CN107223328A - A kind of method and system of Root authority management and control - Google Patents

A kind of method and system of Root authority management and control Download PDF

Info

Publication number
CN107223328A
CN107223328A CN201780000245.6A CN201780000245A CN107223328A CN 107223328 A CN107223328 A CN 107223328A CN 201780000245 A CN201780000245 A CN 201780000245A CN 107223328 A CN107223328 A CN 107223328A
Authority
CN
China
Prior art keywords
time limit
terminal
mobile terminal
root authority
remote server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780000245.6A
Other languages
Chinese (zh)
Inventor
王威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Landi Commercial Equipment Co Ltd filed Critical Fujian Landi Commercial Equipment Co Ltd
Publication of CN107223328A publication Critical patent/CN107223328A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to Root authority management and control field, more particularly to a kind of method and system of Root authority management and control.The present invention is to send subscriber identity information to remote server by S1, terminal;Identity information described in S2, the remote server verification, is verified result;If S3, the result are qualified to verify, the terminal obtains the corresponding identification code of mobile terminal;S4, the terminal send the identification code to the remote server;S5, the remote server set authorization code according to the identification code and authorize the time limit;S6, the terminal obtain the authorization code and authorize the time limit;S7, the terminal send the authorization code and authorize the time limit to the mobile terminal;S8, the mobile terminal set corresponding authority according to authorization code and the mandate time limit.So as to, it is to avoid the Root authority that unauthorized person obtains the authority that should not be obtained or obtained is situation about indefinitely limiting, and improves the security of system.

