CN103856621B - The method and device authorized between subscriber equipment - Google Patents

The method and device authorized between subscriber equipment Download PDF

Info

Publication number
CN103856621B
CN103856621B CN201210519658.4A CN201210519658A CN103856621B CN 103856621 B CN103856621 B CN 103856621B CN 201210519658 A CN201210519658 A CN 201210519658A CN 103856621 B CN103856621 B CN 103856621B
Authority
CN
China
Prior art keywords
equipment
subscriber
credible
subscriber equipment
credible equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210519658.4A
Other languages
Chinese (zh)
Other versions
CN103856621A (en
Inventor
张喜涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CN201610455029.8A priority Critical patent/CN106060259B/en
Priority to CN201210519658.4A priority patent/CN103856621B/en
Publication of CN103856621A publication Critical patent/CN103856621A/en
Application granted granted Critical
Publication of CN103856621B publication Critical patent/CN103856621B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

Propose a kind of method authorized between subscriber equipment, comprise the following steps: subscriber equipment runs the application needed through authorizing in the machine, obtain to the credible equipment connected and authorize;After obtaining mandate, described subscriber equipment runs the described application through authorizing.On the other hand the embodiment of the present invention proposes a kind of subscriber equipment.The present invention proposes technical scheme, utilizes credible equipment to authorize the behavior of other-end equipment, by then passing through the credible equipment mandate set in advance, therefore has natural safety and reliability.The such scheme that the present invention proposes, the change to existing equipment is the least, does not interferes with the compatibility of system, and realizes simple, efficiently.

Description

The method and device authorized between subscriber equipment
Technical field
The present invention relates to terminal unit technical field, specifically, the method that the present invention relates to authorize between subscriber equipment And device.
Background technology
In recent years, along with developing rapidly of electronic industry and communication technology, the new industry based on data, speech, video Business development is swift and violent.Microelectric technique, the fast development of computer hardware technique, process the work become increasingly complex for terminal unit Laying the foundation, providing realization for terminal unit personalization may so that terminal has broken away from network to a certain extent Restriction, can possess function from strength to strength.Additionally, user itself also has urgent demand to terminal, it is desirable to termination function More powerful, more flexible, simpler and more direct.The development of information technology, makes terminal technology move towards intellectuality, mobile, multifunction.
Now with the development of subscriber equipment, authority and safety requirements to subscriber equipment are more and more higher, except passing through Mobile radio communication, computer network interconnect, between subscriber equipment also by near-field communication NFC, WIFI Direct, Bluetooth(bluetooth) etc. technology communicate, such as be used for transmit data, file etc..
But, the communication between subscriber equipment, it is common that interconnect based on reciprocity, independent form, do not examine Consider and utilize other-end equipment to realize the access rights to mobile terminal device and the technical scheme of safety proposition solution problem.
Therefore, it is necessary to propose effective technical scheme, solve the access rights between subscriber equipment and safety issue.
Summary of the invention
The purpose of the present invention is intended at least solve one of above-mentioned technological deficiency, enters subscriber equipment especially through credible equipment Row limits and monitoring, improves the safety and reliability of subscriber equipment.
On the one hand the embodiment of the present invention proposes a kind of method authorized between subscriber equipment, comprises the following steps:
Subscriber equipment runs the application needed through authorizing in the machine, obtains to credible equipment and authorizes;
After obtaining mandate, described subscriber equipment runs the described application through authorizing.
On the other hand the embodiment of the present invention proposes a kind of subscriber equipment, including authorization module and operation module,
Described authorization module, authorizes for obtaining to credible equipment;
Described operation module, runs the application needed through authorizing in the machine, when described authorization module obtains credible setting After standby mandate, for running the described application through authorizing.
The present invention proposes technical scheme, utilizes credible equipment to authorize the behavior of other-end equipment, such as forgets When password, when run some program or want to control online etc., all can authorize to utilize this mode.Owing to being By the credible equipment mandate set in advance, therefore there is natural safety and reliability.The such scheme that the present invention proposes, Change to existing equipment is the least, does not interferes with the compatibility of system, and realizes simple, efficiently.
Aspect and advantage that the present invention adds will part be given in the following description, and these will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or that add aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially with easy to understand, wherein:
Fig. 1 is the method flow diagram authorized between embodiment of the present invention subscriber equipment;
Fig. 2 A is the schematic diagram A of the setting of credible equipment;
Fig. 2 B is the schematic diagram B of the setting of credible equipment;
Fig. 3 is the schematic diagram of the behavior needing mandate;
Fig. 4 is the routine access list schematic diagram needing to authorize;
Fig. 5 is embodiment of the present invention user device architecture schematic diagram;
Fig. 6 is the flow chart utilizing believable equipment to be unlocked;
Fig. 7 is the flow chart utilizing believable equipment to carry out function of surfing the Net restriction;
Fig. 8 is the flow chart utilizing believable equipment to carry out routine access restriction;
Fig. 9 is the schematic diagram being realized credible equipment identification by NFC mode;
Figure 10 is the schematic diagram being connected by WIFI Direct and realizing credible equipment identification;
Figure 11 is the schematic diagram being realized credible equipment identification by bluetooth approach;
Figure 12 is credible equipment licensing process schematic diagram.
Detailed description of the invention
Embodiments of the invention are described below in detail, and the example of described embodiment is shown in the drawings, the most from start to finish Same or similar label represents same or similar element or has the element of same or like function.Below with reference to attached The embodiment that figure describes is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative used herein " ", " Individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that use in the description of the present invention arranges Diction " including " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existence or adds Other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim unit Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connections or couple.Wording used herein "and/or" includes one or more any cell listing item being associated and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art Language and scientific terminology) have with the those of ordinary skill in art of the present invention be commonly understood by identical meaning.Also should Being understood by, those terms defined in such as general dictionary should be understood that the meaning having with the context of prior art The meaning that justice is consistent, and unless defined as here, will not explain by idealization or the most formal implication.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above or " subscriber equipment " had both included only possessing The equipment of the wireless signal receiver of non-emissive ability, includes again having and can carry out two-way communication on bidirectional communication link Receive and launch the equipment of hardware.This equipment may include that the honeycomb with and without multi-line display or other communication Equipment;Can process with combine voice and data, fax and/or the PCS Personal Communications System (PCS) of its communication ability;Can include Radio frequency receiver and pager, the Internet/intranet access, web browser, notepad, calendar and/or global positioning system (GPS) PDA(Personal Digital Assistant) of receptor;And/or include that the conventional laptop of radio frequency receiver and/or hand held calculate Machine or other equipment." terminal " used herein above or " subscriber equipment " can be portable, can transport, be arranged on the vehicles In (aviation, sea-freight and/or land), or be suitable for and/or be configured to local runtime and/or with distribution form at the earth And/or any other position operation in space." terminal " used herein above or " subscriber equipment " can also is that communication terminal, on Network termination, music/video playback terminal." terminal " used herein above or " subscriber equipment " can also is that PDA, MID and/or tool There is the mobile phone etc. of music/video playing function." terminal " used herein above or " subscriber equipment " can also is that Intelligent electric Depending on equipment such as, Set Top Boxes.
In order to realize the purpose of the present invention, the present invention proposes, and under given conditions, utilizes credible equipment to set other-end Standby behavior authorizes, and when such as forgetting Password, the when of running some program, or wants to control online etc., the most permissible This mode is utilized to authorize.By then passing through the credible equipment mandate set in advance, therefore there is natural safety and can By property.
On the one hand the embodiment of the present invention proposes a kind of method authorized between subscriber equipment, comprises the following steps:
Subscriber equipment runs the application needed through authorizing in the machine, obtains to credible equipment and authorizes;
After obtaining mandate, described subscriber equipment runs the described application through authorizing.
As it is shown in figure 1, be the method flow diagram authorized between embodiment of the present invention subscriber equipment, comprise the following steps:
S110: subscriber equipment runs the application needed through authorizing in the machine, obtains to credible equipment and authorizes.
In step s 110, subscriber equipment runs the application needed through authorizing in the machine, and if can credit Family equipment is set up and is connected, then obtain to the credible equipment connected and authorize, and otherwise needs to initiate to set up with other subscriber equipmenies to be connected, Credible equipment need to be looked for.
Additionally, subscriber equipment is before the machine runs the application needed through authorizing, also include arranging credible equipment: user Equipment arranges credible equipment list, such as, corresponding subscriber equipment is recorded as credible equipment;Or, subscriber equipment is used with other Family equipment is set up and is connected, and corresponding subscriber equipment is recorded as credible equipment.
Therefore, in order to realize the functions such as mandate between subscriber equipment, monitoring, as embodiments of the invention, also include:
Credible equipment is other subscriber equipmenies pre-set;Or
Subscriber equipment is set up with other subscriber equipmenies and is connected, and judges the attribute of other subscriber equipmenies, decides whether it He is set to credible equipment by subscriber equipment.
Specifically, record credible equipment usually records the indications of credible equipment, and wherein, indications includes but do not limits The labelling of subscriber equipment can be uniquely identified: MAC Address, Bluetooth address or MEID in following one or more information.
Thereafter, when subscriber equipment needs to run through the application of mandate, obtains mandate to credible equipment, with other users Equipment is set up and is connected, and obtains the indications of other subscriber equipmenies, when indications indicates this subscriber equipment to be credible equipment, to this Credible equipment obtains and authorizes.Specifically, the one or more of mode that includes but not limited to is connected:
Connection is remotely set up by mobile cellular network or computer network;
Connected by WIFI hot spot;
Connected by near-field communication NFC;
Connected by WIFI Direct;
Connected by Bluetooth.
Connection is remotely set up, it usually needs auxiliary through the long-range network equipment by mobile cellular network or computer network Help support, could realize interconnecting.The communication mode being directly connected to by near-field communication NFC, WIFI Direct, bluetooth etc., Interconnecting of point-to-point can be directly realized by.
As shown in Figure 2 A, for the schematic flow sheet A of setting of credible equipment.
After entrance arranges credible equipment, if the indications of user's other subscriber equipmenies already known, can directly arrange Credible equipment list, such as, be recorded as credible equipment by corresponding subscriber equipment;More conventional mode is, selects connected mode, The modes such as such as NFC, WIFI are direct-connected, Bluetooth are attached with other equipment, receive other equipment and send after successful connection The data structure comprising equipment indications, obtain the indications information of other equipment;Comprise the data structure of equipment indications The most as shown in the table:
Connected mode Whether support For the unique ID identified
01:NFC mode 1: support, 0: do not support MEID
02:WIFI is direct-connected Ibid MAC address
03: bluetooth Ibid BlueTooth Address
After obtaining indications, if the most recorded before indications, then show that this equipment has been credible equipment, otherwise protect Hold the indications of new credible equipment.Additionally, situation already present for credible equipment, can select to keep trusted status, or Select to delete this credible equipment.Such as, the hand-off machine of people trusty, then need to delete the record of original equipment.
For the ease of understanding the present invention, after by emphasis, in the mode that interconnects of point-to-point, the present invention will be described.
As shown in Figure 2 B, for the schematic flow sheet B of setting of credible equipment.
Generally, one or more in NFC, WIFI Direct, bluetooth all supported by subscriber equipment, the when of so arranging, At least need to support a kind of function therein.Need the mode selecting the most simultaneously to support to be configured, enter for the first time Or can be directly entered with input default password when of not being arranged to merits and demerits.Idiographic flow is as shown in Figure 2.
NFC mode arranges credible equipment:
This short-range communication of NFC has natural safety.Open the NFC function of equipment, credible equipment is pressed close to, when NFC chip communicates after sensing, preserves a unique mark of credible equipment, can take a unique serial number, or Person other there is the hardware ID of uniqueness as unique encodings when authentication, whether this unique encodings is used for equipment of distinguishing and is Credible equipment.NFC chip itself does not has unique ID, so needing to transmit other hardware ID, such as MAC Address, MEID etc. can be only The labelling of one mark subscriber equipment.
The direct-connected mode of WIFI arranges credible equipment:
Opening the direct-connected function of WIFI of subscriber equipment and other equipment, subscriber equipment will need the credible equipment of setting MAC Address preserves as unique legal mark, and this mark is as the most believable unique encodings of later authentication equipment.
Bluetooth approach arranges credible equipment:
As authentication equipment whether bluetooth approach is similar with the direct-connected mode of WIFI, preserve the bluetooth hardware address of equipment Believable unique encodings.
In order to realize the effective control to application, as shown in Figure 3, Figure 4, the behavior authorized is needed to set for subscriber equipment. After these behaviors set, the most only could be performed by the behavior of credible equipment mandate.Wherein, Fig. 3 is the row needing to authorize For schematic diagram, Fig. 4 be need authorize routine access list schematic diagram.
Specifically, through the application authorized, described needs includes but not limited to that one or more of is applied:
Modify password;Change subscriber card;Access the Internet;Data access;Run application program.
Furthermore, subscriber equipment to credible equipment obtain authorize time, in mandate also include access application-specific time Between scope.
S120: after obtaining mandate, subscriber equipment runs through the application of mandate.
Therefore, under given conditions, the said method proposed according to the present invention, utilize credible equipment to other-end equipment Behavior authorize, when such as forgetting Password, the when of running some program, or want to control online etc., all can be in order to Authorize by this mode.By then passing through the credible equipment mandate set in advance, therefore there is natural safety with reliable Property.
Based on said method, as it is shown in figure 5, on the other hand the embodiment of the present invention also proposed a kind of subscriber equipment 100, bag Include authorization module 110 and run module 120.
Wherein, authorization module 110 authorizes for obtaining to credible equipment;The application needed through authorizing is run in the machine Time, after authorization module 110 obtains credible equipment mandate, run module 120 for running through the application of mandate.
As the embodiment of above-mentioned subscriber equipment 100, also include communication module 130 and memory module 140,
Communication module 130 is connected for setting up with other subscriber equipmenies;
Memory module 140 is for being recorded as credible equipment by corresponding subscriber equipment.
As the embodiment of above-mentioned subscriber equipment 100, memory module 140, for recording the indications of credible equipment, indicates Accord with and include following one or more information:
MAC Address, Bluetooth address or MEID.
As the embodiment of above-mentioned subscriber equipment 100, authorization module 110 includes for obtaining mandate to credible equipment:
Communication module 130 is set up with other subscriber equipmenies and is connected, and obtains the indications of other subscriber equipmenies;Work as authorization module 110 judge when indications indicates other subscriber equipmenies to be credible equipment, obtain to credible equipment and authorize.
As the embodiment of above-mentioned subscriber equipment 100, the connection that communication module 130 is set up includes one or more of side Formula:
Connection is remotely set up by mobile cellular network or computer network;
Connected by WIFI hot spot;
Connected by near-field communication NFC;
Connected by WIFI Direct;
Connected by Bluetooth.
As the embodiment of above-mentioned subscriber equipment 100, need through application mandate include but not limited to following one or Multiple application:
Modify password;
Change subscriber card;
Access the Internet;
Data access;
Run application program.
As the embodiment of above-mentioned subscriber equipment 100, authorization module 110 obtains to credible equipment when authorizing, and authorizes and also wraps Include the time range allowing to access application.
As the embodiment of above-mentioned subscriber equipment 100, subscriber equipment 100 includes but not limited to mobile phone, personal digital assistant PDA or panel computer etc..
Therefore, under given conditions, the said equipment proposed according to the present invention, utilize credible equipment to other-end equipment Behavior authorize, when such as forgetting Password, the when of running some program, or want to control online etc., all can be in order to Authorize by this mode.By then passing through the credible equipment mandate set in advance, therefore there is natural safety with reliable Property.
For the ease of understanding the present invention, below in conjunction with concrete application and concrete communication mode, the present invention is proposed Said method or equipment make citing further.
As embodiments of the invention, such as, when smart phone user unlocking pin is forgotten, it is impossible to enter main interface, A reliable method is now needed to authorize and unlock so that reseting password.Owing to having set credible equipment NFC authorization, and be also provided with unlocking pin and forget the mode of mandate.Now can allow and be configured to credible equipment Another mobile phone near waiting mandate mobile phone, enters password reset interface gently after authorizing successfully.
The most such as, mobile phone lose, found by other people want use time, carry out subscriber card replacing, subscriber card includes but not limited to SIM or UIM card.Other people turn back on entrance need authorize interface time because there is no credible equipment mandate, cannot be introduced into Main menu, cannot use, effectively protect the personal information of owner.If oneself changes card, it is only necessary to award through credible mobile phone Power, it is possible to enter main menu and normally use.
As shown in Figure 6, for the flow chart utilizing believable equipment to be unlocked.After unlocking pin is forgotten, enter and authorize The state unlocked;Select the authorization of credible equipment, for example, NFC, WIFI direct-connected or bluetooth, correspondingly, by accordingly Mode is set up connection, is identified credible equipment;Its backward credible equipment obtains and authorizes, and authenticates successfully if authorized, then arranges new Unlocking pin, otherwise returns screen locking interface for password input.
As embodiments of the invention, such as, student's carrying mobile phone is gone to school, in school based on study, function of surfing the Net, trip Play program cannot be run due to no authorized.After student comes back home, after completing homework, it is desirable to relax, Owing to credible equipment is provided that the mobile phone of the head of a family, after the head of a family agrees to the request of student, authorized by the mobile phone of oneself, put Open the online of certain time and the access function of Games Software.
As it is shown in fig. 7, for utilizing believable equipment to carry out the flow chart of function of surfing the Net restriction.When user wants to access network, Enter the state of function of surfing the Net mandate;Select the authorization of credible equipment, for example, NFC, WIFI direct-connected or bluetooth, accordingly Ground, is set up connection by corresponding mode, is identified credible equipment;Its backward credible equipment obtains and authorizes, and authenticates into if authorized Merit, then read and authorize the time allowed and authorize access network.
As shown in Figure 8, for utilizing believable equipment to carry out the flow chart of routine access restriction.When wanting that running indignation bird answers When using program, enter and authorize the state unlocked;Select the authorization of credible equipment, for example, NFC, WIFI direct-connected or bluetooth, Correspondingly, set up connection by corresponding mode, identify credible equipment;Its backward credible equipment obtains and authorizes, if authorizing mirror Weigh successfully, then read the time allowing to authorize operation program and run program, otherwise returning out of service.
Correspondingly, furthermore, Fig. 9 is the schematic diagram being realized credible equipment identification by NFC mode;Figure 10 is for passing through WIFI Direct connects the schematic diagram realizing credible equipment identification;Figure 11 is to realize credible equipment identification by bluetooth approach Schematic diagram.Set up after connecting, obtain the indications such as the coding of equipment, ID or physical address, if with the credible equipment of record Indications is consistent, then authenticated by credible equipment, sends authenticating result to credible equipment.
As shown in figure 12, for credible equipment licensing process schematic diagram, subscriber equipment sends request Request, the most credible Equipment response Response.
Specifically, the data structure of subscriber equipment transmission Request is the most as shown in the table:
Request type Required parameter
01: password is forgotten Null
02: change card Null
03: program is run Program name
04: other Other
The data structure of credible equipment Response is the most as shown in the table:
Request type Whether agree to Parameter
01: password is forgotten 1: agree to;0: disagree
03: program is run 1: agree to;0: disagree Time span
Other: type is mated with request Ibid
Thereafter, subscriber equipment performs corresponding operation according to the result of Response, if agreed to, runs request Behavior;If request is not agreed, then returns and exit.
Those skilled in the art are appreciated that and realize all or part of step that above-described embodiment method is carried Suddenly the program that can be by completes to instruct relevant hardware, and described program can be stored in a kind of computer-readable storage medium In matter, this program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated mould Block both can realize to use the form of hardware, it would however also be possible to employ the form of software function module realizes.Described integrated module is such as When fruit is using the form realization of software function module and as independent production marketing or use, it is also possible to be stored in a computer In read/write memory medium.Storage medium mentioned above can be read only memory, disk or CD etc..
The above is only the some embodiments of the present invention, it is noted that for the ordinary skill people of the art For Yuan, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (13)

1. the method authorized between a subscriber equipment, it is characterised in that comprise the following steps:
Subscriber equipment the machine run need through mandate application, to credible equipment obtain authorize: described subscriber equipment with Other subscriber equipmenies are set up and are connected, and identify credible equipment, and send request to credible equipment;
After obtaining mandate, described subscriber equipment runs the described application through authorizing;
Wherein, described subscriber equipment is set up with other subscriber equipmenies and is connected, and obtains the indications of other subscriber equipmenies described, works as institute State indications instruction other subscriber equipmenies described when being credible equipment, obtain to described credible equipment and authorize.
2. the method authorized between subscriber equipment as claimed in claim 1, it is characterised in that subscriber equipment runs in the machine and needs Before the application authorized, also to include arranging credible equipment:
Described subscriber equipment arranges credible equipment list and corresponding subscriber equipment is recorded as credible equipment;Or, described user Equipment is set up with other subscriber equipmenies and is connected, and corresponding subscriber equipment is recorded as credible equipment.
3. the method authorized between subscriber equipment as claimed in claim 2, it is characterised in that described record credible equipment is note Recording the indications of described credible equipment, described indications includes following one or more information:
MAC Address, Bluetooth address or MEID.
4. the method authorized between subscriber equipment as claimed in claim 2, it is characterised in that described connection includes following one Or various ways:
Connection is remotely set up by mobile cellular network or computer network;
Connected by WIFI hot spot;
Connected by near-field communication NFC;
Connected by WIFI Direct;
Connected by Bluetooth.
5. the method authorized between subscriber equipment as claimed in claim 1, it is characterised in that described needs should through authorize With including that one or more of is applied:
Modify password;
Change subscriber card;
Access the Internet;
Data access;
Run application program.
6. the method authorized between subscriber equipment as claimed in claim 5, it is characterised in that described subscriber equipment sets to credible When standby acquisition authorizes, described mandate also includes the time range allowing to access described application.
7. a subscriber equipment, it is characterised in that include authorization module and run module,
Described authorization module, authorizes for obtaining to credible equipment: sets up with other subscriber equipmenies and is connected, identifies credible equipment, And send request to credible equipment;
Described operation module, runs the application needed through authorizing in the machine, awards when described authorization module obtains credible equipment Quan Hou, for running the described application through authorizing;
Wherein, described authorization module is set up with other subscriber equipmenies and is connected, and obtains the indications of other subscriber equipmenies described;Work as institute State authorization module to judge, when described indications instruction other subscriber equipmenies described are credible equipment, to obtain to described credible equipment and award Power.
8. subscriber equipment as claimed in claim 7, it is characterised in that also include communication module and memory module,
Described communication module, is connected for setting up with other subscriber equipmenies;
Described memory module, for being recorded as credible equipment by corresponding subscriber equipment.
9. subscriber equipment as claimed in claim 8, it is characterised in that described memory module is for recording described credible equipment Indications, described indications includes following one or more information:
MAC Address, Bluetooth address or MEID.
10. subscriber equipment as claimed in claim 8, the connection that described communication module is set up includes one or more of side Formula:
Connection is remotely set up by mobile cellular network or computer network;
Connected by WIFI hot spot;
Connected by near-field communication NFC;
Connected by WIFI Direct;
Connected by Bluetooth.
11. subscriber equipmenies as claimed in claim 7, it is characterised in that described needs include through the application authorized with next Plant or multiple application:
Modify password;
Change subscriber card;
Access the Internet;
Data access;
Run application program.
12. subscriber equipmenies as claimed in claim 11, it is characterised in that described authorization module obtains to credible equipment and authorizes Time, described mandate also includes the time range allowing to access described application.
13. subscriber equipmenies as claimed in claim 8, it is characterised in that described subscriber equipment includes mobile phone, personal digital assistant PDA or panel computer.
CN201210519658.4A 2012-12-06 2012-12-06 The method and device authorized between subscriber equipment Active CN103856621B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610455029.8A CN106060259B (en) 2012-12-06 2012-12-06 Method and device for authorization between user equipment
CN201210519658.4A CN103856621B (en) 2012-12-06 2012-12-06 The method and device authorized between subscriber equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210519658.4A CN103856621B (en) 2012-12-06 2012-12-06 The method and device authorized between subscriber equipment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201610455029.8A Division CN106060259B (en) 2012-12-06 2012-12-06 Method and device for authorization between user equipment

Publications (2)

Publication Number Publication Date
CN103856621A CN103856621A (en) 2014-06-11
CN103856621B true CN103856621B (en) 2016-08-17

Family

ID=50863818

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201210519658.4A Active CN103856621B (en) 2012-12-06 2012-12-06 The method and device authorized between subscriber equipment
CN201610455029.8A Active CN106060259B (en) 2012-12-06 2012-12-06 Method and device for authorization between user equipment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201610455029.8A Active CN106060259B (en) 2012-12-06 2012-12-06 Method and device for authorization between user equipment

Country Status (1)

Country Link
CN (2) CN103856621B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104166818B (en) * 2014-07-02 2018-01-09 百度在线网络技术(北京)有限公司 authority control method, device and system
CN104751035A (en) * 2015-03-26 2015-07-01 广东欧珀移动通信有限公司 Unlocking method and device of intelligent terminal
CN105592071A (en) * 2015-11-16 2016-05-18 中国银联股份有限公司 Method and device for authorization between devices
CN106791037B (en) * 2016-11-30 2021-01-15 腾讯科技(深圳)有限公司 Operation triggering method and system, mobile terminal and electromagnetic field generating equipment
CN109614785B (en) * 2018-11-01 2021-05-25 Oppo广东移动通信有限公司 Application operation control method and device, storage medium and electronic equipment
CN111783065A (en) * 2020-06-30 2020-10-16 上海闻泰电子科技有限公司 Authorization method and device based on two-dimension code, electronic equipment and storage medium
CN113111316A (en) * 2021-04-22 2021-07-13 北京天空卫士网络安全技术有限公司 Method, device and system for application authorization management

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098230B (en) * 2006-06-29 2010-12-08 联想(北京)有限公司 Method and system for checking user facility operation application
EP2050242A1 (en) * 2006-07-31 2009-04-22 Telecom Italia S.p.A. A system for implementing security on telecommunications terminals
CN101068383B (en) * 2007-06-18 2010-06-02 中兴通讯股份有限公司 Student terminal configuration method and system based on terminal management business
CN101790126B (en) * 2009-12-16 2013-04-03 惠州Tcl移动通信有限公司 Mobile communication terminal with limitative function and realizing method thereof
US8798610B2 (en) * 2010-03-26 2014-08-05 Intel Corporation Method and apparatus for bearer and server independent parental control on smartphone, managed by the smartphone
CN101951495B (en) * 2010-09-10 2012-05-16 深圳市华曦达科技股份有限公司 System and method for authorizing digital television to play television program by mobile communication terminal
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication
CN102413236A (en) * 2011-11-09 2012-04-11 希姆通信息技术(上海)有限公司 Method for managing functions of mobile phone and mobile phone

Also Published As

Publication number Publication date
CN103856621A (en) 2014-06-11
CN106060259A (en) 2016-10-26
CN106060259B (en) 2020-02-11

Similar Documents

Publication Publication Date Title
CN103856621B (en) The method and device authorized between subscriber equipment
JP4726950B2 (en) Mobile phone and access control method
US8064883B2 (en) Mobile terminal having anti-theft function and anti-theft method
CN100498690C (en) Secure device, terminal device, gate device, system and method
CN102243590B (en) Method for being communicated between the application program and Vehicular system on external equipment
US20070278290A1 (en) User-configurable priority list for mobile device electronic payment applications
CN101543099B (en) Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses
CN104318170B (en) A kind of method and device based on multi-mobile-terminal protection data safety
KR102232966B1 (en) Un-tact digital key service system and method thereof
TWI449397B (en) Near field communication electronic device, login system using the same and method thereof
JP2007537680A (en) Authentication wireless phone system
CN105282868B (en) System and method for WiFi network to be temporarily added
CN102546530B (en) Method, device and ERP (enterprise resource planning) system for user identity and permission validation
JP4966387B2 (en) Power supply system
CN104159228A (en) A Wi-Fi display and connecting method and system
CN103905191A (en) Verification method applied to mobile terminal, mobile terminal and system
CN103607253B (en) A kind of method and system of control mobile terminal
CN102868764A (en) Personal information system based on cloud computing and formed by dependent special terminals
JP2006287832A (en) Communication terminal apparatus
Noll et al. Admittance services through mobile phone short messages
CN106776066A (en) Multi-system function processing method and device
EP1860605A1 (en) Electronic money system, information storage medium, and mobile terminal device
JP6065623B2 (en) Information management device, portable terminal device, and program
US20080272187A1 (en) Electronic Money System, Information Storage Medium, and Mobile Terminal Device
CN103813310B (en) Lock community apparatus and method and control device and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant