related to communication technical field.Methods described includes:When authority controlled end is in the effective coverage of control of authority information transfer, the control of authority information is obtained;The control of authority information is interpreted to according to default Explanation way by the permissions data for authentication;The permissions data is authenticated;When the authentication passes through, it is allowed to perform corresponding operation.Embodiments of the invention can reduce the risk of control of authority, and according to the physical location of authority controlled end come the authority of control authority controlled end.
Description
Technical field
Technical scheme disclosed by the invention is related to communication technical field, more particularly to the controlled dress of authority control method, authority
Put, electronic equipment and system.
Background technology
As the communication technology, computer technology are developed rapidly, the privacy problem of information becomes increasingly serious.Therefore, it is right
In information acquisition and using need carry out control of authority.For example, the access rights of website, database, file etc. are set, if
Put the access right of application software.
Inventor has found that in the prior art, the technological means of control authority is mainly to test during the present invention is studied
Demonstrate,prove account and password.Because account and password there is a possibility that to leak and crack, therefore controlled by verifying account and password
Authority processed still suffers from higher risk.In addition, in the prior art can not be according to the physical location of authority controlled end come control
Limit the authority of controlled end.
Therefore, in the prior art there is higher risk and can not be according to the physical location of authority controlled end in control of authority
Carry out the authority of control authority controlled end, it becomes technical problem urgently to be resolved hurrily.
The content of the invention
Technical scheme disclosed by the invention at least can solve the problem that following technical problem:Control of authority exist higher risk with
And can not be according to the physical location of authority controlled end come the authority of control authority controlled end.
One or more embodiment of the present invention discloses a kind of authority control method, including:At authority controlled end
When in the effective coverage of control of authority information transfer, the control of authority information is obtained;According to default Explanation way by institute
State control of authority information and be interpreted to permissions data for authentication;The permissions data is authenticated;When the authentication passes through
When, it is allowed to perform corresponding operation.
In one or more embodiment of the present invention, methods described also includes:Judge the control of authority information
Whether transmission path is default transmission path;When the transmission path of the control of authority information does not meet default transmission path
When, forbid performing corresponding operation.
In one or more embodiment of the present invention, methods described also includes:By the control of authority information transfer
Effective coverage be divided into N number of region;When authority controlled end is in the different zones in N number of region, the authority by
The control of authority information that control end is got is different;Wherein, N is >=2 integer.
In one or more embodiment of the present invention, methods described also includes:When authority controlled end is positioned at described N number of
When in any one region in region, the control of authority information that the authority controlled end is got in the different periods is not
Together.
In one or more embodiment of the present invention, the control of authority information is obtained by wireless network;It is described
Wireless network includes:ZigBee signal networks and/or Bluetooth signal network and/or WIFI signal network.
One or more embodiment of the present invention discloses a kind of authority controlled device, including:Transceiver module, for working as
When authority controlled end is in the effective coverage of control of authority information transfer, the control of authority information is obtained;Read through model is solved, is used
In the control of authority information to be interpreted to the permissions data for authentication according to default Explanation way;Authentication module, is used for
The permissions data is authenticated;Application module, for when the authentication passes through, it is allowed to perform corresponding operation.
In one or more embodiment of the present invention, the authentication module is additionally operable to judge the control of authority information
Transmission path whether be default transmission path;When the transmission path of the control of authority information does not meet default transmission road
During footpath, the application module is forbidden performing corresponding operation.
In one or more embodiment of the present invention, the effective coverage of the control of authority information transfer is divided into
N number of region;When authority controlled device is in the different zones in N number of region, it is described that the transceiver module is got
Control of authority information is different;Wherein, N is >=2 integer.
In one or more embodiment of the present invention, when authority controlled device is located at any one of N number of region
When in individual region, the control of authority information that the transceiver module is got in the different periods is different.
One or more embodiment of the present invention discloses a kind of electronic equipment, including:At least one processor, and
At least one memory;At least one described processor is connected with least one described memory communication;It is described at least one deposit
Reservoir is stored with can be by the instruction of at least one computing device, so that the electronic equipment is above-mentioned any one for performing
Plant authority control method.