Description

A kind of method and system of Root authority management and control
Technical field
The present invention relates to Root authority management and control field, more particularly to a kind of method and system of Root authority management and control.
Background technology
Existing terminal device, it is contemplated that the security that equipment is used, so be not provided with Root authority, i.e. user Access equipment is in limited state, it is impossible to the resource of random access equipment.But in some cases, such as commissioning device When in order to debug the reason such as more convenient be accomplished by obtain Root authority.
The method of existing terminal management Root authority:Only need user downloaded in terminal one include realize Root weigh Limit the packet of function;Afterwards, terminal is restarted;Finally, domestic consumer is changed into Root user by re-authentication.Although This right management method is very convenient;But, this method easily makes unauthorized person obtain the authority that should not be obtained;Moreover, obtaining The Root authority obtained is indefinitely limited, and is unfavorable for the security of system.
The content of the invention
The technical problems to be solved by the invention are:Solve the problem of Root authority using time limit without using, and Root The problem of authority can be propagated arbitrarily.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:
The present invention provides a kind of method of Root authority management and control, including step:
Terminal sends subscriber identity information to remote server;
Identity information described in the remote server verification, is verified result;
If the result is qualified to verify, the terminal obtains the corresponding identification code of mobile terminal;
The terminal sends the identification code to the remote server;
The remote server sets authorization code according to the identification code and authorizes the time limit;
The terminal obtains the authorization code and authorizes the time limit;
The terminal sends the authorization code and authorizes the time limit to the mobile terminal;
The mobile terminal sets corresponding authority according to authorization code and the mandate time limit.
The present invention separately provides a kind of system of Root authority management and control, including:
First sending module, subscriber identity information is sent to remote server for terminal;
Authentication module, for identity information described in the remote server verification, is verified result;
First acquisition module, if qualified to verify for the result, the terminal obtains mobile terminal correspondence Identification code;
Forwarding module, the identification code is sent to the remote server for the terminal;
First setup module, sets authorization code according to the identification code for the remote server and authorizes the time limit;
Second acquisition module, obtains the authorization code for the terminal and authorizes the time limit;
Second sending module, sends the authorization code for the terminal and authorizes the time limit to the mobile terminal;
Authority module, corresponding authority is set for the mobile terminal according to authorization code and the mandate time limit.
The beneficial effects of the present invention are:Remote server is set to carry out the management of Root authority, when user needs to obtain During Root authority, user carries out authentication by terminal to remote server.Remote server is verified to user, is determined Whether gift;The priority assignation time limit to authorizing also is needed if authority is authorized.Can be any so as to solve Root authority The problem of propagation, meanwhile, the Root authority that user obtains is that have time restriction, strengthens the security of terminal system.
Brief description of the drawings
Fig. 1 is a kind of FB(flow block) of the method embodiment of Root authority management and control of the invention;
Fig. 2 is a kind of system block diagram of the system embodiment of Root authority management and control of the invention;
Fig. 3 is a kind of another system block diagram of the system embodiment of Root authority management and control of the invention;
Label declaration:
1st, the first sending module;2nd, authentication module;3rd, the first acquisition module;4th, forwarding module;5th, the first setup module;6、 Second acquisition module;7th, the second sending module;8th, authority module;9th, receiving module;10th, the 3rd acquisition module;11st, mould is judged Block;12nd, encrypting module;13rd, the second setup module;14th, the first link block;15th, the second link block;16th, generation module.
Embodiment
The design of most critical of the present invention is:The certification of identity and the management of Root authority are carried out by remote server, And the time limit is set to the Root authority for authorizing user.
Explanation of nouns
Authorize the time limit Finger allows the period that the user with Root authority is operated to terminal device
Fig. 1 and Fig. 2 is refer to,
As shown in figure 1, the present invention provides a kind of method of Root authority management and control:
The present invention provides a kind of method of Root authority management and control, including step:
Terminal sends subscriber identity information to remote server;
Identity information described in the remote server verification, is verified result;
If the result is qualified to verify, the terminal obtains the corresponding identification code of mobile terminal;
The terminal sends the identification code to the remote server;
The remote server sets authorization code according to the identification code and authorizes the time limit;
The terminal obtains the authorization code and authorizes the time limit;
The terminal sends the authorization code and authorizes the time limit to the mobile terminal;
The mobile terminal sets corresponding authority according to authorization code and the mandate time limit.
Seen from the above description, the beneficial effects of the present invention are:The checking of user identity is carried out by remote server With the management of Root authority, unauthorized person can be avoided to obtain the authority that should not be obtained, while being the priority assignation time limit, it is ensured that Authority was limited with the time limit, improved the security of system.
Further, in addition to:
The mobile terminal receives Root authority operation requests;
The mobile terminal obtains the corresponding mandate time limit according to the Root authority operation requests;
The mobile terminal judges whether to perform the Root authority operation requests according to the corresponding mandate time limit.
Seen from the above description, terminal will not only judge whether the Root authority of user is effective, while needing to judge the power Whether limit is in the range of the time limit, so as to further increase the security of system.
Further, in addition to:
The authorization code and the mandate time limit are encrypted the mobile terminal, obtain time limit control file;
The mobile terminal sets corresponding change authority to time limit control file.
Seen from the above description, terminal-pair authorization code and authorize the time limit to be encrypted, and it is further to encryption after Authorization code and authorize the time limit be provided with change authority so that avoid user changes authority or time limit without authorization, or make to obtain The user for obtaining authority obtains authority, or the expired user of authority is continuing with authority change system.Then system is improved Security.
Further, in addition to:
The terminal connects the mobile terminal by debugging line;
The terminal passes through remote server described in network connection.
Seen from the above description, by network connection remote server, the efficiency of connection is improved;Connected by debugging line Mobile terminal, reduction accesses the possibility interfered, and improves the efficiency and stability of operation.
Further, in addition to:
The mobile terminal generates the identification code according to device hardware mark.
Seen from the above description, it is, institute corresponding with unique equipment to identify the identification code generated by device hardware So that the authority obtained finally by the identification code can be ensured, it is impossible to used again in other equipment, user's acquisition is reduced The possibility that the authority is modified to other equipment, improves the security of system.
As shown in Fig. 2 the present invention provides a kind of system of Root authority management and control, including:
First sending module 1, subscriber identity information is sent to remote server for terminal;
Authentication module 2, for identity information described in the remote server verification, is verified result;
First acquisition module 3, if qualified to verify for the result, the terminal obtains mobile terminal correspondence Identification code;
Forwarding module 4, the identification code is sent to the remote server for the terminal;
First setup module 5, sets authorization code according to the identification code for the remote server and authorizes the time limit;
Second acquisition module 6, obtains the authorization code for the terminal and authorizes the time limit;
Second sending module 7, sends the authorization code for the terminal and authorizes the time limit to the mobile terminal;
Authority module 8, corresponding authority is set for the mobile terminal according to authorization code and the mandate time limit.
Further, in addition to:
Receiving module 9, Root authority operation requests are received for the mobile terminal;
3rd acquisition module 10, corresponding authorize is obtained for the mobile terminal according to the Root authority operation requests Time limit;
Judge module 11, judges whether to perform the Root for the mobile terminal according to the corresponding mandate time limit Limiting operation is asked.
Further, in addition to:
Encrypting module 12, is encrypted to the authorization code and the mandate time limit for the mobile terminal, obtains File is controlled to the time limit;
Second setup module 13, corresponding change authority is set for the mobile terminal to time limit control file.
Further, in addition to:
First link block 14, the mobile terminal is connected for the terminal by debugging line;
Second link block 15, remote server described in network connection is passed through for the terminal.
Further, in addition to:
Generation module 16, the identification code is generated for the mobile terminal according to device hardware mark.
Embodiments of the invention one are:
S1, the terminal connect the mobile terminal by debugging line;The terminal described in network connection by remotely taking Business device.
S2, terminal send subscriber identity information to remote server.
Identity information described in S3, the remote server verification, is verified result.
S4, the mobile terminal generate the identification code according to device hardware mark.
If S5, the result are qualified to verify, the terminal obtains the corresponding identification code of mobile terminal.
S6, the terminal send the identification code to the remote server.
S7, the remote server set authorization code according to the identification code and authorize the time limit.
S8, the terminal obtain the authorization code and authorize the time limit.
S9, the terminal send the authorization code and authorize the time limit to the mobile terminal.
S10, the mobile terminal set corresponding authority according to authorization code and the mandate time limit.
The authorization code and the mandate time limit are encrypted for S11, the mobile terminal, obtain time limit control text Part;The mobile terminal sets corresponding change authority to time limit control file.
S12, the mobile terminal receive Root authority operation requests;The mobile terminal is operated according to the Root authority Request obtains the corresponding mandate time limit;The mobile terminal judges whether to perform the Root according to the corresponding mandate time limit Limiting operation is asked.
Embodiments of the invention two are:
S1, in advance mobile terminal (hereinafter referred to as POS terminal) install a management program, terminal (hereinafter referred to as PC ends) peace Fill application program.When user needs to obtain Root authority, POS terminal is attached with PC ends using debugging line.
S2, PC end are connected by network and the authorization server in a distant place, and the PC ends are by the application program to remote Journey server inputs user name and carries out the checking corresponding the result of identity acquisition with password.
If S3, obtained the result are qualified, the result is fed back to POS terminal.POS terminal will by management program POS terminal hardware device code is converted into after identification code (identification code is only corresponding with unique equipment), and transmits the mark Code arrives PC ends.
The identification code is transmitted to distant server end by S4, PC end.Remote server will be according to the raw correspondence of identification code life Authorization code with and set mandate the time limit, and by the authorization code with authorize the time limit return to PC ends.
S5, PC end are by the authorization code with authorizing the time limit to download to POS terminal, and POS terminal parses the authorization code with authorizing the time limit, Corresponding authority is set.
S6, POS terminal, can be to authorization codes with authorizing the time limit that place is encrypted when authorization code is received with authorizing the time limit Reason, so as to obtain correspondence time limit control file.Time limit control file except including authorization code with authorize the time limit in addition to, in addition to some Between parameter information for controlling useful life, such as equipment are obtained at the beginning of Root authority, the time of the sub-authorization is long Degree etc..Afterwards, POS terminal is provided with change authority to time limit control file, forbids PC ends to control file to the time limit It is modified.
S7, when PC ends are connected to POS terminal by debugging line, and to obtain Root authority, or carry out Root authority During operation, first, check POS terminal whether the authority containing Root authority.This connection request is exited if not to enter Journey, the time limit of the Root authority if then reading current system operation time and with being stored in POS terminal is controlled in file Parameter is compared, if current time is within the scope of the time limit of mandate, then authorize Root authority;If current System operation time is not in the time limit scope of mandate, then this connection request is just exited.
As shown in figure 3, embodiments of the invention three are:
The first link block 14 is set to connect terminal and mobile terminal by debugging line first.
And set the second link block 15 by network by the terminal by being connected with remote server.
First sending module 1 sends subscriber identity information to remote server by terminal.
Authentication module 2 is verified result by identity information described in the remote server verification.
Generation module 16 generates the identification code by the mobile terminal according to device hardware mark.
If the first acquisition module 3 judges that the result checking is qualified, then the terminal obtains mobile terminal correspondence Identification code.
Forwarding module 4 sends the identification code to the remote server by the terminal.
First setup module 5 sets authorization code according to the identification code by the remote server and authorizes the time limit.
Second acquisition module 6 obtains the authorization code by the terminal and authorizes the time limit.
Second sending module 7 sends the authorization code by the terminal and authorizes the time limit to the mobile terminal.
Authority module 8 sets corresponding authority by the mobile terminal according to authorization code and the mandate time limit.
The authorization code and the mandate time limit are encrypted by the mobile terminal for encrypting module 12, are obtained Time limit controls file.
Second setup module 13 controls file to set corresponding change authority the time limit by the mobile terminal.
Receiving module 9 receives Root authority operation requests by the mobile terminal.
3rd acquisition module 10 obtains corresponding authorize by the mobile terminal according to the Root authority operation requests Time limit.
Judge module 11 judges whether to perform the Root by the mobile terminal according to the corresponding mandate time limit Limiting operation is asked.
In summary, the present invention provides a kind of method and system of Root authority management and control.Mainly by setting remote service Device carries out the management of Root authority, and when user needs to obtain Root authority, user carries out body by terminal to remote server Part certification.Remote server is verified to user, decides whether gift;Also need to set the authority authorized if authority is authorized Put the time limit.Meanwhile, authority and time limit be encrypted and set change authority, it is to avoid user changes authority and time limit without authorization; Meanwhile, authorization code is generated by EIC equipment identification code, it is to avoid the authority authorized is illegally used in other equipment;Simultaneously for Obtain Root authority operation and carry out authority and time limit dual identification, it is ensured that all Root authority operations are all before the deadline 's.By above step so as to solve the shortcoming that Root authority can be propagated arbitrarily, meanwhile, user also can not indefinitely limit The acquisition Root authority of system, strengthens the security of terminal system.

Claims (10)

1. a kind of method of Root authority management and control, it is characterised in that including:
S1, terminal send subscriber identity information to remote server;
Identity information described in S2, the remote server verification, is verified result;
If S3, the result are qualified to verify, the terminal obtains the corresponding identification code of mobile terminal;
S4, the terminal send the identification code to the remote server;
S5, the remote server set authorization code according to the identification code and authorize the time limit;
S6, the terminal obtain the authorization code and authorize the time limit;
S7, the terminal send the authorization code and authorize the time limit to the mobile terminal;
S8, the mobile terminal set corresponding authority according to authorization code and the mandate time limit.
2. a kind of method of Root authority management and control according to claim 1, it is characterised in that also include:
The mobile terminal receives Root authority operation requests;
The mobile terminal obtains the corresponding mandate time limit according to the Root authority operation requests;
The mobile terminal judges whether to perform the Root authority operation requests according to the corresponding mandate time limit.
3. a kind of method of Root authority management and control according to claim 1, it is characterised in that also include:
The authorization code and the mandate time limit are encrypted the mobile terminal, obtain time limit control file;
The mobile terminal sets corresponding change authority to time limit control file.
4. a kind of method of Root authority management and control according to claim 1, it is characterised in that also include:
The terminal connects the mobile terminal by debugging line;
The terminal passes through remote server described in network connection.
5. a kind of Root authority management-control method according to claim 1, it is characterised in that also include:
The mobile terminal generates the identification code according to device hardware mark.
6. a kind of system of Root authority management and control, it is characterised in that including:
First sending module, subscriber identity information is sent to remote server for terminal;
Authentication module, for identity information described in the remote server verification, is verified result;
First acquisition module, if qualified to verify for the result, the terminal obtains the corresponding mark of mobile terminal Know code;
Forwarding module, the identification code is sent to the remote server for the terminal;
First setup module, sets authorization code according to the identification code for the remote server and authorizes the time limit;
Second acquisition module, obtains the authorization code for the terminal and authorizes the time limit;
Second sending module, sends the authorization code for the terminal and authorizes the time limit to the mobile terminal;
Authority module, corresponding authority is set for the mobile terminal according to authorization code and the mandate time limit.
7. a kind of system of Root authority management and control according to claim 6, it is characterised in that also include:
Receiving module, Root authority operation requests are received for the mobile terminal;
3rd acquisition module, the corresponding mandate time limit is obtained for the mobile terminal according to the Root authority operation requests;
Judge module, judges whether that performing the Root authority grasps for the mobile terminal according to the corresponding mandate time limit Ask.
8. a kind of system of Root authority management and control according to claim 6, it is characterised in that also include:
Encrypting module, is encrypted to the authorization code and the mandate time limit for the mobile terminal, obtains the time limit Control file;
Second setup module, corresponding change authority is set for the mobile terminal to time limit control file.
9. a kind of system of Root authority management and control according to claim 6, it is characterised in that also include:
First link block, the mobile terminal is connected for the terminal by debugging line;
Second link block, remote server described in network connection is passed through for the terminal.
10. a kind of system of Root authority management and control according to claim 6, it is characterised in that also include:
Generation module, the identification code is generated for the mobile terminal according to device hardware mark.
CN201780000245.6A 2017-04-12 2017-04-12 A kind of method and system of Root authority management and control Pending CN107223328A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/080220 WO2018187960A1 (en) 2017-04-12 2017-04-12 Method and system for managing and controlling root permission

Publications (1)

Publication Number Publication Date
CN107223328A true CN107223328A (en) 2017-09-29

Family

ID=59955042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780000245.6A Pending CN107223328A (en) 2017-04-12 2017-04-12 A kind of method and system of Root authority management and control

Country Status (2)

Country Link
CN (1) CN107223328A (en)
WO (1) WO2018187960A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543392A (en) * 2018-11-26 2019-03-29 广州鲁邦通物联网科技有限公司 The method and unit of root shell are temporarily opened in a kind of embedded Linux equipment
CN109657448A (en) * 2018-12-21 2019-04-19 惠州Tcl移动通信有限公司 A kind of method, apparatus, electronic equipment and storage medium obtaining Root authority
CN110650199A (en) * 2019-09-25 2020-01-03 湖南快乐阳光互动娱乐传媒有限公司 Remote connection method and device
CN111787369A (en) * 2019-04-03 2020-10-16 深圳Tcl数字技术有限公司 Root authority control method and system for smart television and storage medium
CN112579996A (en) * 2019-09-29 2021-03-30 杭州海康威视数字技术股份有限公司 Temporary authorization method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110247055A1 (en) * 2008-06-02 2011-10-06 Microsoft Corporation Trusted device-specific authentication
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN103747028A (en) * 2013-11-27 2014-04-23 上海斐讯数据通信技术有限公司 Method for granting user temporary root authority
CN104113549A (en) * 2014-07-28 2014-10-22 百度在线网络技术(北京)有限公司 Platform authorization method, platform server side, application client side and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473502A (en) * 2013-09-16 2013-12-25 惠州Tcl移动通信有限公司 Method and system for acquiring Root rights of android-based mobile terminal
CN105975818A (en) * 2015-11-06 2016-09-28 乐视移动智能信息技术(北京)有限公司 Method and device for obtaining super user permission

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110247055A1 (en) * 2008-06-02 2011-10-06 Microsoft Corporation Trusted device-specific authentication
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN103747028A (en) * 2013-11-27 2014-04-23 上海斐讯数据通信技术有限公司 Method for granting user temporary root authority
CN104113549A (en) * 2014-07-28 2014-10-22 百度在线网络技术(北京)有限公司 Platform authorization method, platform server side, application client side and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543392A (en) * 2018-11-26 2019-03-29 广州鲁邦通物联网科技有限公司 The method and unit of root shell are temporarily opened in a kind of embedded Linux equipment
CN109657448A (en) * 2018-12-21 2019-04-19 惠州Tcl移动通信有限公司 A kind of method, apparatus, electronic equipment and storage medium obtaining Root authority
CN111787369A (en) * 2019-04-03 2020-10-16 深圳Tcl数字技术有限公司 Root authority control method and system for smart television and storage medium
CN111787369B (en) * 2019-04-03 2022-05-03 深圳Tcl数字技术有限公司 Root authority control method and system for smart television and storage medium
CN110650199A (en) * 2019-09-25 2020-01-03 湖南快乐阳光互动娱乐传媒有限公司 Remote connection method and device
CN110650199B (en) * 2019-09-25 2022-08-12 湖南快乐阳光互动娱乐传媒有限公司 Remote connection method and device
CN112579996A (en) * 2019-09-29 2021-03-30 杭州海康威视数字技术股份有限公司 Temporary authorization method and device
CN112579996B (en) * 2019-09-29 2023-11-03 杭州海康威视数字技术股份有限公司 Temporary authorization method and device

Also Published As

Publication number Publication date
WO2018187960A1 (en) 2018-10-18

Similar Documents

Publication Publication Date Title
CN108064440B (en) FIDO authentication method, device and system based on block chain
CN105654580B (en) Access control method and system, electronic lock, management and visitor's terminal
CN107223328A (en) A kind of method and system of Root authority management and control
CN103051628B (en) Obtain the method and system of authentication token based on server
CN105516195B (en) A kind of security certification system and its authentication method based on application platform login
CN111783068B (en) Device authentication method, system, electronic device and storage medium
CN106034028A (en) Terminal equipment authentication method, apparatus and system thereof
CN105187431A (en) Log-in method, server, client and communication system for third party application
CN103001936B (en) A kind of third party's application interface authorization method and system
CN103220673B (en) WLAN user authentication method, certificate server and subscriber equipment
CN103647788B (en) A kind of node security authentication method in intelligent grid
CN106127888B (en) Intelligent lock operation method and smart lock operating system
CN103401880A (en) Automatic login industrial control system and control method
CN106713279A (en) Video terminal identity authentication system
CN102045333A (en) Method for generating safety message process key
CN109383449A (en) Authorization method, car key, smart machine and the vehicle of car key
CN110045970A (en) A kind of Distributed die on-line rewriting method and system
CN106156677B (en) Identity card card reading method and system
CN109905869A (en) Data transmission method between a kind of charging equipment and smart machine
CN110351265A (en) A kind of authentication method based on JWT, computer-readable medium and system
CN109587142A (en) A kind of the data safety AM access module and equipment of service-oriented stream
CN104125230A (en) Short message authentication service system and authentication method
CN104580063A (en) A network management security authentication method and device, and network management security authentication system
CN104835038A (en) Networking payment device and networking payment method
CN106302539A (en) A kind of embedded type WEB safety certifying method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170929