WO2012106958A1 - Procédé et système de modification et de configuration pour une authentification d'autorisation - Google Patents

Procédé et système de modification et de configuration pour une authentification d'autorisation Download PDF

Info

Publication number
WO2012106958A1
WO2012106958A1 PCT/CN2011/081187 CN2011081187W WO2012106958A1 WO 2012106958 A1 WO2012106958 A1 WO 2012106958A1 CN 2011081187 W CN2011081187 W CN 2011081187W WO 2012106958 A1 WO2012106958 A1 WO 2012106958A1
Authority
WO
WIPO (PCT)
Prior art keywords
authorization authentication
change
user
change configuration
authorization
Prior art date
Application number
PCT/CN2011/081187
Other languages
English (en)
Chinese (zh)
Inventor
魏巍
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012106958A1 publication Critical patent/WO2012106958A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present invention relates to a change configuration technology for authorization authentication in a mobile communication technology, and in particular, to a change configuration method and system for authorization authentication.
  • the home information machine is a family information terminal launched in the era of the third generation mobile communication technology (3G). It is an information terminal system that combines various functions such as mobile phone, telephone, information, broadband, and home security to achieve " Basic call, information service, broadband service, home security, smart home control" as one effect; 3G wireless network must be able to support different data transmission speeds, that is, to support at least 2Mbps in indoor, outdoor and driving environments respectively (Megabytes per second), 384 kbps (kilobytes per second) and 144 kbps transmission speed, which is called "Broadband in Mobile Phones".
  • 3G wireless network must be able to support different data transmission speeds, that is, to support at least 2Mbps in indoor, outdoor and driving environments respectively (Megabytes per second), 384 kbps (kilobytes per second) and 144 kbps transmission speed, which is called "Broadband in Mobile Phones”.
  • the telephone function means can make, receive calls, send and receive text messages;
  • 3G home information terminal is similar to a 3G mobile phone that can be placed at home, can insert the 3G number user identification card (SIM) and enjoy the same as 3G mobile phone Function;
  • Internet access means With the expansion of mobile 3G network, the bandwidth and speed are improved, making wireless Internet video browsing easier and faster;
  • Security function means After installing the magnetic door and infrared detector, wireless remote security can be realized.
  • the home information machine can also take a real-time video picture of the next home according to the owner's instruction, and send it to the owner's mobile phone for later collection;
  • the video monitoring function means You can watch the home situation anytime and anywhere;
  • the smart home function means Remote control function;
  • the terminal can remotely control any electrical equipment in the home through wireless remote heads and wireless smart switches installed in all corners of the home to perform various operations such as changing TV channels, adjusting air conditioning temperature or switching room lights.
  • the owner can continue to "control" various electrical switches in the home by editing mobile phone text messages.
  • the telemedicine function means: The patient can transmit blood pressure, body temperature, etc. to the corresponding platform of the hospital through the home information terminal for telemedicine.
  • Learning entertainment function means: learning English, playing games, mp4, digital photo frame, taking photos, etc.
  • Other functions mean: can realize stocks, doors Intercom, intercom, property management and other functions.
  • a change configuration method for authorization authentication is applied to a home information machine, and the method includes: setting different priorities for authorization authentication of different modules and users;
  • the method further includes:
  • the method of determining the module and the user who needs to change the configuration is configured to actively send the authorization authentication change configuration request; or, after receiving the sent authorization authentication change configuration request, sending Authorization authentication change configuration request.
  • the steps for actively sending an authorization authentication change configuration request include:
  • the home information machine initiates an authorization authentication change configuration request to the module and the user; or
  • the module initiates an authorization authentication change configuration request to the user.
  • the steps of receiving the authorization authentication change configuration request include:
  • the home information machine receiving module and the authorization authentication change configuration request sent by the user; or, the module receives the authorization authentication change configuration request sent by the user.
  • the step of changing the configuration of the authorization information of all modules and users in the priority level includes: the home information machine configuring its own authorization authentication information according to the priority change, and Sending the authorization authentication change configuration information to all modules and users in the priority; the corresponding module and the user receiving the authorization authentication change configuration information, and reconfiguring the respective authorization authentication information;
  • the step of changing the configuration of all the modules and the user's authorized authentication information in the priority includes: The priority change is configured to configure its own authentication and authentication information, and the authorized authentication change configuration information is sent to the user in the priority level; the corresponding user receives the authorized authentication change configuration information, and reconfigures its own authorized authentication information.
  • a change configuration system for authorizing authentication is applied to a home information machine, and the system includes a setting device, a determining device, and a change configuration device, wherein:
  • the setting device is configured to: set different priorities for authorization authentication of different modules and users; the determining device is configured to: determine a module and a user that need to change the configuration, and a priority to which the module and the user belong;
  • the change configuration device is configured to: change the authorization authentication information of all modules and users within the configured priority.
  • the system also includes a processing device, wherein:
  • the processing device is configured to: after the setting device sets different priorities for authorization authentication of different modules and users, the determining device determines to send the authorization authentication change configuration request before determining the module and the user that need to change the configuration; or ,
  • the authorization authentication change configuration request is sent. among them:
  • the processing device is further configured to: initiate a proactive authorization authentication change configuration request to the module and the user; or
  • the processing device is further configured to: receive a passive authorization authentication change configuration request sent by the module and the user; or
  • the change configuration device is further configured to: configure the authorization according to the priority change Authenticating information, and sending the authorization authentication change configuration information to all modules and users in the priority, so that the corresponding module and the user receive the authorization authentication change configuration information, and reconfigure the respective authorization authentication information; or
  • the change configuration device When the processing device is configured to initiate an authorization authentication change configuration request to the user; or, when receiving the authorization authentication change configuration request sent by the user, the change configuration device is further configured to: configure the own authorization authentication information according to the priority change, and Sending the authorization authentication change configuration information to the user in the priority level, so that the corresponding user receives the authorization authentication change configuration information, and reconfigures its own authorization authentication information.
  • the above-mentioned authorization authentication change configuration method and system by setting the authorization authentication priority, uniformly change and configure all modules and users included in each priority level, thereby avoiding each module when the authorization authentication is changed and configured.
  • the user must initiate the change and configuration request, which effectively reduces the number of times the authorization authentication changes and the information exchange time and configuration delay, thereby reducing the complexity of the authorization authentication change and configuration mechanism in the home information machine.
  • FIG. 1 is a flowchart of a method for changing a configuration of an authorization authentication according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a system for changing a configuration of authorization authentication according to an embodiment of the present invention.
  • An embodiment of the present invention provides a method for configuring a change of an authorization certificate, where the method includes: Set different priorities for authorization authentication of different modules and users;
  • the method further includes:
  • the change configuration of the authorization authentication in the home information machine includes two types, one is a top-down manner, that is, the active authorization authentication change configuration initiated by the home information machine, the module to the user or the home information machine to the module; It is a bottom-up approach, that is, a passive authorization authentication change configuration initiated by the user, the module to the home information machine or the user to the module.
  • the authorization can be dynamically changed and configured based on the priority in the home information machine.
  • FIG. 1 it is a flowchart of a method for configuring a change of authorization authentication according to an embodiment of the present invention, where the method includes:
  • Step 101 The home information machine sets priorities for authorization authentication of different modules and users; the home information machine sets priorities for authorization authentication of different modules, for example, according to basic calls, information services, broadband services, home security, and smart home control.
  • the functional division of different modules is given a high to low priority, but is not limited thereto;
  • the above module refers to the function module inside the home information machine; the authorization authentication of the home information machine to different modules and users refers to which functional modules of the home information machine can be used for authorization authentication by different users;
  • Step 103 The module, the user sends an authorization authentication change and a configuration request to the home information machine, including a module and a user that need to be changed and configured;
  • Step 104 The home information machine determines that the module and the user related to the configuration need to be dynamically changed, and is classified according to a preset priority;
  • Step 105 The home information machine and the module change and reconfigure their own authorization and authentication information according to the authorization authentication priority;
  • Step 106 The home information machine sends an authorization authentication change and configuration information to the module, the user, or the module, where the authorization authentication change and configuration information includes a new authorized authentication module and a user; if the home information machine sends the active mode to the module and the user To authorize the authentication change configuration request, the step may be: the home information machine sends the authorization authentication change and the configuration information to the module and the user;
  • the step may be: the module sends the authorization authentication change and configuration information to the user;
  • the step may be: the home information machine sends the authorization authentication change and the configuration information to the module and the user; if the module receives the passive authorization authentication change configuration request sent by the user The step may be: the module sends the authorization authentication change and configuration information to the user; Step 107, the module, the user receives the authorization authentication change and configuration information, and reconfigures the respective authorization authentication information; or, the user receives the authorization authentication change and configuration Information, and reconfigure its own authorization information;
  • Step 108 The module sends a confirmation completion change and a configuration confirmation completion message to the home information machine, or the user sends a confirmation completion change and a configuration confirmation completion message to the module, and completes the change and configuration of the authorization authentication.
  • the above-mentioned authorization authentication change configuration method is to classify the modules and users involved in the authorization authentication content by setting the authorization authentication priority, and change and configure all the modules and users included in each priority level. And configuration, to avoid the change and configuration of authorization, each module, user must initiate changes and configuration requests, effectively reducing the authorization change and configuration The number of times of information interaction is delayed, which reduces the complexity of the authorization authentication change and configuration mechanism in the home information machine.
  • FIG. 2 it is a schematic structural diagram of a change configuration system for authorization authentication according to an embodiment of the present invention.
  • the system includes a setting device 21, a determining device 22, and a change configuration device 23, wherein:
  • the setting means 21 is arranged to: set different priorities for authorization authentication of different modules and users; the determining means 22 is arranged to: determine the module and the user who need to change the configuration, and the priority to which the module and the user belong;
  • the change configuration means 23 is arranged to change the authorization authentication information of all the modules and users in the priority configuration.
  • the above system may further include a processing device 24, the processing device 24 is configured to: after the setting device sets different priorities for authorization authentication of different modules and users, the determining configuration determines that the module and the user need to be changed before And actively sending an authorization authentication change configuration request; or, after receiving the sent authorization authentication change configuration request, sending an authorization authentication change configuration request.
  • the processing device 24 is further configured to: initiate a proactive authorization authentication change configuration request to the module or the user; or initiate a proactive authorization authentication change configuration request to the user.
  • the processing device 24 is further configured to: receive a passive authorization authentication change configuration request sent by the user or the module; or receive a passive authorization authentication change configuration request sent by the user.
  • the change configuration device 23 is further configured to: Configuring its own authorization authentication information according to the priority change, and sending authorization authentication change configuration information to all modules and users in the priority; all modules and users receiving the authorization authentication change configuration information, and reconfiguring their respective Authorization certification information.
  • the change configuration device 23 is further configured to: change according to the priority Configure the authorization authentication information of the user, and send the authorization authentication change configuration information to the user in the priority level; the user receives the authorization authentication change configuration information, and reconfigures its own authorization authentication information.
  • the above-mentioned authorization configuration change authorization system can be located in the home information machine, and the authorization certification is changed.
  • the above-mentioned authorization configuration change authorization system sets the authorization authentication priority, classifies the modules and users involved in the authorization authentication content, and changes and configures all the modules and users included in each priority level.
  • the configuration avoids the change and configuration request of each module and user when the authorization authentication is changed and configured, which effectively reduces the number of times of information interaction between the authorization authentication change and the configuration, and thus reduces the authorization in the home information machine.
  • the complexity of the authentication change and configuration mechanism is used to reduces the number of times of information interaction between the authorization authentication change and the configuration, and thus reduces the authorization in the home information machine.
  • the above-mentioned authorization authentication change configuration method and system by setting the authorization authentication priority, uniformly change and configure all modules and users included in each priority level, thereby avoiding each module when the authorization authentication is changed and configured.
  • the user must initiate the change and configuration request, which effectively reduces the number of times the authorization authentication changes and the information exchange time and configuration delay, thereby reducing the complexity of the authorization authentication change and configuration mechanism in the home information machine. Therefore, the present invention has strong industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention concerne un procédé et un système de modification et de configuration utilisés sur une machine informatique domestique. Le procédé consiste en ce qui suit : définir différents niveaux de priorité pour l'authentification d'autorisation de différents modules et utilisateurs, identifier les modules et les utilisateurs nécessitant une modification et une configuration et le niveau de priorité des modules et des utilisateurs nécessitant une modification et une configuration, et modifier les informations d'authentification d'autorisation de tous les modules et utilisateurs configurés dans le niveau de priorité. Selon ce procédé et ce système de modification et de configuration pour l'authentification d'autorisation, tous les modules et les utilisateurs inclus dans chaque niveau de priorité sont modifiés et configurés de manière uniforme en définissant le niveau de priorité pour l'authentification d'autorisation. Cela permet d'éviter le cas dans lequel chaque module et chaque utilisateur doivent formuler une demande de modification et de configuration lors de la modification et de la configuration de l'authentification d'autorisation, réduisant ainsi efficacement la fréquence et le retard de l'interaction des informations lors de la modification et de la configuration de l'authentification d'autorisation, et simplifiant en outre la modification et la configuration de l'authentification d'autorisation dans la machine informatique domestique.
PCT/CN2011/081187 2011-02-11 2011-10-24 Procédé et système de modification et de configuration pour une authentification d'autorisation WO2012106958A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2011100362600A CN102638796A (zh) 2011-02-11 2011-02-11 授权认证的变更配置方法及***
CN201110036260.0 2011-02-11

Publications (1)

Publication Number Publication Date
WO2012106958A1 true WO2012106958A1 (fr) 2012-08-16

Family

ID=46622987

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/081187 WO2012106958A1 (fr) 2011-02-11 2011-10-24 Procédé et système de modification et de configuration pour une authentification d'autorisation

Country Status (2)

Country Link
CN (1) CN102638796A (fr)
WO (1) WO2012106958A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114024742A (zh) * 2021-11-03 2022-02-08 北京天融信网络安全技术有限公司 授权管理方法、装置、设备及存储介质
CN114172732A (zh) * 2021-12-09 2022-03-11 北京数字众智科技有限公司 一种认证切换方法、装置、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030885A (zh) * 2006-10-10 2007-09-05 中山大学 一种控制家庭成员对数字家电使用权限的装置及方法
CN101159618A (zh) * 2007-11-23 2008-04-09 杭州华三通信技术有限公司 一种权限配置方法和设备
CN101364894A (zh) * 2008-09-24 2009-02-11 金蝶软件(中国)有限公司 权限范围设置方法及基于该方法的工作流提供方法和装置
CN101951403A (zh) * 2010-09-16 2011-01-19 中兴通讯股份有限公司 一种信息终端中基于分级的集中式认证与授权方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3818504B2 (ja) * 2002-04-15 2006-09-06 ソニー株式会社 情報処理装置および方法、並びにプログラム

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030885A (zh) * 2006-10-10 2007-09-05 中山大学 一种控制家庭成员对数字家电使用权限的装置及方法
CN101159618A (zh) * 2007-11-23 2008-04-09 杭州华三通信技术有限公司 一种权限配置方法和设备
CN101364894A (zh) * 2008-09-24 2009-02-11 金蝶软件(中国)有限公司 权限范围设置方法及基于该方法的工作流提供方法和装置
CN101951403A (zh) * 2010-09-16 2011-01-19 中兴通讯股份有限公司 一种信息终端中基于分级的集中式认证与授权方法

Also Published As

Publication number Publication date
CN102638796A (zh) 2012-08-15

Similar Documents

Publication Publication Date Title
US11698846B2 (en) Accessory communication control
KR102293116B1 (ko) 제어기와 액세서리 사이의 통신을 위한 균일한 통신 프로토콜
KR101801127B1 (ko) 실시간 전송 프로토콜에 대한 스트리밍 제어
US9763094B2 (en) Methods, devices and systems for dynamic network access administration
EP3547606B1 (fr) Procédé de gestion d'autorisations, dispositif associé, et système
US20150168930A1 (en) Device control method, device control system
US20180054854A1 (en) Wireless communication device and wireless communication method
CN110235424A (zh) 用于在通信***中提供和管理安全信息的设备和方法
CN103476030A (zh) 移动终端连接网络的方法、移动终端与终端设备
CN103944740A (zh) 通信管理***、中继装置、通信控制***、通信***
CN107846685A (zh) 配置信息的传输方法、装置及***、存储介质
WO2014205956A1 (fr) Procédé de commande de périphérique de terminal, passerelle m2m et système de communication
CN106792823A (zh) 一种基于Miracast的终端连接方法和装置
CN110012527A (zh) 唤醒方法及电子设备
US20120210399A1 (en) Location-enabled access control lists for real-world devices
WO2019196668A1 (fr) Procédé d'envoi d'informations, procédé de génération de clé et dispositif
WO2012106958A1 (fr) Procédé et système de modification et de configuration pour une authentification d'autorisation
WO2023051192A1 (fr) Procédé et dispositif de gestion de données
WO2017028568A1 (fr) Procédé de commande d'appareil intelligent, et dispositif l'utilisant
WO2012034377A1 (fr) Procédé d'authentification et d'autorisation centralisées à base de classification dans un terminal d'informations
JP2006217327A (ja) 無線通信装置及び通信システム
CN113938345A (zh) 联动设备的控制方法、***、智能网关设备及存储介质
KR101723957B1 (ko) 개인용 무선 공유기의 접속제어 장치
WO2023231018A1 (fr) Procédé et appareil de configuration de justificatif d'identité de primitive de réseau ido personnel (pin), dispositif de communication, et support de stockage
US20220201484A1 (en) Multi-modal approach to a secure and closed solution for providing scheduled notifications

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11858269

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11858269

Country of ref document: EP

Kind code of ref document: A1