One or more embodiment of the present invention discloses a kind of authority control system, including at least one rights service
End and at least one authority controlled end;At least one described rights service end is used to generate and sending permission control information;Institute
Stating at least one authority controlled end is used to perform any one above-mentioned authority control method.
In one or more embodiment of the present invention, at least one described rights service end is serviced including at least one
The base station of device and at least one wireless network;The base station of at least one described server and at least one wireless network leads to
Letter connection;At least one described server is used to generate the control of authority information;The base station of at least one wireless network
For sending the control of authority information.
In one or more embodiment of the present invention, the effective coverage of control of authority information transfer is divided into N number of
Region, the base station of a few wireless network is respectively provided in N number of region;At least one described server is described N number of
The different control of authority information of Area generation;The base station of at least one wireless network, sends corresponding with its region
Control of authority information;Wherein, N is >=2 integer.
In one or more embodiment of the present invention, at least one described server is the difference in N number of region
Period generates different control of authority information.
In one or more embodiment of the present invention, at least one described server is according at least one described authority
The control of authority information that controlled end is received judges the region residing at least one described authority controlled end.
In one or more embodiment of the present invention, at least one described authority controlled end is according to its reception
Control of authority information judges the region residing for it.
One or more embodiment of the present invention also discloses a kind of non-transient computer storage medium, the computer
Storage medium is stored with computer executable instructions, and the computer executable instructions are used to perform any one above-mentioned authority control
Method processed.
Compared with prior art, technical scheme disclosed by the invention mainly has following beneficial effect:
In an embodiment of the present invention, when authority controlled end is in the effective coverage of control of authority information transfer, obtain
Take the control of authority information.Thus, when authority controlled end is removed in the effective coverage of control of authority information transfer, it is impossible to
The control of authority information is obtained, namely defines that the authority controlled end performs corresponding operation.Then, according to default solution
The control of authority information is interpreted to the permissions data for authentication by read mode.If default solution is not present in authority controlled end
The control of authority information can not be interpreted to the permissions data for authentication by read mode or default Explanation way, then described
Authority controlled end can not perform corresponding operation.Then the permissions data is authenticated;When the authentication passes through, it is allowed to
Perform corresponding operation.In summary, the authority control method can reduce the risk of control of authority, and controlled according to authority
The physical location at end carrys out the authority of control authority controlled end.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be attached to what is used required in embodiment
Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this area
For those of ordinary skill, without having to pay creative labor, it can also be obtained according to these accompanying drawings other attached
Figure.
Fig. 1 is the flow chart of authority control method in one embodiment of the invention;
Fig. 2 is the schematic diagram of electronic equipment in another embodiment of the present invention;
Fig. 3 is the schematic diagram of authority controlled device in another embodiment of the present invention;
Fig. 4 is the schematic diagram of authority control system in another embodiment of the present invention;
Fig. 5 be another embodiment of the present invention in authority control system schematic diagram.
Embodiment
For the ease of understanding the present invention, the present invention is described more fully below with reference to relevant drawings.In accompanying drawing
Give presently preferred embodiments of the present invention.But, the present invention can be realized in many different forms, however it is not limited to this paper institutes
The embodiment of description.On the contrary, the purpose for providing these embodiments is to make the understanding to the disclosure more thorough
Comprehensively.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention
The implication that technical staff is generally understood that is identical.Term used in the description of the invention herein is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.
It is the flow chart of authority control method in one embodiment of the invention with reference to Fig. 1.The authority control method application
In authority controlled end.The authority controlled end include smart mobile phone, tablet personal computer, notebook computer, wearable device etc. its
He has the terminal device of communication function.The authority control method includes:
Step 101:When authority controlled end is in the effective coverage of control of authority information transfer, the authority control is obtained
Information processed.
The effective coverage refers to that the authority controlled end can effectively receive the wireless network of the control of authority information
Network distributed areas.
Step 102:The control of authority information is interpreted to according to default Explanation way by the permissions data for authentication.
Deciphering can be understood as:Executive program instruction calculates the process of data.
Step 103:The permissions data is authenticated.
Step 104:When the authentication passes through, it is allowed to perform corresponding operation.
For example, the authority of particular document is accessed using above method control authority controlled end.When user needs to access
, it is necessary to authority controlled end is moved in the effective coverage of control of authority information transfer during the particular document.Authority controlled end
Control of authority information can be got in the effective coverage of the control of authority information transfer.If authority controlled end is not located at
In the effective coverage of control of authority information transfer, or authority controlled end can not get control of authority information, then user can not
The particular document is accessed by the authority controlled end.
If authority controlled end gets control of authority information, the control of authority is believed according to default Explanation way
Breath is interpreted to the permissions data for authentication.But, if default Explanation way or default is not present in authority controlled end
The control of authority information can not be interpreted to the permissions data for authentication by Explanation way, then user can not still pass through the power
Limit controlled end and access the particular document.Accordingly, methods described in the default deciphering control of authority of authority controlled end by believing
The mode of breath, enhances the security of control of authority.
If the control of authority information can be interpreted to for authenticating by authority controlled end according to default Explanation way
Permissions data, further the permissions data will be authenticated, only when it is described authentication pass through when, can just allow to perform visit
Ask the operation of particular document.
In some embodiments of the invention, it is described that permissions data progress authentication is included:Judge the authority number
According to whether including default feature.For example, judging whether the permissions data includes default check code.
In some embodiments of the invention, methods described also includes:Judge the transmission path of the control of authority information
Whether it is default transmission path;When the transmission path of the control of authority information does not meet default transmission path, forbid
Perform corresponding operation.Accordingly, by limiting the transmission path of the control of authority information, be conducive to taking precautions against the authority control forged
Information processed.
In some embodiments of the invention, methods described also includes:By the effective district of the control of authority information transfer
Domain is divided into N number of region;When authority controlled end is in the different zones in N number of region, the authority controlled end is obtained
The control of authority information arrived is different;Wherein, N is >=2 integer.Accordingly, not advising for the control of authority information is enhanced
Then property, while also carrying out Positioning Creates condition to the authority controlled end to realize.
For example, it is assumed that the effective coverage of the control of authority information transfer is divided into 2 regions, respectively A areas
Domain and B regions.Then when the authority controlled end is in the different zones in 2 regions, the authority controlled end is obtained
The control of authority information arrived is different.That is, the control of authority information that is got in a-quadrant of the authority controlled end with its
The control of authority information that B regions are got is different.
In some embodiments of the invention, methods described also includes:When authority controlled end is located at appointing for N number of region
When anticipating in a region, the control of authority information that the authority controlled end is got in the different periods is different.Due to
In the different time sections of the same area, the control of authority information that the authority controlled end is got is different, thus the power
Limit controlled end can not use same control of authority information to perform corresponding operation by authenticating in the different periods.Avoid institute
State authority controlled end and bypass this particular step of acquisition control of authority information in the effective coverage of control of authority information transfer, profit
With stored control of authority information corresponding operation is performed by authenticating.Be conducive to further enhancing the safety of control of authority
Property.
In some embodiments of the invention, methods described also includes:The control of authority is obtained by wireless network to believe
Breath;The wireless network includes:ZigBee signal networks and/or Bluetooth signal network and/or WIFI signal network.
The scene of above-mentioned any one authority control method application includes:Control, which accesses the authority of particular document, control, to be made
The other application scenes such as the authority of software specific function are used with the authority of specific software, control.Control of authority of the present invention
The application scenarios of method are not limited to above-mentioned application scenarios.
In the various application scenarios of above-mentioned authority control method, authority control method can disclosed in the embodiment of the present invention
Physical location according to where authority controlled end carries out control of authority.It is assumed that the effective coverage of control of authority information transfer is set
It is set to the Administrative Area of company, user implements above-mentioned various application scenarios by equipment such as notebook computer, mobile terminals.When
When the equipment such as user's carrying notebook computer, mobile terminal leave the Administrative Area of company, the notes that user carries
The equipment such as this computer, mobile terminal will be obtained less than control of authority information, also just not possess the authority for performing corresponding operating.Example
Such as, user carries the equipment such as the notebook computer, mobile terminal and left after the Administrative Area of company, it is impossible to access specific text
Shelves." particular document " can be the document for including Company Confidential information.For another example user's carrying notebook computer,
The equipment such as mobile terminal are left after the Administrative Area of company, it is impossible to use specific software." specific software " can be pair
The software for some business of software or development company that the product of company is designed.In another example, user carries the notebook
The equipment such as computer, mobile terminal are left after the Administrative Area of company, it is impossible to use the specific function of some product design softwares.
" specific function " can be introduced into the function of some design parameters, can also be and carry out Automatic Optimal to some design considerations
Function.
It is the schematic diagram of electronic equipment in another embodiment of the present invention with reference to Fig. 2.The electronic equipment includes intelligent hand
The other-end equipment such as machine, tablet personal computer, notebook computer, wearable device.
The electronic equipment includes:At least one processor 210, and at least one memory 220;It is described at least one
Processor 210 is communicated to connect with least one described memory 220.In Fig. 2 exemplified by being connected by bus 230.
At least one described memory 220 is stored with the instruction that can be performed by least one described processor 210, so that institute
Stating electronic equipment is used to perform any one authority control method in above method embodiment.
Memory 220 is as a kind of non-transient computer readable storage medium storing program for executing, available for storing non-transient software program, non-
Transient computer executable program etc..Processor 210 is by running the non-transient software program being stored in memory 220, referring to
Order so that electronic equipment performs various function application and data processing.
Memory 220 can include storing program area and storage data field, wherein, storing program area can store operation system
Application program required for system, at least one function;Storage data field can data storage etc..In addition, memory 220 can include
High-speed random access memory, can also include non-transient memory, for example, at least one disk memory, flush memory device,
Or other non-transient solid-state memories.In certain embodiments, memory 220 is optional including long-range relative to processor 210
The memory of setting, these remote memories can pass through network connection to the electronic equipment.
In some embodiments of the invention, the electronic equipment also includes input unit and output device.Input unit
The numeral or character information of input can be received, and produces signal input.Output device may include the display devices such as display screen.
Electronic equipment in above-described embodiment, can be by performing any one control of authority side in above method embodiment
Method, realizes the control of authority to the electronic equipment, and then reduces the risk of control of authority, is conducive to the secrecy of information.
It is the schematic diagram of authority controlled device in another embodiment of the present invention with reference to Fig. 3, it is real for performing the above method
Apply any one authority control method in example.
The authority controlled device includes:
Transceiver module 310, for when authority controlled end is in the effective coverage of control of authority information transfer, obtaining institute
State control of authority information.
Read through model 320 is solved, for the control of authority information to be interpreted to for authentication according to default Explanation way
Permissions data.
Authentication module 330, for being authenticated to the permissions data.
Application module 340, for when the authentication passes through, it is allowed to perform corresponding operation.
In some embodiments of the invention, the authentication module 330 is additionally operable to judge the biography of the control of authority information
Whether defeated path is default transmission path;When the transmission path of the control of authority information does not meet default transmission path
When, the application module 340 is forbidden performing corresponding operation.
In some embodiments of the invention, the effective coverage of the control of authority information transfer is divided into N number of region;
When authority controlled device is in the different zones in N number of region, the authority control that the transceiver module 310 is got
Information processed is different;Wherein, N is >=2 integer.
In some embodiments of the invention, when authority controlled device is located in any one region in N number of region
When, the control of authority information that the transceiver module 310 is got in the different periods is different.
Authority controlled device in above-described embodiment is present in authority controlled end, by performing in above method embodiment
Any one authority control method, reduce the control of authority risk to authority controlled end, and can be according to the controlled dress of authority
The physical location put carrys out the authority of control authority controlled device.
Another embodiment of the present invention discloses a kind of authority control system.The authority control system is weighed including at least one
Limit service end and at least one authority controlled end;At least one described rights service end is used to generate and sending permission controls letter
Breath;At least one described authority controlled end is used to perform any one authority control method in above method embodiment.
It is the schematic diagram of authority control system in another embodiment of the present invention with reference to Fig. 4.When authority controlled end is in power
When limiting in the effective coverage of control information transmission, the authority controlled end can get the control of authority information.Authority by
The control of authority information is interpreted to permissions data for authentication by control end according to default Explanation way, then to the power
Limit data are authenticated, when the authentication passes through, it is allowed to perform corresponding operation.
When the authority controlled end is removed in the effective coverage of control of authority information transfer, the authority controlled end can not
Enough get the control of authority information.Thus, the authority controlled end can not perform corresponding operation, and then realize to described
The control of authority of authority controlled end.
In some embodiments of the invention, at least one described rights service end includes at least one server and extremely
The base station of a few wireless network;At least one described server is connected with the base station communication of at least one wireless network;
At least one described server is used to generate the control of authority information;The base station of at least one wireless network is used to send
The control of authority information.
In some embodiments of the invention, the effective coverage of control of authority information transfer is divided into N number of region, in institute
State the base station that N number of region is respectively provided to a few wireless network;At least one described server be N number of Area generation not
Same control of authority information;The base station of at least one wireless network, sends the control of authority corresponding with its region
Information;Wherein, N is >=2 integer.Namely N number of region forms mapping relations from different control of authority information.
In some embodiments of the invention, at least one described server is given birth to for the different time sections in N number of region
Into different control of authority information.
In some embodiments of the invention, because N number of region from different control of authority information forms mapping
Relation, accordingly, the control of authority information that at least one described server is received according at least one described authority controlled end
Judge the region residing at least one described authority controlled end.
In some embodiments of the invention, also due to N number of region is formd from different control of authority information
Mapping relations, thus the control of authority information that is received according to it of at least one described authority controlled end judge it residing for area
Domain.
For example, the authority control system in another embodiment of the present invention demonstrated in Figure 5.The control of authority system
The effective coverage of control of authority information transfer is divided into 8 regions by system, and the base of wireless network is respectively arranged with 8 regions
Stand.The server is the different control of authority information of 88 kinds of Area generations.The base station hair of wireless network in each region
Send the control of authority information corresponding with its region.As needed, when the server is also the difference in 8 regions
Between section generate different control of authority information.When the server needs to know the location of described authority controlled end, institute
State the control of authority information that server receives according to the authority controlled end and judge that the authority controlled end is located at 8 regions
In which region.In addition, when the authority controlled end needs to know the location of its own, the authority controlled end
Its which region being located in 8 regions is judged according to the control of authority information of its reception.
Authority control system in above-described embodiment, can be existed by the control of authority information received according to authority controlled end
Authority controlled end is positioned in the effective coverage of control of authority information transfer, thus can be according to authority controlled end described
Position in effective coverage carries out further control of authority, namely the realization power in the effective coverage of control of authority information transfer
Limit the variation of control.For example, the effective coverage of the control of authority information transfer is divided into some regions, each region permits
Perhaps authority controlled end performs corresponding operation.If it is also possible that the effective coverage of the control of authority information transfer is divided into
Dry region, only can just perform corresponding operation when authority controlled end is located in specific region.
In one embodiment of the invention, the rights service end in above-mentioned authority control system uses Beacon servers
【Beacon (Bi Ken) server have monitoring in real time, historical data analysis and various instant alarming (sound, SMS,
The modes such as Email) function】The control of authority information is generated, is sent and its location using the base station with beam antenna
The corresponding control of authority information in domain.It is assumed that the Administrative Area of company is marked off into a safe care registry (such as by the area in Fig. 5
Domain 1 is divided into safe care registry).The authority controlled end pair such as notebook computer, tablet personal computer, smart mobile phone can be passed through in safe care registry
The confidential information of company is retrieved, browsed and copied, and monitors the access situation of confidential information.In confidential outdoor office
Region then can only be carried out by the authority such as notebook computer, tablet personal computer, smart mobile phone controlled end to the confidential information of company
Retrieve, browse, but can not be copied, the access situation of confidential information can not be monitored.The Beacon that rights service end is used
Server is that the Administrative Area where the safe care registry generates specific control of authority information, if authority controlled end can be received
To above-mentioned specific control of authority information, then assert that authority controlled end is in safe care registry, namely authority controlled end is positioned at machine
Will interior.Thus, above-mentioned various authority controlled ends can be retrieved, browsed and copied to the confidential information of company, Yi Jijian
Control the access situation of confidential information.If what authority controlled end was received is that Beacon servers are confidential outdoor Administrative Area
The control of authority information of generation, then be positioned at confidential outdoor Administrative Area by authority controlled end.Now, above-mentioned various authorities by
Control end is only capable of retrieving the confidential information of company, browsed, and can not be copied, can not be to the access feelings of confidential information
Condition is monitored.Control of authority process in above-described embodiment reduce further the risk of control of authority, and can realize
The variation of control of authority.
Above to the applicating example of authority control system, simply to illustrate that how to apply the authority control in above-described embodiment
System processed, it is impossible to therefore limit the authority control system application.One of ordinary skill in the art is according to above-mentioned implementation
Authority control system in example, it is easy to expect carrying out the authority control system other applications.It is thus impossible to institute
State authority control system and carried out different applications, and regard as being not belonging to the protection model of authority control system of the present invention
Enclose.
Another embodiment of the present invention discloses a kind of non-transient computer storage medium, and the computer-readable storage medium is deposited
Computer executable instructions are contained, the computer executable instructions are used to perform any one above-mentioned authority control method.
Those of ordinary skill in the art it is to be understood that authority control method, authority controlled device in above-described embodiment,
Authority control system, non-transient computer storage medium and electronic equipment can also be realized by other means.
When using software to realize, the computer instruction and/or data storage of each above-mentioned embodiment can will be realized
It is transmitted in computer-readable medium or as one or more instructions on computer-readable recording medium or code.It is computer-readable to be situated between
Matter includes computer-readable storage medium and communication media, and wherein communication media includes being easy to transmit to another place from a place
Any medium of computer program.Storage medium can be any usable medium that computer can be stored.As example but not
It is limited to secondary:Computer-readable medium can include RAM, ROM, EEPROM, CD-ROM or other optical disc storages, magnetic disk storage medium
Or other magnetic storage apparatus or can carry or store with instruction or data structure form desired program code simultaneously
Can by computer access any other medium.In addition, any connection can be suitably turn into computer-readable medium.Example
Such as, if software is using coaxial cable, light pricker optical cable, twisted-pair feeder, Digital Subscriber Line (DSL) or such as infrared ray, wirelessly
What the wireless technology of electricity and microwave etc was transmitted from website, server or other remote sources, then coaxial cable, light pricker light
The wireless technology of cable, twisted-pair feeder, DSL or such as infrared ray, wireless and microwave etc is included in the definition of affiliated medium.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations.Although
The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that, it still may be used
To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic.
And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and
Scope.
Claims (16)
1. a kind of authority control method, it is characterised in that including:
When authority controlled end is in the effective coverage of control of authority information transfer, the control of authority information is obtained;
The control of authority information is interpreted to according to default Explanation way by the permissions data for authentication;
The permissions data is authenticated;
When the authentication passes through, it is allowed to perform corresponding operation.
2. authority control method according to claim 1, it is characterised in that methods described also includes:
Whether the transmission path for judging the control of authority information is default transmission path;
When the transmission path of the control of authority information does not meet default transmission path, forbid performing corresponding operation.
3. authority control method according to claim 1 or 2, it is characterised in that methods described also includes:
The effective coverage of the control of authority information transfer is divided into N number of region;
When authority controlled end is in the different zones in N number of region, the authority that the authority controlled end is got
Control information is different;
Wherein, N is >=2 integer.
4. authority control method according to claim 3, it is characterised in that methods described also includes:
When authority controlled end is located in any one region in N number of region, the authority controlled end is in the different time
The control of authority information that section is got is different.
5. authority control method according to claim 4, it is characterised in that the control of authority is obtained by wireless network
Information;
The wireless network includes:ZigBee signal networks and/or Bluetooth signal network and/or WIFI signal network.
6. a kind of authority controlled device, it is characterised in that including:
Transceiver module, for when authority controlled end is in the effective coverage of control of authority information transfer, obtaining the authority
Control information;
Read through model is solved, for the control of authority information to be interpreted to the authority number for authentication according to default Explanation way
According to;
Authentication module, for being authenticated to the permissions data;
Application module, for when the authentication passes through, it is allowed to perform corresponding operation.
7. authority controlled device according to claim 6, it is characterised in that the authentication module is additionally operable to judge the power
Whether the transmission path for limiting control information is default transmission path;
When the transmission path of the control of authority information does not meet default transmission path, the application module is forbidden performing phase
The operation answered.
8. the authority controlled device according to claim 6 or 7, it is characterised in that by the control of authority information transfer
Effective coverage is divided into N number of region;
When authority controlled device is in the different zones in N number of region, the authority that the transceiver module is got
Control information is different;
Wherein, N is >=2 integer.
9. authority controlled device according to claim 8, it is characterised in that when authority controlled device is located at N number of area
When in any one region in domain, the control of authority information that the transceiver module is got in the different periods is different.
10. a kind of electronic equipment, it is characterised in that including:At least one processor, and at least one memory;
At least one described processor is connected with least one described memory communication;
At least one described memory storage has can be by the instruction of at least one computing device, so that the electronic equipment
The authority control method described in 1-5 any one is required for perform claim.
11. a kind of authority control system, it is characterised in that controlled including at least one rights service end and at least one authority
End;
At least one described rights service end is used to generate and sending permission control information;
At least one described authority controlled end is used for the authority control method described in perform claim requirement 1-5 any one.
12. authority control system according to claim 11, it is characterised in that at least one described rights service end includes
The base station of at least one server and at least one wireless network;
At least one described server is connected with the base station communication of at least one wireless network;
At least one described server is used to generate the control of authority information;
The base station of at least one wireless network is used to send the control of authority information.
13. authority control system according to claim 12, it is characterised in that by the effective district of control of authority information transfer
Domain is divided into N number of region, and the base station of a few wireless network is respectively provided in N number of region;
At least one described server is the different control of authority information of N number of Area generation;
The base station of at least one wireless network, sends the control of authority information corresponding with its region;
Wherein, N is >=2 integer.
14. authority control system according to claim 13, it is characterised in that at least one described server is the N
The different time sections in individual region generate different control of authority information.
15. the authority control system according to claim 13 or 14, it is characterised in that at least one described server according to
The control of authority information that at least one described authority controlled end is received is judged residing at least one described authority controlled end
Region.
16. authority control system according to claim 15, it is characterised in that at least one described authority controlled end according to
Its described control of authority information received judges the region residing for it.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/073108 WO2018145266A1 (en) | 2017-02-08 | 2017-02-08 | Permission control method, permission-controlled device, electronic device, and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107005578A true CN107005578A (en) | 2017-08-01 |
Family
ID=59435993
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780000069.6A Pending CN107005578A (en) | 2017-02-08 | 2017-02-08 | Authority control method, authority controlled device, electronic equipment and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107005578A (en) |
WO (1) | WO2018145266A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112260985A (en) * | 2020-09-03 | 2021-01-22 | 郑州富联智能工坊有限公司 | Terminal safety control equipment and terminal safety control method |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060004002A (en) * | 2004-07-06 | 2006-01-12 | 소프트포럼 주식회사 | Method for controlling the connecting request of an user computer on the internet and computer readable record medium on which a program therefor is recorded |
CN103200155A (en) * | 2012-01-05 | 2013-07-10 | 国民技术股份有限公司 | System and method of right control based on limiting area |
CN103354550A (en) * | 2013-07-03 | 2013-10-16 | 杭州华三通信技术有限公司 | Authorization control method and device based on terminal information |
CN103428655A (en) * | 2012-05-15 | 2013-12-04 | 上海博路信息技术有限公司 | Data exchanging system based on short messages |
CN103491539A (en) * | 2013-08-27 | 2014-01-01 | 展讯通信(上海)有限公司 | Method and device for controlling access right of mobile equipment |
CN104335523A (en) * | 2014-04-15 | 2015-02-04 | 华为技术有限公司 | Access control method, client and server |
CN104717204A (en) * | 2015-02-02 | 2015-06-17 | 深圳市中兴移动通信有限公司 | Method for controlling file access permission and terminal |
CN105323294A (en) * | 2014-08-20 | 2016-02-10 | 广东小天才科技有限公司 | Intelligent terminal authority control method and device |
CN105992206A (en) * | 2015-02-04 | 2016-10-05 | ***通信集团湖北有限公司 | Enterprise safety management method, equipment and system |
CN106034104A (en) * | 2015-03-07 | 2016-10-19 | 华为技术有限公司 | Verification method, verification device and verification system for network application accessing |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008040546A (en) * | 2006-08-01 | 2008-02-21 | Canon Inc | Information processor, its control method, and program |
CN102769631B (en) * | 2012-07-31 | 2015-09-09 | 华为技术有限公司 | Access the method for Cloud Server, system and access device |
-
2017
- 2017-02-08 CN CN201780000069.6A patent/CN107005578A/en active Pending
- 2017-02-08 WO PCT/CN2017/073108 patent/WO2018145266A1/en active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060004002A (en) * | 2004-07-06 | 2006-01-12 | 소프트포럼 주식회사 | Method for controlling the connecting request of an user computer on the internet and computer readable record medium on which a program therefor is recorded |
CN103200155A (en) * | 2012-01-05 | 2013-07-10 | 国民技术股份有限公司 | System and method of right control based on limiting area |
CN103428655A (en) * | 2012-05-15 | 2013-12-04 | 上海博路信息技术有限公司 | Data exchanging system based on short messages |
CN103354550A (en) * | 2013-07-03 | 2013-10-16 | 杭州华三通信技术有限公司 | Authorization control method and device based on terminal information |
CN103491539A (en) * | 2013-08-27 | 2014-01-01 | 展讯通信(上海)有限公司 | Method and device for controlling access right of mobile equipment |
CN104335523A (en) * | 2014-04-15 | 2015-02-04 | 华为技术有限公司 | Access control method, client and server |
CN105323294A (en) * | 2014-08-20 | 2016-02-10 | 广东小天才科技有限公司 | Intelligent terminal authority control method and device |
CN104717204A (en) * | 2015-02-02 | 2015-06-17 | 深圳市中兴移动通信有限公司 | Method for controlling file access permission and terminal |
CN105992206A (en) * | 2015-02-04 | 2016-10-05 | ***通信集团湖北有限公司 | Enterprise safety management method, equipment and system |
CN106034104A (en) * | 2015-03-07 | 2016-10-19 | 华为技术有限公司 | Verification method, verification device and verification system for network application accessing |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112260985A (en) * | 2020-09-03 | 2021-01-22 | 郑州富联智能工坊有限公司 | Terminal safety control equipment and terminal safety control method |
Also Published As
Publication number | Publication date |
---|---|
WO2018145266A1 (en) | 2018-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230154262A1 (en) | Decentralized virtual trustless database for access control | |
CN106134143B (en) | Method, apparatus and system for dynamic network access-in management | |
DE112014005379B4 (en) | Providing credentials on an electronic device using passwords communicated through verified channels | |
CN202906904U (en) | A NFC enablement device storing and searching dedicated personal information of portable applications | |
CN105205898A (en) | Electronic code permission management system for intelligent lock | |
CN109672645B (en) | Identity authentication method, user terminal and authentication management server | |
CN104318170B (en) | A kind of method and device based on multi-mobile-terminal protection data safety | |
CN103813314A (en) | Soft SIM card enabling method and network access method, terminal, and network access device | |
US8688987B2 (en) | Secure key distribution with general purpose mobile device | |
CN106341234A (en) | Authorization method and device | |
CN107079261A (en) | The access certificate to secure network is provided using wireless beacon | |
CN105323294A (en) | Intelligent terminal authority control method and device | |
CN104468640A (en) | Method and device for achieving sharing of cloud storage space | |
CN104903861A (en) | Clipboard management | |
CN110414208A (en) | Login validation method, calculates equipment and medium at device | |
CN105850155A (en) | System and method for managing application data of contactless card applications | |
CN101137992A (en) | Sytem and method for providing access to oma drm protected files from java applications | |
CN105653864A (en) | Medical record information sharing method and device | |
CN107480554A (en) | A kind of right management method, rights management device and intelligent terminal | |
CN109271807A (en) | The data safety processing method and system of database | |
CN205140033U (en) | Electron password privilege management system of intelligence lock | |
CN109063450A (en) | A kind of control method of secure storage medium, secure storage medium and system | |
CN100593779C (en) | Communication system and method for sharing information by mobile network interface | |
CN104640112B (en) | A kind of identification authentication method, apparatus and system | |
CN107846676A (en) | Safety communicating method and system based on network section security architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170801 |
|
WD01 | Invention patent application deemed withdrawn after publication |