CN110753034B - Authority management method and related device - Google Patents

Authority management method and related device Download PDF

Info

Publication number
CN110753034B
CN110753034B CN201910923795.6A CN201910923795A CN110753034B CN 110753034 B CN110753034 B CN 110753034B CN 201910923795 A CN201910923795 A CN 201910923795A CN 110753034 B CN110753034 B CN 110753034B
Authority
CN
China
Prior art keywords
user
electronic device
server
interval
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910923795.6A
Other languages
Chinese (zh)
Other versions
CN110753034A (en
Inventor
田岱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wanyi Technology Co Ltd
Original Assignee
Wanyi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wanyi Technology Co Ltd filed Critical Wanyi Technology Co Ltd
Priority to CN201910923795.6A priority Critical patent/CN110753034B/en
Publication of CN110753034A publication Critical patent/CN110753034A/en
Application granted granted Critical
Publication of CN110753034B publication Critical patent/CN110753034B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a method and a related device for managing authority, which comprise the following steps: the method comprises the steps that a server receives a permission obtaining request sent by a terminal, wherein the permission obtaining request carries identity information of a first user; the server carries out identity verification on the first user according to the identity information of the first user; when the identity authentication is passed, the server acquires the position of the terminal to obtain position information; the server determines at least one electronic device according to the position information; and the server allocates the control authority of the at least one electronic device to the terminal. By implementing the embodiment of the invention, the acquisition mode of the control authority is simplified.

Description

Authority management method and related device
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and a related apparatus for managing permissions.
Background
With the rapid development of information technology, the technology for controlling various electronic devices through mobile phones is more and more mature. For example, in daily life, people often use mobile phones to control electronic devices such as air conditioners and televisions. In this process, some control software is often required to be installed to obtain the authority to control the electronic devices such as the air conditioner and the television.
However, for different electronic devices, users need to install different control software to control the different electronic devices. Therefore, such a method of acquiring the control authority is excessively complicated.
Disclosure of Invention
The embodiment of the invention provides a permission management method and a related device, and simplifies the acquisition mode of control permission by implementing the embodiment of the invention.
A first aspect of an embodiment of the present invention provides a method for rights management, including:
the method comprises the steps that a server receives a permission obtaining request sent by a terminal, wherein the permission obtaining request carries identity information of a first user;
the server carries out identity verification on the first user according to the identity information of the first user;
when the identity authentication is passed, the server acquires the position of the terminal to obtain position information;
the server determines at least one electronic device according to the position information;
and the server allocates the control authority of the at least one electronic device to the terminal.
A second aspect of an embodiment of the present invention provides a server, including:
the receiving module is used for receiving a permission obtaining request sent by a terminal, wherein the permission obtaining request carries identity information of a first user;
the verification module is used for verifying the identity of the first user according to the identity information of the first user;
the obtaining module is used for obtaining the position of the terminal when the identity authentication is passed so as to obtain position information;
a determining module for determining at least one electronic device according to the location information;
and the distribution module is used for distributing the control authority of the at least one electronic device for the terminal.
A third aspect of embodiments of the present invention provides a rights managed electronic device, comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and are generated as instructions that are executed by the processor to perform the steps in the method of any of the first aspects of the claims.
A fourth aspect of embodiments of the present invention provides a computer-readable storage medium for storing a computer program for execution by a processor to perform the method of any one of the first aspect of the claims.
It can be seen that, in the above technical solution, a server receives an authority acquisition request sent by a terminal, where the authority acquisition request carries identity information of a first user; the server carries out identity verification on the first user according to the identity information of the first user; when the identity verification passes, the server acquires the position of the terminal to obtain position information, so that the security of the control authority of the electronic equipment is improved through identity authentication, and an illegal user is prevented from acquiring the control authority of the electronic equipment and using the electronic equipment; the server determines at least one electronic device according to the position information; the server distributes the control authority of the at least one electronic device to the terminal, the control authority of the electronic device is dynamically distributed to the terminal based on the position, the use safety of the electronic device is improved, and a more flexible and more convenient control authority distribution scheme is provided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
fig. 1A is a schematic structural diagram of a communication system according to an embodiment of the present invention;
fig. 1B is a schematic structural diagram of a server according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a rights management method according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating another rights management method according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating another rights management method according to an embodiment of the present invention;
fig. 5 is a schematic server structure diagram of a hardware operating environment according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following are detailed below.
The terms "first," "second," and "third" in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
First, referring to fig. 1A, fig. 1A is a schematic structural diagram of a communication system according to an embodiment of the present invention, where the communication system may include a server 110 and a terminal 120 that are interconnected through a network. The server 110 may implement all functions mentioned in the embodiments of the present invention, but is not limited to all functions mentioned in the embodiments of the present invention. The terminal 120 may implement all functions mentioned in the embodiments of the present invention, but is not limited to all functions mentioned in the embodiments of the present invention.
Referring to fig. 1B, fig. 1B is a schematic structural diagram of a server 110 according to an embodiment of the present invention, where the server 110 may include: a receiving module 111, a verifying module 112, an obtaining module 113, a determining module 114, an assigning module 115, and the like.
A receiving module 111, configured to receive an authority obtaining request sent by a terminal, where the authority obtaining request carries identity information of a first user;
the terminal may be, for example, a mobile phone, a tablet computer, a notebook computer, a palm computer, an MID, or other terminal devices.
The identity information of the first user may include, for example: login account and login password, login account and fingerprint information, login account and face information and the like.
The verification module 112 is configured to perform identity verification on the first user according to the identity information of the first user;
an obtaining module 113, configured to obtain a location of the terminal when the identity authentication passes, so as to obtain location information;
a determining module 114, configured to determine at least one electronic device according to the location information;
optionally, the determining module is specifically configured to obtain all location tags of the user to obtain at least one location tag; determining at least one position information corresponding to the at least one position label; determining whether first location information identical to the location information exists in the at least one location information; if yes, acquiring at least one first electronic device associated with the first position information, and setting the at least one first electronic device as the at least one electronic device; if not, taking the position information as a center and taking a first preset distance as a radius, acquiring at least one second electronic device in an area formed by the first preset distance, and setting the at least one second electronic device as the at least one electronic device, wherein the at least one second electronic device is an electronic device which is connected with the server.
Optionally, the determining module is specifically configured to detect whether the location information matches a working location of the first user; if yes, acquiring the position information of the first user, and determining the at least one electronic device according to the position information; if not, detecting whether the position information is matched with the home address of the first user; if yes, acquiring the at least one electronic device associated with the first user; if not, detecting whether the position information is matched with a home address of a second user, wherein the second user is not the same user as the first user; if so, acquiring the intimacy degree between the first user and the second user, determining an intimacy degree interval in which the intimacy degree falls, acquiring at least one first electronic device associated with the second user according to the intimacy degree interval to obtain at least one second electronic device, and setting the at least one second electronic device as the at least one electronic device; if not, taking the position information as a center and a first preset distance as a radius, acquiring at least one third electronic device in an area formed by the first preset distance, acquiring the at least one third electronic device according to the identity information of the first user, and setting the at least one third electronic device as the at least one electronic device.
Optionally, the determining module is specifically configured to obtain a chat record of the first user and the second user within a preset time; analyzing the chat records to obtain intimacy information associated with the intimacy degree, wherein the intimacy information comprises: calling, chatting times and a longest chatting duration, wherein the chatting times are the total chatting times of the first user and the second user in the preset time, the longest chatting duration is the chatting duration of the first user and the second user in a first time period, and the first time period belongs to the preset time; and determining the intimacy degree according to the intimacy information.
Optionally, the chat record includes a plurality of text messages, the intimacy information includes the number of times of the chat, and the determining module is specifically configured to obtain a plurality of text sending times associated with the plurality of text messages; determining a first text transmission time with the earliest time in the text transmission times and a second text transmission time with the latest time in the text transmission times; acquiring the remaining text sending time except the first text sending time and the second text sending time from the plurality of text sending times; determining an interval time between each of the remaining text sending times and an adjacent text sending time to obtain a plurality of interval times, wherein a third sending time is any one of the remaining text sending times, a fourth sending time is an adjacent text sending time of the third sending time, and the plurality of interval times include an interval time between the third sending time and the fourth sending time or an interval time between the fourth sending time and the third sending time; and determining the chat times according to the plurality of interval times.
Optionally, the determining module is specifically configured to determine an interval time interval in which each of the interval times falls, so as to obtain at least one interval time interval; and determining the chat times according to the at least one interval time interval.
Optionally, the chat record includes a plurality of text messages, the affinity message includes the longest chat duration, and the determining module is specifically configured to obtain a plurality of text sending times associated with the plurality of text messages; determining a first text transmission time with the earliest time in the plurality of text transmission times; respectively determining interval time between the first character sending time and the remaining character sending time except the first character sending time in the plurality of character sending times to obtain a plurality of interval times; extracting at least one interval time which is less than a first preset interval time from the plurality of interval times; determining the longest chat duration according to the at least one interval time.
An assigning module 115, configured to assign a control right of the at least one electronic device to the terminal.
The technical solution of the embodiment of the present invention may be implemented based on the communication system with the architecture illustrated in fig. 1 by way of example or a variant architecture thereof.
Referring to fig. 2, fig. 2 is a flow chart illustrating a rights management method according to an embodiment of the present invention, where the method may include, but is not limited to, the following steps:
201. the method comprises the steps that a server receives a permission obtaining request sent by a terminal, wherein the permission obtaining request carries identity information of a first user;
the terminal may be, for example, a mobile phone, a tablet computer, a notebook computer, a palm computer, an MID, or other terminal devices.
The identity information of the first user may include, for example: login account and login password, login account and fingerprint information, login account and face information and the like.
202. The server carries out identity verification on the first user according to the identity information of the first user;
203. when the identity authentication passes, the server acquires the position of the terminal to obtain position information;
204. the server determines at least one electronic device according to the position information;
the at least one electronic device includes an air conditioner, a television, a coffee machine, a sound box, and the like, which is not limited in this application.
205. And the server allocates the control authority of the at least one electronic device to the terminal.
It can be seen that, in the above technical solution, a server receives an authority acquisition request sent by a terminal, where the authority acquisition request carries identity information of a first user; the server carries out identity verification on the first user according to the identity information of the first user; when the identity verification passes, the server acquires the position of the terminal to obtain position information, so that the security of the control authority of the electronic equipment is improved through identity authentication, and an illegal user is prevented from acquiring the control authority of the electronic equipment and using the electronic equipment; the server determines at least one electronic device according to the position information; the server distributes the control authority of the at least one electronic device to the terminal, the control authority of the electronic device is dynamically distributed to the terminal based on the position, the use safety of the electronic device is improved, and a more flexible and more convenient control authority distribution scheme is provided.
Referring to fig. 3, fig. 3 is a flowchart illustrating a further rights management method according to an embodiment of the present invention, where the server determines at least one electronic device according to the location information, and the method includes:
301. the server acquires all the position labels of the user to obtain at least one position label;
further, each of the at least one location tag is obtained by the server executing a preset operation, where the preset operation includes the following steps: receiving a location message sent by the terminal, wherein the location message comprises at least one piece of location information and associated information associated with the at least one piece of location information; and marking the at least one piece of position information corresponding to the associated information by adopting the associated information. Further, the location message is generated after the terminal acquires the at least one piece of location information and the associated information from the information input point of the interface when the terminal detects the location information submission operation.
Wherein the associated information comprises one of: user information and company information. The user information includes a name, a contact address, etc., and the company information includes a company name, etc.
Further, the at least one location tag includes, for example: company, family address, parent's house, friend's house, etc. For example, a friend's family may include: zhang three families, Xiaoming family, Xiaohong family, etc.
302. The server determines at least one piece of position information corresponding to the at least one position label;
303. the server determines whether first position information identical to the position information exists in the at least one position information;
if yes, go to step 304; if not, go to step 305.
304. The server acquires at least one first electronic device associated with the first position information and sets the at least one first electronic device as the at least one electronic device;
the at least one first electronic device includes an air conditioner, a television, a coffee machine, a sound box, and the like, which is not limited in this application.
305. And the server takes the position information as a center and a first preset distance as a radius, acquires at least one second electronic device in an area formed by the first preset distance, and sets the at least one second electronic device as the at least one electronic device, wherein the at least one second electronic device is the electronic device which is connected with the server.
Wherein the first preset distance is set or configured at the server by an administrator.
For example, the first preset distance is 10 meters, and the area formed by the first preset distance includes a circular area with a radius of 10 meters and centered on the position information, and further, the server may obtain all electronic devices that have established connection with the server in the circular area.
Therefore, according to the technical scheme, the electronic equipment is obtained in batches based on the position information, and preparation is made for subsequently distributing the authority of a large number of electronic equipment to the terminal at the same time.
Referring to fig. 4, fig. 4 is a flowchart illustrating a further rights management method according to an embodiment of the present invention, where the server determines at least one electronic device according to the location information, and the method includes:
401. the server detects whether the position information is matched with the working position of the first user;
if yes, go to step 402; if not, go to step 403.
And the working position of the first user is the working position information of the first user.
For example, the first user works at xx technologies, and the work location of the first user is xx technologies.
402. The server acquires the position information of the first user and determines the at least one electronic device according to the position information;
optionally, the different job information is associated with different sets of electronic devices, and each set of electronic devices includes at least one electronic device. Further, the higher the job information is, the greater the number of electronic devices included in the electronic device set is.
The at least one electronic device includes an air conditioner, a television, a coffee machine, a sound box, and the like, which is not limited in this application.
Optionally, the determining the at least one electronic device according to the position information includes: acquiring an electronic equipment set related to the position information; setting at least one electronic device included in the set of electronic devices as the at least one electronic device.
403. The server detects whether the position information is matched with the home address of the first user;
if yes, go to step 404; if not, go to step 405.
404. The server acquires the at least one electronic device associated with the first user;
405. the server detects whether the position information is matched with a home address of a second user, wherein the second user is not the same user as the first user;
the second user may include, for example, a father of the first user, a mother of the first user, a friend of the first user, and the like.
If yes, go to step 406; if not, go to step 407.
406. The server acquires the intimacy degree between the first user and the second user, determines an intimacy degree interval in which the intimacy degree falls, acquires at least one first electronic device associated with the second user according to the intimacy degree interval to obtain at least one second electronic device, and sets the at least one second electronic device as the at least one electronic device;
the intimacy degree is used for representing an intimacy value corresponding to intimacy relation, and the intimacy relation is determined according to the relation between the first user and the second user.
Optionally, the obtaining, by the server, the affinity between the first user and the second user includes: the server acquires chat records of the first user and the second user within preset time; the server analyzes the chat records to obtain intimacy information associated with the intimacy degree, wherein the intimacy information comprises: calling, chatting times and a longest chatting duration, wherein the chatting times are the total chatting times of the first user and the second user in the preset time, the longest chatting duration is the chatting duration of the first user and the second user in a first time period, and the first time period belongs to the preset time; and the server determines the intimacy according to the intimacy information.
Wherein, the chat records at least comprise one of the following: text information, picture information, video information, voice information.
The preset time includes, for example, 2 hours, 10 hours, 23 hours, one day, 2 days, and the like.
Among them, the designations may include, for example: baby, lambkin, husband, wife, grandpa, etc.
The first time period includes, for example, 1 hour, 2 hours, 23 hours, one day, 2 days, and the like.
Therefore, in the technical scheme, the intimacy degree is determined based on the intimacy information in the chat records, so that the reliability and the accuracy of intimacy degree determination are improved.
Further, the chat log includes a plurality of text messages, the intimacy message includes the number of times of the chat, and the server analyzes the chat log to obtain the intimacy message associated with the intimacy degree, including: the server acquires a plurality of character sending times associated with the plurality of pieces of character information; the server determines a first text transmission time with the earliest time in the text transmission times and a second text transmission time with the latest time in the text transmission times; the server acquires the remaining character sending time except the first character sending time and the second character sending time from the plurality of character sending times; the server determines the interval time between each text sending time in the remaining text sending times and the adjacent text sending time to obtain a plurality of interval times, wherein the third sending time is any one text sending time in the remaining text sending times, the fourth sending time is the adjacent text sending time of the third sending time, and the plurality of interval times comprise the interval time between the third sending time and the fourth sending time or the interval time between the fourth sending time and the third sending time; and the server determines the chat times according to the plurality of interval times.
For example, the plurality of text transmission times includes: 20/9/2019/20/15/30/9/2019/20/16/27/9/2019/20/17/11/2019/9/20/17/11, the first text sending time is 15/20/9/2019/20, and the second text sending time is 17/11/9/20/2019/20/11, so that the interval time between the 20/15/30/9/2019/and the adjacent text sending time comprises: the interval between 10 minutes and 57 minutes, and the sending time of the adjacent text at 20/9/2019 at 16:27 comprises: 57 minutes and 44 minutes, then, the plurality of intervals includes 10 minutes, 57 minutes, and 44 minutes.
Therefore, in the technical scheme, the chat times are determined based on the interval time, and the reliability and the accuracy of the chat times are improved.
Further, the server determines the number of chatting according to the plurality of intervals, including: the server determines an interval time interval in which each interval time falls in the plurality of interval times to obtain at least one interval time interval; and the server determines the chat times according to the at least one interval time interval.
The interval time intervals are all in units of seconds, for example, the interval time intervals include [0,5], 5 being 5 seconds, each interval time interval in at least one interval time interval corresponds to 2 endpoints, the 2 endpoints include a first interval time endpoint and a second interval time endpoint, and the first interval time endpoint is greater than the second interval time endpoint.
For example, the interval time interval is (25,33), then the first interval time end point is 33 and the second interval time end point is 25.
Optionally, the determining, by the server, the number of chatting according to the at least one interval time interval includes: acquiring a first interval time endpoint corresponding to each interval time interval in the at least one interval time interval to obtain at least one first interval time endpoint, wherein each first interval time endpoint in the at least one first interval time endpoint is larger than each second interval time endpoint, and each second interval time endpoint and each first interval time endpoint form each interval time interval; comparing each first interval time endpoint of the at least one first interval time endpoint with a second preset interval time; acquiring an interval time endpoint which is smaller than the second preset interval time in the at least one first interval time endpoint to obtain at least one third interval time endpoint; the at least one third interval time endpoint determines the number of chats.
Wherein the second preset interval time is set by an administrator or configured in a configuration file of the server.
For example, if the at least one interval time interval includes (25,33), (15,26) and (28,43), and the second preset interval time is 42, it can be seen that the corresponding first interval time end point 43 of (28,43) is greater than the second preset interval time, and the other 2 first interval time end points are less than the second preset interval time, so that the at least one third interval time includes (25,33) and (15, 26).
Therefore, in the technical scheme, the chat times are determined based on the interval time end points, and the reliability and the accuracy of the chat times are improved.
Optionally, the chat record includes a plurality of pieces of text information, the affinity information includes the longest chat duration, and the server parses the chat record to obtain the affinity information associated with the affinity, including: the server acquires a plurality of character sending times associated with the plurality of pieces of character information; the server determines a first text transmission time with the earliest time in the plurality of text transmission times; the server respectively determines the interval time between the first character sending time and the rest of the character sending times except the first character sending time to obtain a plurality of interval times; the server extracts at least one interval time which is less than a first preset interval time from the plurality of interval times; the server determines the longest chat duration according to the at least one interval time.
Wherein the first preset interval time is set by an administrator or configured in a configuration file of the server.
Wherein the server determines the longest chat duration according to the at least one interval time, including: the server selects a first interval time with the longest interval time from the at least one interval time; the server acquires the character sending time corresponding to the first interval time; and the server sets the text sending time corresponding to the first interval time as the longest chat duration.
For example, the plurality of intervals includes 33, 26 and 43, and assuming that the first preset interval is 42, it can be seen that 43 is greater than the first preset interval, and the other 2 intervals are less than the first preset interval. Further, 33 is greater than 26, and assuming that the first text sending time is 2019, month 9, day 20, day 15:21, then the maximum chat duration is 2019, month 9, day 20, day 15: 54.
Therefore, in the technical scheme, the reliability and the accuracy of determining the longest chat duration are improved.
Further, before the obtaining of the at least one first electronic device associated with the second user according to the affinity interval to obtain at least one second electronic device, the method further includes: acquiring all first electronic devices associated with the second user to obtain a plurality of first electronic devices; grouping the plurality of first electronic devices according to the order of the functional importance corresponding to the electronic devices from high to low to obtain at least one first electronic device set; setting at least one intimacy interval; constructing a mapping relation between the at least one first electronic equipment set and the at least one affinity interval; storing the mapping relationship in association with the second user in a database.
Each first electronic device set in the at least one first electronic device set at least includes one first electronic device, and the first electronic device includes an air conditioner, a television, a coffee machine, a sound box, and the like, which is not limited in this application.
The importance of the function corresponding to the electronic device is set or configured in a configuration file of the server by an administrator.
For example, the air conditioner has a function importance of 10, the television has a function importance of 2, the coffee maker has a function importance of 5, and so on.
It can be seen that, in the above technical solution, the mapping relationship between the constructed intimacy degree interval and the first electronic device set is improved, different electronic devices are obtained for different intimacy degrees, and the difference of subsequently allocating control authority to the terminal is also realized.
Each of the at least one affinity interval has 2 corresponding endpoints, and the 2 endpoints include a first affinity endpoint and a second affinity endpoint, wherein the first affinity endpoint is larger than the second affinity endpoint, and the larger the first affinity endpoint, the more the electronic device sets corresponding to the affinity intervals.
For example, if the affinity interval is (87,93), then the first affinity endpoint is 93 and the second affinity endpoint is 87; another affinity interval is (65,72), then the first affinity endpoint is 72 and the second affinity endpoint is 65. Further, at least one first electronic device set includes 2 first electronic device sets, and then, when the first affinity endpoint is 93, the mapping relationship corresponding to the affinity interval includes the mapping relationship between the affinity interval and the 2 first electronic device sets; when the first affinity endpoint is 72, the mapping relationship corresponding to the affinity interval includes a mapping relationship between the affinity interval and one of the at least one first electronic device set, and the functional importance corresponding to each first electronic device in the one of the at least one first electronic device set is smaller than the functional importance corresponding to each first electronic device in the other one of the at least one first electronic device set.
Further, the constructing a mapping relationship between the at least one first electronic device set and the at least one affinity interval includes: obtaining a first intimacy end point corresponding to each intimacy interval in the at least one intimacy interval to obtain at least one first intimacy end point, wherein each first intimacy end point in the at least one first intimacy end point is larger than each second intimacy end point, and each second intimacy end point and each first intimacy end point form each intimacy interval; constructing a mapping relationship between the at least one first set of electronic devices and the at least one affinity interval according to each of the at least one first affinity endpoint corresponding to the at least one affinity interval.
It can be seen that, in the above technical solution, a mapping relationship between the first electronic device set and the affinity interval is established for different first affinity endpoints, so that differences in subsequent assignment of control permissions to the terminals are realized.
Further, a third affinity endpoint is any one endpoint of the at least one first affinity endpoint, the third affinity endpoint belongs to a first affinity interval, and the constructing a mapping relationship between the at least one first electronic device set and the at least one affinity interval according to each of the at least one first affinity endpoint includes: determining a fourth set of electronic devices corresponding to the third affinity endpoint from the at least one first set of electronic devices; acquiring at least one fifth electronic device set from the rest of the at least one first electronic device set except the fourth electronic device set, wherein the functional importance corresponding to each first electronic device in each fifth electronic device set is smaller than the functional importance corresponding to each first electronic device in the fourth electronic device set; and constructing a mapping relation between the first affinity interval and the fourth electronic device set and the at least one first electronic device set.
It can be seen that, in the above technical solution, a mapping relationship between the first electronic device set and the affinity interval is established for different first affinity endpoints, so that differences in subsequent assignment of control permissions to the terminals are realized.
407. And the server acquires at least one third electronic device in an area formed by a first preset distance by taking the position information as a center and a first preset distance as a radius, acquires the at least one third electronic device according to the identity information of the first user, and sets the at least one third electronic device as the at least one electronic device.
Wherein the first preset distance is set or configured at the server by an administrator.
For example, the first preset distance is 10 meters, and the area formed by the first preset distance includes a circular area with a radius of 10 meters and centered on the position information, and further, the server may obtain all electronic devices that have established connection with the server in the circular area.
Therefore, according to the technical scheme, the electronic equipment is obtained in batches based on the position information, the permission of simultaneously allocating a large number of electronic equipment to the terminal subsequently is prepared, and the difference of subsequently allocating control permission to the terminal is realized.
Referring to fig. 5, fig. 5 is a schematic diagram of a server structure of a hardware operating environment according to an embodiment of the present application. As shown in fig. 5, a server of a hardware operating environment according to an embodiment of the present application may include:
a processor 501, such as a CPU.
The memory 502 may alternatively be a high speed RAM memory or a stable memory such as a disk memory.
A communication interface 503 for implementing connection communication between the processor 501 and the memory 502.
Those skilled in the art will appreciate that the configuration of the server shown in fig. 5 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 5, the memory 502 may include therein an operating system, a network communication module, and a program for information processing. The operating system is a program that manages and controls server hardware and software resources, a program that supports personnel management, and the execution of other software or programs. The network communication module is used to implement communication between the components in the memory 502 and with other hardware and software in the server.
In the server shown in fig. 5, the processor 501 is configured to execute the program for migrating information stored in the memory 502, and implement the following steps: the method comprises the steps that a server receives a permission obtaining request sent by a terminal, wherein the permission obtaining request carries identity information of a first user; the server carries out identity verification on the first user according to the identity information of the first user; when the identity authentication is passed, the server acquires the position of the terminal to obtain position information; the server determines at least one electronic device according to the position information; and the server allocates the control authority of the at least one electronic device to the terminal.
For specific implementation of the server related to the present application, reference may be made to each embodiment of the above right management method, which is not described herein again.
The present application further provides a computer readable storage medium for storing a computer program, the stored computer program being executable by the processor to perform the steps of: the method comprises the steps that a server receives a permission obtaining request sent by a terminal, wherein the permission obtaining request carries identity information of a first user; the server carries out identity verification on the first user according to the identity information of the first user; when the identity authentication is passed, the server acquires the position of the terminal to obtain position information; the server determines at least one electronic device according to the position information; and the server allocates the control authority of the at least one electronic device to the terminal.
For specific implementation of the computer-readable storage medium related to the present application, reference may be made to the embodiments of the rights management method, which are not described herein again.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and in actual implementation, there may be other divisions, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or modules through some interfaces, and may be in an electrical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (8)

1. A method of rights management, comprising:
the method comprises the steps that a server receives a permission obtaining request sent by a terminal, wherein the permission obtaining request carries identity information of a first user;
the server carries out identity verification on the first user according to the identity information of the first user;
when the identity authentication is passed, the server acquires the position of the terminal to obtain position information;
the server determines at least one electronic device according to the position information;
the server distributes the control authority of the at least one electronic device to the terminal;
the server determines at least one electronic device according to the position information, and the method comprises the following steps:
the server detects whether the position information is matched with the working position of the first user;
if so, the server acquires the position information of the first user and determines the at least one electronic device according to the position information;
if not, the server detects whether the position information is matched with the home address of the first user;
if yes, the server acquires the at least one electronic device associated with the first user;
if not, the server detects whether the position information is matched with a home address of a second user, wherein the second user and the first user are not the same user;
if so, the server acquires the intimacy degree between the first user and the second user, determines an intimacy degree interval in which the intimacy degree falls, acquires at least one first electronic device associated with the second user according to the intimacy degree interval to obtain at least one second electronic device, and sets the at least one second electronic device as the at least one electronic device;
if not, the server takes the position information as the center and takes a first preset distance as the radius, acquires at least one third electronic device in an area formed by the first preset distance, acquires the at least one third electronic device according to the identity information of the first user, and sets the at least one third electronic device as the at least one electronic device.
2. The method of claim 1, wherein the server obtaining the affinity between the first user and the second user comprises:
the server acquires chat records of the first user and the second user within preset time;
the server analyzes the chat records to obtain intimacy information associated with the intimacy degree, wherein the intimacy information comprises: calling, chatting times and a longest chatting duration, wherein the chatting times are the total chatting times of the first user and the second user in the preset time, the longest chatting duration is the chatting duration of the first user and the second user in a first time period, and the first time period belongs to the preset time;
and the server determines the intimacy according to the intimacy information.
3. The method of claim 2, wherein the chat log comprises a plurality of text messages, the affinity information comprises the number of chats, and the server parses the chat log to obtain the affinity information associated with the affinity, comprising:
the server acquires a plurality of character sending times associated with the plurality of pieces of character information;
the server determines a first text transmission time with the earliest time in the text transmission times and a second text transmission time with the latest time in the text transmission times;
the server acquires the remaining character sending time except the first character sending time and the second character sending time from the plurality of character sending times;
the server determines the interval time between each text sending time in the remaining text sending times and the adjacent text sending time to obtain a plurality of interval times, wherein the third sending time is any one text sending time in the remaining text sending times, the fourth sending time is the adjacent text sending time of the third sending time, and the plurality of interval times comprise the interval time between the third sending time and the fourth sending time or the interval time between the fourth sending time and the third sending time;
and the server determines the chat times according to the plurality of interval times.
4. The method of claim 3, wherein the server determines the number of chats according to the plurality of intervals, comprising:
the server determines an interval time interval in which each interval time falls in the plurality of interval times to obtain at least one interval time interval;
and the server determines the chat times according to the at least one interval time interval.
5. The method of claim 2, wherein the chat log comprises a plurality of text messages, wherein the affinity information comprises the longest chat duration, and wherein the server parses the chat log to obtain affinity information associated with the affinity, comprises:
the server acquires a plurality of character sending times associated with the plurality of pieces of character information;
the server determines a first text transmission time with the earliest time in the plurality of text transmission times;
the server respectively determines the interval time between the first character sending time and the rest of the character sending times except the first character sending time to obtain a plurality of interval times;
the server extracts at least one interval time which is less than a first preset interval time from the plurality of interval times;
the server determines the longest chat duration according to the at least one interval time.
6. A server, comprising:
the receiving module is used for receiving a permission obtaining request sent by a terminal, wherein the permission obtaining request carries identity information of a first user;
the verification module is used for verifying the identity of the first user according to the identity information of the first user;
the obtaining module is used for obtaining the position of the terminal when the identity authentication is passed so as to obtain position information;
a determining module for determining at least one electronic device according to the location information;
the distribution module is used for distributing the control authority of the at least one electronic device to the terminal;
the determining module is specifically configured to detect whether the location information matches a working location of the first user; if yes, acquiring the position information of the first user, and determining the at least one electronic device according to the position information; if not, detecting whether the position information is matched with the home address of the first user; if yes, acquiring the at least one electronic device associated with the first user; if not, detecting whether the position information is matched with a home address of a second user, wherein the second user is not the same user as the first user; if so, acquiring the intimacy degree between the first user and the second user, determining an intimacy degree interval in which the intimacy degree falls, acquiring at least one first electronic device associated with the second user according to the intimacy degree interval to obtain at least one second electronic device, and setting the at least one second electronic device as the at least one electronic device; if not, taking the position information as a center and a first preset distance as a radius, acquiring at least one third electronic device in an area formed by the first preset distance, acquiring the at least one third electronic device according to the identity information of the first user, and setting the at least one third electronic device as the at least one electronic device.
7. An electronic device for rights management comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and generated as instructions for execution by the processor to perform the steps of the method of any of claims 1-5.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium is used to store a computer program, which is executed by a processor to implement the method of any of claims 1-5.
CN201910923795.6A 2019-09-27 2019-09-27 Authority management method and related device Active CN110753034B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910923795.6A CN110753034B (en) 2019-09-27 2019-09-27 Authority management method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910923795.6A CN110753034B (en) 2019-09-27 2019-09-27 Authority management method and related device

Publications (2)

Publication Number Publication Date
CN110753034A CN110753034A (en) 2020-02-04
CN110753034B true CN110753034B (en) 2021-10-15

Family

ID=69277281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910923795.6A Active CN110753034B (en) 2019-09-27 2019-09-27 Authority management method and related device

Country Status (1)

Country Link
CN (1) CN110753034B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113784277B (en) * 2021-01-15 2024-05-17 北京京东振世信息技术有限公司 System, method and apparatus for storing location information

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103826007A (en) * 2014-02-17 2014-05-28 小米科技有限责任公司 Method and device for remotely controlling terminal, and terminal device
CN105137786A (en) * 2015-08-03 2015-12-09 珠海格力电器股份有限公司 Method and device for binding smart home equipment
CN105207864A (en) * 2015-08-31 2015-12-30 小米科技有限责任公司 Household appliance control method and device
CN106254141A (en) * 2016-08-31 2016-12-21 深圳博科智能科技有限公司 The method of a kind of Smart Home management and terminal
CN110119606A (en) * 2018-02-07 2019-08-13 浙江宇视科技有限公司 Identity data verification method, system and computer readable storage medium
CN110262274A (en) * 2019-07-22 2019-09-20 青岛海尔科技有限公司 Smart home device control display methods and system based on Internet of Things operating system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103826007A (en) * 2014-02-17 2014-05-28 小米科技有限责任公司 Method and device for remotely controlling terminal, and terminal device
CN105137786A (en) * 2015-08-03 2015-12-09 珠海格力电器股份有限公司 Method and device for binding smart home equipment
CN105207864A (en) * 2015-08-31 2015-12-30 小米科技有限责任公司 Household appliance control method and device
CN106254141A (en) * 2016-08-31 2016-12-21 深圳博科智能科技有限公司 The method of a kind of Smart Home management and terminal
CN110119606A (en) * 2018-02-07 2019-08-13 浙江宇视科技有限公司 Identity data verification method, system and computer readable storage medium
CN110262274A (en) * 2019-07-22 2019-09-20 青岛海尔科技有限公司 Smart home device control display methods and system based on Internet of Things operating system

Also Published As

Publication number Publication date
CN110753034A (en) 2020-02-04

Similar Documents

Publication Publication Date Title
RU2513761C2 (en) Method and server for instant messaging
EP3044987B1 (en) Method and system for verifying an account operation
CN104967997B (en) A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
EP3484125A1 (en) Method and device for scheduling interface of hybrid cloud
US11277421B2 (en) Systems and methods for detecting and thwarting attacks on an IT environment
CN109698809B (en) Method and device for identifying abnormal login of account
US11425571B2 (en) Device configuration method, apparatus and system
CN110138726B (en) Method and system for intelligently and optimally managing cloud information
CN107196917B (en) Service response method and middleware thereof
CN106101091B (en) Method and device for processing data between terminals
CN105516133A (en) User identity verification method, server and client
CN106878527B (en) Call control method and device
WO2018219007A1 (en) User login method, electronic device and storage medium in data query system
CN106656985B (en) Backup account login method, device and system
CN111274046A (en) Service call validity detection method and device, computer equipment and computer storage medium
CN115102792B (en) Multi-system synchronous login method and system
CN112287326A (en) Security authentication method and device, electronic equipment and storage medium
CN104348875A (en) Method, cloud server and system for performing pocket transmission of data
CN104980420A (en) Business processing method, device, terminal and server
CN107493255B (en) Communication message access control method and device
CN110753034B (en) Authority management method and related device
CN106921557B (en) Mail sending method and equipment
CN108540582A (en) A kind of processing method of terminal iidentification, server and terminal
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
US8498392B2 (en) Method and a system for establishing a communication channel between a predetermined number of selected devices and a device and a server arranged for use in the system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant