CN107005578A - Authority control method, authority controlled device, electronic equipment and system - Google Patents

Authority control method, authority controlled device, electronic equipment and system Download PDF

Info

Publication number
CN107005578A
CN107005578A CN201780000069.6A CN201780000069A CN107005578A CN 107005578 A CN107005578 A CN 107005578A CN 201780000069 A CN201780000069 A CN 201780000069A CN 107005578 A CN107005578 A CN 107005578A
Authority
CN
China
Prior art keywords
authority
control
information
region
controlled end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780000069.6A
Other languages
Chinese (zh)
Inventor
宋志刚
刘和兴
周芦明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Goodix Technology Co Ltd
Original Assignee
Shenzhen Huiding Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huiding Technology Co Ltd filed Critical Shenzhen Huiding Technology Co Ltd
Publication of CN107005578A publication Critical patent/CN107005578A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiment of the invention discloses that authority control method, authority controlled device, electronic equipment and system, are related to communication technical field.Methods described includes:When authority controlled end is in the effective coverage of control of authority information transfer, the control of authority information is obtained;The control of authority information is interpreted to according to default Explanation way by the permissions data for authentication;The permissions data is authenticated;When the authentication passes through, it is allowed to perform corresponding operation.Embodiments of the invention can reduce the risk of control of authority, and according to the physical location of authority controlled end come the authority of control authority controlled end.

Description

Authority control method, authority controlled device, electronic equipment and system
Technical field
Technical scheme disclosed by the invention is related to communication technical field, more particularly to the controlled dress of authority control method, authority Put, electronic equipment and system.
Background technology
As the communication technology, computer technology are developed rapidly, the privacy problem of information becomes increasingly serious.Therefore, it is right In information acquisition and using need carry out control of authority.For example, the access rights of website, database, file etc. are set, if Put the access right of application software.
Inventor has found that in the prior art, the technological means of control authority is mainly to test during the present invention is studied Demonstrate,prove account and password.Because account and password there is a possibility that to leak and crack, therefore controlled by verifying account and password Authority processed still suffers from higher risk.In addition, in the prior art can not be according to the physical location of authority controlled end come control Limit the authority of controlled end.
Therefore, in the prior art there is higher risk and can not be according to the physical location of authority controlled end in control of authority Carry out the authority of control authority controlled end, it becomes technical problem urgently to be resolved hurrily.
The content of the invention
Technical scheme disclosed by the invention at least can solve the problem that following technical problem:Control of authority exist higher risk with And can not be according to the physical location of authority controlled end come the authority of control authority controlled end.
One or more embodiment of the present invention discloses a kind of authority control method, including:At authority controlled end When in the effective coverage of control of authority information transfer, the control of authority information is obtained;According to default Explanation way by institute State control of authority information and be interpreted to permissions data for authentication;The permissions data is authenticated;When the authentication passes through When, it is allowed to perform corresponding operation.
In one or more embodiment of the present invention, methods described also includes:Judge the control of authority information Whether transmission path is default transmission path;When the transmission path of the control of authority information does not meet default transmission path When, forbid performing corresponding operation.
In one or more embodiment of the present invention, methods described also includes:By the control of authority information transfer Effective coverage be divided into N number of region;When authority controlled end is in the different zones in N number of region, the authority by The control of authority information that control end is got is different;Wherein, N is >=2 integer.
In one or more embodiment of the present invention, methods described also includes:When authority controlled end is positioned at described N number of When in any one region in region, the control of authority information that the authority controlled end is got in the different periods is not Together.
In one or more embodiment of the present invention, the control of authority information is obtained by wireless network;It is described Wireless network includes:ZigBee signal networks and/or Bluetooth signal network and/or WIFI signal network.
One or more embodiment of the present invention discloses a kind of authority controlled device, including:Transceiver module, for working as When authority controlled end is in the effective coverage of control of authority information transfer, the control of authority information is obtained;Read through model is solved, is used In the control of authority information to be interpreted to the permissions data for authentication according to default Explanation way;Authentication module, is used for The permissions data is authenticated;Application module, for when the authentication passes through, it is allowed to perform corresponding operation.
In one or more embodiment of the present invention, the authentication module is additionally operable to judge the control of authority information Transmission path whether be default transmission path;When the transmission path of the control of authority information does not meet default transmission road During footpath, the application module is forbidden performing corresponding operation.
In one or more embodiment of the present invention, the effective coverage of the control of authority information transfer is divided into N number of region;When authority controlled device is in the different zones in N number of region, it is described that the transceiver module is got Control of authority information is different;Wherein, N is >=2 integer.
In one or more embodiment of the present invention, when authority controlled device is located at any one of N number of region When in individual region, the control of authority information that the transceiver module is got in the different periods is different.
One or more embodiment of the present invention discloses a kind of electronic equipment, including:At least one processor, and At least one memory;At least one described processor is connected with least one described memory communication;It is described at least one deposit Reservoir is stored with can be by the instruction of at least one computing device, so that the electronic equipment is above-mentioned any one for performing Plant authority control method.
One or more embodiment of the present invention discloses a kind of authority control system, including at least one rights service End and at least one authority controlled end;At least one described rights service end is used to generate and sending permission control information;Institute Stating at least one authority controlled end is used to perform any one above-mentioned authority control method.
In one or more embodiment of the present invention, at least one described rights service end is serviced including at least one The base station of device and at least one wireless network;The base station of at least one described server and at least one wireless network leads to Letter connection;At least one described server is used to generate the control of authority information;The base station of at least one wireless network For sending the control of authority information.
In one or more embodiment of the present invention, the effective coverage of control of authority information transfer is divided into N number of Region, the base station of a few wireless network is respectively provided in N number of region;At least one described server is described N number of The different control of authority information of Area generation;The base station of at least one wireless network, sends corresponding with its region Control of authority information;Wherein, N is >=2 integer.
In one or more embodiment of the present invention, at least one described server is the difference in N number of region Period generates different control of authority information.
In one or more embodiment of the present invention, at least one described server is according at least one described authority The control of authority information that controlled end is received judges the region residing at least one described authority controlled end.
In one or more embodiment of the present invention, at least one described authority controlled end is according to its reception Control of authority information judges the region residing for it.
One or more embodiment of the present invention also discloses a kind of non-transient computer storage medium, the computer Storage medium is stored with computer executable instructions, and the computer executable instructions are used to perform any one above-mentioned authority control Method processed.
Compared with prior art, technical scheme disclosed by the invention mainly has following beneficial effect:
In an embodiment of the present invention, when authority controlled end is in the effective coverage of control of authority information transfer, obtain Take the control of authority information.Thus, when authority controlled end is removed in the effective coverage of control of authority information transfer, it is impossible to The control of authority information is obtained, namely defines that the authority controlled end performs corresponding operation.Then, according to default solution The control of authority information is interpreted to the permissions data for authentication by read mode.If default solution is not present in authority controlled end The control of authority information can not be interpreted to the permissions data for authentication by read mode or default Explanation way, then described Authority controlled end can not perform corresponding operation.Then the permissions data is authenticated;When the authentication passes through, it is allowed to Perform corresponding operation.In summary, the authority control method can reduce the risk of control of authority, and controlled according to authority The physical location at end carrys out the authority of control authority controlled end.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be attached to what is used required in embodiment Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this area For those of ordinary skill, without having to pay creative labor, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 is the flow chart of authority control method in one embodiment of the invention;
Fig. 2 is the schematic diagram of electronic equipment in another embodiment of the present invention;
Fig. 3 is the schematic diagram of authority controlled device in another embodiment of the present invention;
Fig. 4 is the schematic diagram of authority control system in another embodiment of the present invention;
Fig. 5 be another embodiment of the present invention in authority control system schematic diagram.
Embodiment
For the ease of understanding the present invention, the present invention is described more fully below with reference to relevant drawings.In accompanying drawing Give presently preferred embodiments of the present invention.But, the present invention can be realized in many different forms, however it is not limited to this paper institutes The embodiment of description.On the contrary, the purpose for providing these embodiments is to make the understanding to the disclosure more thorough Comprehensively.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention The implication that technical staff is generally understood that is identical.Term used in the description of the invention herein is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.
It is the flow chart of authority control method in one embodiment of the invention with reference to Fig. 1.The authority control method application In authority controlled end.The authority controlled end include smart mobile phone, tablet personal computer, notebook computer, wearable device etc. its He has the terminal device of communication function.The authority control method includes:
Step 101:When authority controlled end is in the effective coverage of control of authority information transfer, the authority control is obtained Information processed.
The effective coverage refers to that the authority controlled end can effectively receive the wireless network of the control of authority information Network distributed areas.
Step 102:The control of authority information is interpreted to according to default Explanation way by the permissions data for authentication.
Deciphering can be understood as:Executive program instruction calculates the process of data.
Step 103:The permissions data is authenticated.
Step 104:When the authentication passes through, it is allowed to perform corresponding operation.
For example, the authority of particular document is accessed using above method control authority controlled end.When user needs to access , it is necessary to authority controlled end is moved in the effective coverage of control of authority information transfer during the particular document.Authority controlled end Control of authority information can be got in the effective coverage of the control of authority information transfer.If authority controlled end is not located at In the effective coverage of control of authority information transfer, or authority controlled end can not get control of authority information, then user can not The particular document is accessed by the authority controlled end.
If authority controlled end gets control of authority information, the control of authority is believed according to default Explanation way Breath is interpreted to the permissions data for authentication.But, if default Explanation way or default is not present in authority controlled end The control of authority information can not be interpreted to the permissions data for authentication by Explanation way, then user can not still pass through the power Limit controlled end and access the particular document.Accordingly, methods described in the default deciphering control of authority of authority controlled end by believing The mode of breath, enhances the security of control of authority.
If the control of authority information can be interpreted to for authenticating by authority controlled end according to default Explanation way Permissions data, further the permissions data will be authenticated, only when it is described authentication pass through when, can just allow to perform visit Ask the operation of particular document.
In some embodiments of the invention, it is described that permissions data progress authentication is included:Judge the authority number According to whether including default feature.For example, judging whether the permissions data includes default check code.
In some embodiments of the invention, methods described also includes:Judge the transmission path of the control of authority information Whether it is default transmission path;When the transmission path of the control of authority information does not meet default transmission path, forbid Perform corresponding operation.Accordingly, by limiting the transmission path of the control of authority information, be conducive to taking precautions against the authority control forged Information processed.
In some embodiments of the invention, methods described also includes:By the effective district of the control of authority information transfer Domain is divided into N number of region;When authority controlled end is in the different zones in N number of region, the authority controlled end is obtained The control of authority information arrived is different;Wherein, N is >=2 integer.Accordingly, not advising for the control of authority information is enhanced Then property, while also carrying out Positioning Creates condition to the authority controlled end to realize.
For example, it is assumed that the effective coverage of the control of authority information transfer is divided into 2 regions, respectively A areas Domain and B regions.Then when the authority controlled end is in the different zones in 2 regions, the authority controlled end is obtained The control of authority information arrived is different.That is, the control of authority information that is got in a-quadrant of the authority controlled end with its The control of authority information that B regions are got is different.
In some embodiments of the invention, methods described also includes:When authority controlled end is located at appointing for N number of region When anticipating in a region, the control of authority information that the authority controlled end is got in the different periods is different.Due to In the different time sections of the same area, the control of authority information that the authority controlled end is got is different, thus the power Limit controlled end can not use same control of authority information to perform corresponding operation by authenticating in the different periods.Avoid institute State authority controlled end and bypass this particular step of acquisition control of authority information in the effective coverage of control of authority information transfer, profit With stored control of authority information corresponding operation is performed by authenticating.Be conducive to further enhancing the safety of control of authority Property.
In some embodiments of the invention, methods described also includes:The control of authority is obtained by wireless network to believe Breath;The wireless network includes:ZigBee signal networks and/or Bluetooth signal network and/or WIFI signal network.
The scene of above-mentioned any one authority control method application includes:Control, which accesses the authority of particular document, control, to be made The other application scenes such as the authority of software specific function are used with the authority of specific software, control.Control of authority of the present invention The application scenarios of method are not limited to above-mentioned application scenarios.
In the various application scenarios of above-mentioned authority control method, authority control method can disclosed in the embodiment of the present invention Physical location according to where authority controlled end carries out control of authority.It is assumed that the effective coverage of control of authority information transfer is set It is set to the Administrative Area of company, user implements above-mentioned various application scenarios by equipment such as notebook computer, mobile terminals.When When the equipment such as user's carrying notebook computer, mobile terminal leave the Administrative Area of company, the notes that user carries The equipment such as this computer, mobile terminal will be obtained less than control of authority information, also just not possess the authority for performing corresponding operating.Example Such as, user carries the equipment such as the notebook computer, mobile terminal and left after the Administrative Area of company, it is impossible to access specific text Shelves." particular document " can be the document for including Company Confidential information.For another example user's carrying notebook computer, The equipment such as mobile terminal are left after the Administrative Area of company, it is impossible to use specific software." specific software " can be pair The software for some business of software or development company that the product of company is designed.In another example, user carries the notebook The equipment such as computer, mobile terminal are left after the Administrative Area of company, it is impossible to use the specific function of some product design softwares. " specific function " can be introduced into the function of some design parameters, can also be and carry out Automatic Optimal to some design considerations Function.
It is the schematic diagram of electronic equipment in another embodiment of the present invention with reference to Fig. 2.The electronic equipment includes intelligent hand The other-end equipment such as machine, tablet personal computer, notebook computer, wearable device.
The electronic equipment includes:At least one processor 210, and at least one memory 220;It is described at least one Processor 210 is communicated to connect with least one described memory 220.In Fig. 2 exemplified by being connected by bus 230.
At least one described memory 220 is stored with the instruction that can be performed by least one described processor 210, so that institute Stating electronic equipment is used to perform any one authority control method in above method embodiment.
Memory 220 is as a kind of non-transient computer readable storage medium storing program for executing, available for storing non-transient software program, non- Transient computer executable program etc..Processor 210 is by running the non-transient software program being stored in memory 220, referring to Order so that electronic equipment performs various function application and data processing.
Memory 220 can include storing program area and storage data field, wherein, storing program area can store operation system Application program required for system, at least one function;Storage data field can data storage etc..In addition, memory 220 can include High-speed random access memory, can also include non-transient memory, for example, at least one disk memory, flush memory device, Or other non-transient solid-state memories.In certain embodiments, memory 220 is optional including long-range relative to processor 210 The memory of setting, these remote memories can pass through network connection to the electronic equipment.
In some embodiments of the invention, the electronic equipment also includes input unit and output device.Input unit The numeral or character information of input can be received, and produces signal input.Output device may include the display devices such as display screen.
Electronic equipment in above-described embodiment, can be by performing any one control of authority side in above method embodiment Method, realizes the control of authority to the electronic equipment, and then reduces the risk of control of authority, is conducive to the secrecy of information.
It is the schematic diagram of authority controlled device in another embodiment of the present invention with reference to Fig. 3, it is real for performing the above method Apply any one authority control method in example.
The authority controlled device includes:
Transceiver module 310, for when authority controlled end is in the effective coverage of control of authority information transfer, obtaining institute State control of authority information.
Read through model 320 is solved, for the control of authority information to be interpreted to for authentication according to default Explanation way Permissions data.
Authentication module 330, for being authenticated to the permissions data.
Application module 340, for when the authentication passes through, it is allowed to perform corresponding operation.
In some embodiments of the invention, the authentication module 330 is additionally operable to judge the biography of the control of authority information Whether defeated path is default transmission path;When the transmission path of the control of authority information does not meet default transmission path When, the application module 340 is forbidden performing corresponding operation.
In some embodiments of the invention, the effective coverage of the control of authority information transfer is divided into N number of region; When authority controlled device is in the different zones in N number of region, the authority control that the transceiver module 310 is got Information processed is different;Wherein, N is >=2 integer.
In some embodiments of the invention, when authority controlled device is located in any one region in N number of region When, the control of authority information that the transceiver module 310 is got in the different periods is different.
Authority controlled device in above-described embodiment is present in authority controlled end, by performing in above method embodiment Any one authority control method, reduce the control of authority risk to authority controlled end, and can be according to the controlled dress of authority The physical location put carrys out the authority of control authority controlled device.
Another embodiment of the present invention discloses a kind of authority control system.The authority control system is weighed including at least one Limit service end and at least one authority controlled end;At least one described rights service end is used to generate and sending permission controls letter Breath;At least one described authority controlled end is used to perform any one authority control method in above method embodiment.
It is the schematic diagram of authority control system in another embodiment of the present invention with reference to Fig. 4.When authority controlled end is in power When limiting in the effective coverage of control information transmission, the authority controlled end can get the control of authority information.Authority by The control of authority information is interpreted to permissions data for authentication by control end according to default Explanation way, then to the power Limit data are authenticated, when the authentication passes through, it is allowed to perform corresponding operation.
When the authority controlled end is removed in the effective coverage of control of authority information transfer, the authority controlled end can not Enough get the control of authority information.Thus, the authority controlled end can not perform corresponding operation, and then realize to described The control of authority of authority controlled end.
In some embodiments of the invention, at least one described rights service end includes at least one server and extremely The base station of a few wireless network;At least one described server is connected with the base station communication of at least one wireless network; At least one described server is used to generate the control of authority information;The base station of at least one wireless network is used to send The control of authority information.
In some embodiments of the invention, the effective coverage of control of authority information transfer is divided into N number of region, in institute State the base station that N number of region is respectively provided to a few wireless network;At least one described server be N number of Area generation not Same control of authority information;The base station of at least one wireless network, sends the control of authority corresponding with its region Information;Wherein, N is >=2 integer.Namely N number of region forms mapping relations from different control of authority information.
In some embodiments of the invention, at least one described server is given birth to for the different time sections in N number of region Into different control of authority information.
In some embodiments of the invention, because N number of region from different control of authority information forms mapping Relation, accordingly, the control of authority information that at least one described server is received according at least one described authority controlled end Judge the region residing at least one described authority controlled end.
In some embodiments of the invention, also due to N number of region is formd from different control of authority information Mapping relations, thus the control of authority information that is received according to it of at least one described authority controlled end judge it residing for area Domain.
For example, the authority control system in another embodiment of the present invention demonstrated in Figure 5.The control of authority system The effective coverage of control of authority information transfer is divided into 8 regions by system, and the base of wireless network is respectively arranged with 8 regions Stand.The server is the different control of authority information of 88 kinds of Area generations.The base station hair of wireless network in each region Send the control of authority information corresponding with its region.As needed, when the server is also the difference in 8 regions Between section generate different control of authority information.When the server needs to know the location of described authority controlled end, institute State the control of authority information that server receives according to the authority controlled end and judge that the authority controlled end is located at 8 regions In which region.In addition, when the authority controlled end needs to know the location of its own, the authority controlled end Its which region being located in 8 regions is judged according to the control of authority information of its reception.
Authority control system in above-described embodiment, can be existed by the control of authority information received according to authority controlled end Authority controlled end is positioned in the effective coverage of control of authority information transfer, thus can be according to authority controlled end described Position in effective coverage carries out further control of authority, namely the realization power in the effective coverage of control of authority information transfer Limit the variation of control.For example, the effective coverage of the control of authority information transfer is divided into some regions, each region permits Perhaps authority controlled end performs corresponding operation.If it is also possible that the effective coverage of the control of authority information transfer is divided into Dry region, only can just perform corresponding operation when authority controlled end is located in specific region.
In one embodiment of the invention, the rights service end in above-mentioned authority control system uses Beacon servers 【Beacon (Bi Ken) server have monitoring in real time, historical data analysis and various instant alarming (sound, SMS, The modes such as Email) function】The control of authority information is generated, is sent and its location using the base station with beam antenna The corresponding control of authority information in domain.It is assumed that the Administrative Area of company is marked off into a safe care registry (such as by the area in Fig. 5 Domain 1 is divided into safe care registry).The authority controlled end pair such as notebook computer, tablet personal computer, smart mobile phone can be passed through in safe care registry The confidential information of company is retrieved, browsed and copied, and monitors the access situation of confidential information.In confidential outdoor office Region then can only be carried out by the authority such as notebook computer, tablet personal computer, smart mobile phone controlled end to the confidential information of company Retrieve, browse, but can not be copied, the access situation of confidential information can not be monitored.The Beacon that rights service end is used Server is that the Administrative Area where the safe care registry generates specific control of authority information, if authority controlled end can be received To above-mentioned specific control of authority information, then assert that authority controlled end is in safe care registry, namely authority controlled end is positioned at machine Will interior.Thus, above-mentioned various authority controlled ends can be retrieved, browsed and copied to the confidential information of company, Yi Jijian Control the access situation of confidential information.If what authority controlled end was received is that Beacon servers are confidential outdoor Administrative Area The control of authority information of generation, then be positioned at confidential outdoor Administrative Area by authority controlled end.Now, above-mentioned various authorities by Control end is only capable of retrieving the confidential information of company, browsed, and can not be copied, can not be to the access feelings of confidential information Condition is monitored.Control of authority process in above-described embodiment reduce further the risk of control of authority, and can realize The variation of control of authority.
Above to the applicating example of authority control system, simply to illustrate that how to apply the authority control in above-described embodiment System processed, it is impossible to therefore limit the authority control system application.One of ordinary skill in the art is according to above-mentioned implementation Authority control system in example, it is easy to expect carrying out the authority control system other applications.It is thus impossible to institute State authority control system and carried out different applications, and regard as being not belonging to the protection model of authority control system of the present invention Enclose.
Another embodiment of the present invention discloses a kind of non-transient computer storage medium, and the computer-readable storage medium is deposited Computer executable instructions are contained, the computer executable instructions are used to perform any one above-mentioned authority control method.
Those of ordinary skill in the art it is to be understood that authority control method, authority controlled device in above-described embodiment, Authority control system, non-transient computer storage medium and electronic equipment can also be realized by other means.
When using software to realize, the computer instruction and/or data storage of each above-mentioned embodiment can will be realized It is transmitted in computer-readable medium or as one or more instructions on computer-readable recording medium or code.It is computer-readable to be situated between Matter includes computer-readable storage medium and communication media, and wherein communication media includes being easy to transmit to another place from a place Any medium of computer program.Storage medium can be any usable medium that computer can be stored.As example but not It is limited to secondary:Computer-readable medium can include RAM, ROM, EEPROM, CD-ROM or other optical disc storages, magnetic disk storage medium Or other magnetic storage apparatus or can carry or store with instruction or data structure form desired program code simultaneously Can by computer access any other medium.In addition, any connection can be suitably turn into computer-readable medium.Example Such as, if software is using coaxial cable, light pricker optical cable, twisted-pair feeder, Digital Subscriber Line (DSL) or such as infrared ray, wirelessly What the wireless technology of electricity and microwave etc was transmitted from website, server or other remote sources, then coaxial cable, light pricker light The wireless technology of cable, twisted-pair feeder, DSL or such as infrared ray, wireless and microwave etc is included in the definition of affiliated medium.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations.Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that, it still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic. And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (16)

1. a kind of authority control method, it is characterised in that including:
When authority controlled end is in the effective coverage of control of authority information transfer, the control of authority information is obtained;
The control of authority information is interpreted to according to default Explanation way by the permissions data for authentication;
The permissions data is authenticated;
When the authentication passes through, it is allowed to perform corresponding operation.
2. authority control method according to claim 1, it is characterised in that methods described also includes:
Whether the transmission path for judging the control of authority information is default transmission path;
When the transmission path of the control of authority information does not meet default transmission path, forbid performing corresponding operation.
3. authority control method according to claim 1 or 2, it is characterised in that methods described also includes:
The effective coverage of the control of authority information transfer is divided into N number of region;
When authority controlled end is in the different zones in N number of region, the authority that the authority controlled end is got Control information is different;
Wherein, N is >=2 integer.
4. authority control method according to claim 3, it is characterised in that methods described also includes:
When authority controlled end is located in any one region in N number of region, the authority controlled end is in the different time The control of authority information that section is got is different.
5. authority control method according to claim 4, it is characterised in that the control of authority is obtained by wireless network Information;
The wireless network includes:ZigBee signal networks and/or Bluetooth signal network and/or WIFI signal network.
6. a kind of authority controlled device, it is characterised in that including:
Transceiver module, for when authority controlled end is in the effective coverage of control of authority information transfer, obtaining the authority Control information;
Read through model is solved, for the control of authority information to be interpreted to the authority number for authentication according to default Explanation way According to;
Authentication module, for being authenticated to the permissions data;
Application module, for when the authentication passes through, it is allowed to perform corresponding operation.
7. authority controlled device according to claim 6, it is characterised in that the authentication module is additionally operable to judge the power Whether the transmission path for limiting control information is default transmission path;
When the transmission path of the control of authority information does not meet default transmission path, the application module is forbidden performing phase The operation answered.
8. the authority controlled device according to claim 6 or 7, it is characterised in that by the control of authority information transfer Effective coverage is divided into N number of region;
When authority controlled device is in the different zones in N number of region, the authority that the transceiver module is got Control information is different;
Wherein, N is >=2 integer.
9. authority controlled device according to claim 8, it is characterised in that when authority controlled device is located at N number of area When in any one region in domain, the control of authority information that the transceiver module is got in the different periods is different.
10. a kind of electronic equipment, it is characterised in that including:At least one processor, and at least one memory;
At least one described processor is connected with least one described memory communication;
At least one described memory storage has can be by the instruction of at least one computing device, so that the electronic equipment The authority control method described in 1-5 any one is required for perform claim.
11. a kind of authority control system, it is characterised in that controlled including at least one rights service end and at least one authority End;
At least one described rights service end is used to generate and sending permission control information;
At least one described authority controlled end is used for the authority control method described in perform claim requirement 1-5 any one.
12. authority control system according to claim 11, it is characterised in that at least one described rights service end includes The base station of at least one server and at least one wireless network;
At least one described server is connected with the base station communication of at least one wireless network;
At least one described server is used to generate the control of authority information;
The base station of at least one wireless network is used to send the control of authority information.
13. authority control system according to claim 12, it is characterised in that by the effective district of control of authority information transfer Domain is divided into N number of region, and the base station of a few wireless network is respectively provided in N number of region;
At least one described server is the different control of authority information of N number of Area generation;
The base station of at least one wireless network, sends the control of authority information corresponding with its region;
Wherein, N is >=2 integer.
14. authority control system according to claim 13, it is characterised in that at least one described server is the N The different time sections in individual region generate different control of authority information.
15. the authority control system according to claim 13 or 14, it is characterised in that at least one described server according to The control of authority information that at least one described authority controlled end is received is judged residing at least one described authority controlled end Region.
16. authority control system according to claim 15, it is characterised in that at least one described authority controlled end according to Its described control of authority information received judges the region residing for it.
CN201780000069.6A 2017-02-08 2017-02-08 Authority control method, authority controlled device, electronic equipment and system Pending CN107005578A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/073108 WO2018145266A1 (en) 2017-02-08 2017-02-08 Permission control method, permission-controlled device, electronic device, and system

Publications (1)

Publication Number Publication Date
CN107005578A true CN107005578A (en) 2017-08-01

Family

ID=59435993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780000069.6A Pending CN107005578A (en) 2017-02-08 2017-02-08 Authority control method, authority controlled device, electronic equipment and system

Country Status (2)

Country Link
CN (1) CN107005578A (en)
WO (1) WO2018145266A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112260985A (en) * 2020-09-03 2021-01-22 郑州富联智能工坊有限公司 Terminal safety control equipment and terminal safety control method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060004002A (en) * 2004-07-06 2006-01-12 소프트포럼 주식회사 Method for controlling the connecting request of an user computer on the internet and computer readable record medium on which a program therefor is recorded
CN103200155A (en) * 2012-01-05 2013-07-10 国民技术股份有限公司 System and method of right control based on limiting area
CN103354550A (en) * 2013-07-03 2013-10-16 杭州华三通信技术有限公司 Authorization control method and device based on terminal information
CN103428655A (en) * 2012-05-15 2013-12-04 上海博路信息技术有限公司 Data exchanging system based on short messages
CN103491539A (en) * 2013-08-27 2014-01-01 展讯通信(上海)有限公司 Method and device for controlling access right of mobile equipment
CN104335523A (en) * 2014-04-15 2015-02-04 华为技术有限公司 Access control method, client and server
CN104717204A (en) * 2015-02-02 2015-06-17 深圳市中兴移动通信有限公司 Method for controlling file access permission and terminal
CN105323294A (en) * 2014-08-20 2016-02-10 广东小天才科技有限公司 Intelligent terminal authority control method and device
CN105992206A (en) * 2015-02-04 2016-10-05 ***通信集团湖北有限公司 Enterprise safety management method, equipment and system
CN106034104A (en) * 2015-03-07 2016-10-19 华为技术有限公司 Verification method, verification device and verification system for network application accessing

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008040546A (en) * 2006-08-01 2008-02-21 Canon Inc Information processor, its control method, and program
CN102769631B (en) * 2012-07-31 2015-09-09 华为技术有限公司 Access the method for Cloud Server, system and access device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060004002A (en) * 2004-07-06 2006-01-12 소프트포럼 주식회사 Method for controlling the connecting request of an user computer on the internet and computer readable record medium on which a program therefor is recorded
CN103200155A (en) * 2012-01-05 2013-07-10 国民技术股份有限公司 System and method of right control based on limiting area
CN103428655A (en) * 2012-05-15 2013-12-04 上海博路信息技术有限公司 Data exchanging system based on short messages
CN103354550A (en) * 2013-07-03 2013-10-16 杭州华三通信技术有限公司 Authorization control method and device based on terminal information
CN103491539A (en) * 2013-08-27 2014-01-01 展讯通信(上海)有限公司 Method and device for controlling access right of mobile equipment
CN104335523A (en) * 2014-04-15 2015-02-04 华为技术有限公司 Access control method, client and server
CN105323294A (en) * 2014-08-20 2016-02-10 广东小天才科技有限公司 Intelligent terminal authority control method and device
CN104717204A (en) * 2015-02-02 2015-06-17 深圳市中兴移动通信有限公司 Method for controlling file access permission and terminal
CN105992206A (en) * 2015-02-04 2016-10-05 ***通信集团湖北有限公司 Enterprise safety management method, equipment and system
CN106034104A (en) * 2015-03-07 2016-10-19 华为技术有限公司 Verification method, verification device and verification system for network application accessing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112260985A (en) * 2020-09-03 2021-01-22 郑州富联智能工坊有限公司 Terminal safety control equipment and terminal safety control method

Also Published As

Publication number Publication date
WO2018145266A1 (en) 2018-08-16

Similar Documents

Publication Publication Date Title
US20230154262A1 (en) Decentralized virtual trustless database for access control
CN106134143B (en) Method, apparatus and system for dynamic network access-in management
DE112014005379B4 (en) Providing credentials on an electronic device using passwords communicated through verified channels
CN202906904U (en) A NFC enablement device storing and searching dedicated personal information of portable applications
CN105205898A (en) Electronic code permission management system for intelligent lock
CN109672645B (en) Identity authentication method, user terminal and authentication management server
CN104318170B (en) A kind of method and device based on multi-mobile-terminal protection data safety
CN103813314A (en) Soft SIM card enabling method and network access method, terminal, and network access device
US8688987B2 (en) Secure key distribution with general purpose mobile device
CN106341234A (en) Authorization method and device
CN107079261A (en) The access certificate to secure network is provided using wireless beacon
CN105323294A (en) Intelligent terminal authority control method and device
CN104468640A (en) Method and device for achieving sharing of cloud storage space
CN104903861A (en) Clipboard management
CN110414208A (en) Login validation method, calculates equipment and medium at device
CN105850155A (en) System and method for managing application data of contactless card applications
CN101137992A (en) Sytem and method for providing access to oma drm protected files from java applications
CN105653864A (en) Medical record information sharing method and device
CN107480554A (en) A kind of right management method, rights management device and intelligent terminal
CN109271807A (en) The data safety processing method and system of database
CN205140033U (en) Electron password privilege management system of intelligence lock
CN109063450A (en) A kind of control method of secure storage medium, secure storage medium and system
CN100593779C (en) Communication system and method for sharing information by mobile network interface
CN104640112B (en) A kind of identification authentication method, apparatus and system
CN107846676A (en) Safety communicating method and system based on network section security architecture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170801

WD01 Invention patent application deemed withdrawn after publication