CN103856621B - The method and device authorized between subscriber equipment - Google Patents
The method and device authorized between subscriber equipment Download PDFInfo
- Publication number
- CN103856621B CN103856621B CN201210519658.4A CN201210519658A CN103856621B CN 103856621 B CN103856621 B CN 103856621B CN 201210519658 A CN201210519658 A CN 201210519658A CN 103856621 B CN103856621 B CN 103856621B
- Authority
- CN
- China
- Prior art keywords
- equipment
- subscriber
- credible
- subscriber equipment
- credible equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Propose a kind of method authorized between subscriber equipment, comprise the following steps: subscriber equipment runs the application needed through authorizing in the machine, obtain to the credible equipment connected and authorize;After obtaining mandate, described subscriber equipment runs the described application through authorizing.On the other hand the embodiment of the present invention proposes a kind of subscriber equipment.The present invention proposes technical scheme, utilizes credible equipment to authorize the behavior of other-end equipment, by then passing through the credible equipment mandate set in advance, therefore has natural safety and reliability.The such scheme that the present invention proposes, the change to existing equipment is the least, does not interferes with the compatibility of system, and realizes simple, efficiently.
Description
Technical field
The present invention relates to terminal unit technical field, specifically, the method that the present invention relates to authorize between subscriber equipment
And device.
Background technology
In recent years, along with developing rapidly of electronic industry and communication technology, the new industry based on data, speech, video
Business development is swift and violent.Microelectric technique, the fast development of computer hardware technique, process the work become increasingly complex for terminal unit
Laying the foundation, providing realization for terminal unit personalization may so that terminal has broken away from network to a certain extent
Restriction, can possess function from strength to strength.Additionally, user itself also has urgent demand to terminal, it is desirable to termination function
More powerful, more flexible, simpler and more direct.The development of information technology, makes terminal technology move towards intellectuality, mobile, multifunction.
Now with the development of subscriber equipment, authority and safety requirements to subscriber equipment are more and more higher, except passing through
Mobile radio communication, computer network interconnect, between subscriber equipment also by near-field communication NFC, WIFI Direct,
Bluetooth(bluetooth) etc. technology communicate, such as be used for transmit data, file etc..
But, the communication between subscriber equipment, it is common that interconnect based on reciprocity, independent form, do not examine
Consider and utilize other-end equipment to realize the access rights to mobile terminal device and the technical scheme of safety proposition solution problem.
Therefore, it is necessary to propose effective technical scheme, solve the access rights between subscriber equipment and safety issue.
Summary of the invention
The purpose of the present invention is intended at least solve one of above-mentioned technological deficiency, enters subscriber equipment especially through credible equipment
Row limits and monitoring, improves the safety and reliability of subscriber equipment.
On the one hand the embodiment of the present invention proposes a kind of method authorized between subscriber equipment, comprises the following steps:
Subscriber equipment runs the application needed through authorizing in the machine, obtains to credible equipment and authorizes;
After obtaining mandate, described subscriber equipment runs the described application through authorizing.
On the other hand the embodiment of the present invention proposes a kind of subscriber equipment, including authorization module and operation module,
Described authorization module, authorizes for obtaining to credible equipment;
Described operation module, runs the application needed through authorizing in the machine, when described authorization module obtains credible setting
After standby mandate, for running the described application through authorizing.
The present invention proposes technical scheme, utilizes credible equipment to authorize the behavior of other-end equipment, such as forgets
When password, when run some program or want to control online etc., all can authorize to utilize this mode.Owing to being
By the credible equipment mandate set in advance, therefore there is natural safety and reliability.The such scheme that the present invention proposes,
Change to existing equipment is the least, does not interferes with the compatibility of system, and realizes simple, efficiently.
Aspect and advantage that the present invention adds will part be given in the following description, and these will become from the following description
Obtain substantially, or recognized by the practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or that add aspect and advantage will become from the following description of the accompanying drawings of embodiments
Substantially with easy to understand, wherein:
Fig. 1 is the method flow diagram authorized between embodiment of the present invention subscriber equipment;
Fig. 2 A is the schematic diagram A of the setting of credible equipment;
Fig. 2 B is the schematic diagram B of the setting of credible equipment;
Fig. 3 is the schematic diagram of the behavior needing mandate;
Fig. 4 is the routine access list schematic diagram needing to authorize;
Fig. 5 is embodiment of the present invention user device architecture schematic diagram;
Fig. 6 is the flow chart utilizing believable equipment to be unlocked;
Fig. 7 is the flow chart utilizing believable equipment to carry out function of surfing the Net restriction;
Fig. 8 is the flow chart utilizing believable equipment to carry out routine access restriction;
Fig. 9 is the schematic diagram being realized credible equipment identification by NFC mode;
Figure 10 is the schematic diagram being connected by WIFI Direct and realizing credible equipment identification;
Figure 11 is the schematic diagram being realized credible equipment identification by bluetooth approach;
Figure 12 is credible equipment licensing process schematic diagram.
Detailed description of the invention
Embodiments of the invention are described below in detail, and the example of described embodiment is shown in the drawings, the most from start to finish
Same or similar label represents same or similar element or has the element of same or like function.Below with reference to attached
The embodiment that figure describes is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative used herein " ", "
Individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that use in the description of the present invention arranges
Diction " including " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existence or adds
Other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim unit
Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist
Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connections or couple.Wording used herein
"and/or" includes one or more any cell listing item being associated and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art
Language and scientific terminology) have with the those of ordinary skill in art of the present invention be commonly understood by identical meaning.Also should
Being understood by, those terms defined in such as general dictionary should be understood that the meaning having with the context of prior art
The meaning that justice is consistent, and unless defined as here, will not explain by idealization or the most formal implication.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above or " subscriber equipment " had both included only possessing
The equipment of the wireless signal receiver of non-emissive ability, includes again having and can carry out two-way communication on bidirectional communication link
Receive and launch the equipment of hardware.This equipment may include that the honeycomb with and without multi-line display or other communication
Equipment;Can process with combine voice and data, fax and/or the PCS Personal Communications System (PCS) of its communication ability;Can include
Radio frequency receiver and pager, the Internet/intranet access, web browser, notepad, calendar and/or global positioning system
(GPS) PDA(Personal Digital Assistant) of receptor;And/or include that the conventional laptop of radio frequency receiver and/or hand held calculate
Machine or other equipment." terminal " used herein above or " subscriber equipment " can be portable, can transport, be arranged on the vehicles
In (aviation, sea-freight and/or land), or be suitable for and/or be configured to local runtime and/or with distribution form at the earth
And/or any other position operation in space." terminal " used herein above or " subscriber equipment " can also is that communication terminal, on
Network termination, music/video playback terminal." terminal " used herein above or " subscriber equipment " can also is that PDA, MID and/or tool
There is the mobile phone etc. of music/video playing function." terminal " used herein above or " subscriber equipment " can also is that Intelligent electric
Depending on equipment such as, Set Top Boxes.
In order to realize the purpose of the present invention, the present invention proposes, and under given conditions, utilizes credible equipment to set other-end
Standby behavior authorizes, and when such as forgetting Password, the when of running some program, or wants to control online etc., the most permissible
This mode is utilized to authorize.By then passing through the credible equipment mandate set in advance, therefore there is natural safety and can
By property.
On the one hand the embodiment of the present invention proposes a kind of method authorized between subscriber equipment, comprises the following steps:
Subscriber equipment runs the application needed through authorizing in the machine, obtains to credible equipment and authorizes;
After obtaining mandate, described subscriber equipment runs the described application through authorizing.
As it is shown in figure 1, be the method flow diagram authorized between embodiment of the present invention subscriber equipment, comprise the following steps:
S110: subscriber equipment runs the application needed through authorizing in the machine, obtains to credible equipment and authorizes.
In step s 110, subscriber equipment runs the application needed through authorizing in the machine, and if can credit
Family equipment is set up and is connected, then obtain to the credible equipment connected and authorize, and otherwise needs to initiate to set up with other subscriber equipmenies to be connected,
Credible equipment need to be looked for.
Additionally, subscriber equipment is before the machine runs the application needed through authorizing, also include arranging credible equipment: user
Equipment arranges credible equipment list, such as, corresponding subscriber equipment is recorded as credible equipment;Or, subscriber equipment is used with other
Family equipment is set up and is connected, and corresponding subscriber equipment is recorded as credible equipment.
Therefore, in order to realize the functions such as mandate between subscriber equipment, monitoring, as embodiments of the invention, also include:
Credible equipment is other subscriber equipmenies pre-set;Or
Subscriber equipment is set up with other subscriber equipmenies and is connected, and judges the attribute of other subscriber equipmenies, decides whether it
He is set to credible equipment by subscriber equipment.
Specifically, record credible equipment usually records the indications of credible equipment, and wherein, indications includes but do not limits
The labelling of subscriber equipment can be uniquely identified: MAC Address, Bluetooth address or MEID in following one or more information.
Thereafter, when subscriber equipment needs to run through the application of mandate, obtains mandate to credible equipment, with other users
Equipment is set up and is connected, and obtains the indications of other subscriber equipmenies, when indications indicates this subscriber equipment to be credible equipment, to this
Credible equipment obtains and authorizes.Specifically, the one or more of mode that includes but not limited to is connected:
Connection is remotely set up by mobile cellular network or computer network;
Connected by WIFI hot spot;
Connected by near-field communication NFC;
Connected by WIFI Direct;
Connected by Bluetooth.
Connection is remotely set up, it usually needs auxiliary through the long-range network equipment by mobile cellular network or computer network
Help support, could realize interconnecting.The communication mode being directly connected to by near-field communication NFC, WIFI Direct, bluetooth etc.,
Interconnecting of point-to-point can be directly realized by.
As shown in Figure 2 A, for the schematic flow sheet A of setting of credible equipment.
After entrance arranges credible equipment, if the indications of user's other subscriber equipmenies already known, can directly arrange
Credible equipment list, such as, be recorded as credible equipment by corresponding subscriber equipment;More conventional mode is, selects connected mode,
The modes such as such as NFC, WIFI are direct-connected, Bluetooth are attached with other equipment, receive other equipment and send after successful connection
The data structure comprising equipment indications, obtain the indications information of other equipment;Comprise the data structure of equipment indications
The most as shown in the table:
Connected mode | Whether support | For the unique ID identified |
01:NFC mode | 1: support, 0: do not support | MEID |
02:WIFI is direct-connected | Ibid | MAC address |
03: bluetooth | Ibid | BlueTooth Address |
After obtaining indications, if the most recorded before indications, then show that this equipment has been credible equipment, otherwise protect
Hold the indications of new credible equipment.Additionally, situation already present for credible equipment, can select to keep trusted status, or
Select to delete this credible equipment.Such as, the hand-off machine of people trusty, then need to delete the record of original equipment.
For the ease of understanding the present invention, after by emphasis, in the mode that interconnects of point-to-point, the present invention will be described.
As shown in Figure 2 B, for the schematic flow sheet B of setting of credible equipment.
Generally, one or more in NFC, WIFI Direct, bluetooth all supported by subscriber equipment, the when of so arranging,
At least need to support a kind of function therein.Need the mode selecting the most simultaneously to support to be configured, enter for the first time
Or can be directly entered with input default password when of not being arranged to merits and demerits.Idiographic flow is as shown in Figure 2.
NFC mode arranges credible equipment:
This short-range communication of NFC has natural safety.Open the NFC function of equipment, credible equipment is pressed close to, when
NFC chip communicates after sensing, preserves a unique mark of credible equipment, can take a unique serial number, or
Person other there is the hardware ID of uniqueness as unique encodings when authentication, whether this unique encodings is used for equipment of distinguishing and is
Credible equipment.NFC chip itself does not has unique ID, so needing to transmit other hardware ID, such as MAC Address, MEID etc. can be only
The labelling of one mark subscriber equipment.
The direct-connected mode of WIFI arranges credible equipment:
Opening the direct-connected function of WIFI of subscriber equipment and other equipment, subscriber equipment will need the credible equipment of setting
MAC Address preserves as unique legal mark, and this mark is as the most believable unique encodings of later authentication equipment.
Bluetooth approach arranges credible equipment:
As authentication equipment whether bluetooth approach is similar with the direct-connected mode of WIFI, preserve the bluetooth hardware address of equipment
Believable unique encodings.
In order to realize the effective control to application, as shown in Figure 3, Figure 4, the behavior authorized is needed to set for subscriber equipment.
After these behaviors set, the most only could be performed by the behavior of credible equipment mandate.Wherein, Fig. 3 is the row needing to authorize
For schematic diagram, Fig. 4 be need authorize routine access list schematic diagram.
Specifically, through the application authorized, described needs includes but not limited to that one or more of is applied:
Modify password;Change subscriber card;Access the Internet;Data access;Run application program.
Furthermore, subscriber equipment to credible equipment obtain authorize time, in mandate also include access application-specific time
Between scope.
S120: after obtaining mandate, subscriber equipment runs through the application of mandate.
Therefore, under given conditions, the said method proposed according to the present invention, utilize credible equipment to other-end equipment
Behavior authorize, when such as forgetting Password, the when of running some program, or want to control online etc., all can be in order to
Authorize by this mode.By then passing through the credible equipment mandate set in advance, therefore there is natural safety with reliable
Property.
Based on said method, as it is shown in figure 5, on the other hand the embodiment of the present invention also proposed a kind of subscriber equipment 100, bag
Include authorization module 110 and run module 120.
Wherein, authorization module 110 authorizes for obtaining to credible equipment;The application needed through authorizing is run in the machine
Time, after authorization module 110 obtains credible equipment mandate, run module 120 for running through the application of mandate.
As the embodiment of above-mentioned subscriber equipment 100, also include communication module 130 and memory module 140,
Communication module 130 is connected for setting up with other subscriber equipmenies;
Memory module 140 is for being recorded as credible equipment by corresponding subscriber equipment.
As the embodiment of above-mentioned subscriber equipment 100, memory module 140, for recording the indications of credible equipment, indicates
Accord with and include following one or more information:
MAC Address, Bluetooth address or MEID.
As the embodiment of above-mentioned subscriber equipment 100, authorization module 110 includes for obtaining mandate to credible equipment:
Communication module 130 is set up with other subscriber equipmenies and is connected, and obtains the indications of other subscriber equipmenies;Work as authorization module
110 judge when indications indicates other subscriber equipmenies to be credible equipment, obtain to credible equipment and authorize.
As the embodiment of above-mentioned subscriber equipment 100, the connection that communication module 130 is set up includes one or more of side
Formula:
Connection is remotely set up by mobile cellular network or computer network;
Connected by WIFI hot spot;
Connected by near-field communication NFC;
Connected by WIFI Direct;
Connected by Bluetooth.
As the embodiment of above-mentioned subscriber equipment 100, need through application mandate include but not limited to following one or
Multiple application:
Modify password;
Change subscriber card;
Access the Internet;
Data access;
Run application program.
As the embodiment of above-mentioned subscriber equipment 100, authorization module 110 obtains to credible equipment when authorizing, and authorizes and also wraps
Include the time range allowing to access application.
As the embodiment of above-mentioned subscriber equipment 100, subscriber equipment 100 includes but not limited to mobile phone, personal digital assistant
PDA or panel computer etc..
Therefore, under given conditions, the said equipment proposed according to the present invention, utilize credible equipment to other-end equipment
Behavior authorize, when such as forgetting Password, the when of running some program, or want to control online etc., all can be in order to
Authorize by this mode.By then passing through the credible equipment mandate set in advance, therefore there is natural safety with reliable
Property.
For the ease of understanding the present invention, below in conjunction with concrete application and concrete communication mode, the present invention is proposed
Said method or equipment make citing further.
As embodiments of the invention, such as, when smart phone user unlocking pin is forgotten, it is impossible to enter main interface,
A reliable method is now needed to authorize and unlock so that reseting password.Owing to having set credible equipment
NFC authorization, and be also provided with unlocking pin and forget the mode of mandate.Now can allow and be configured to credible equipment
Another mobile phone near waiting mandate mobile phone, enters password reset interface gently after authorizing successfully.
The most such as, mobile phone lose, found by other people want use time, carry out subscriber card replacing, subscriber card includes but not limited to
SIM or UIM card.Other people turn back on entrance need authorize interface time because there is no credible equipment mandate, cannot be introduced into
Main menu, cannot use, effectively protect the personal information of owner.If oneself changes card, it is only necessary to award through credible mobile phone
Power, it is possible to enter main menu and normally use.
As shown in Figure 6, for the flow chart utilizing believable equipment to be unlocked.After unlocking pin is forgotten, enter and authorize
The state unlocked;Select the authorization of credible equipment, for example, NFC, WIFI direct-connected or bluetooth, correspondingly, by accordingly
Mode is set up connection, is identified credible equipment;Its backward credible equipment obtains and authorizes, and authenticates successfully if authorized, then arranges new
Unlocking pin, otherwise returns screen locking interface for password input.
As embodiments of the invention, such as, student's carrying mobile phone is gone to school, in school based on study, function of surfing the Net, trip
Play program cannot be run due to no authorized.After student comes back home, after completing homework, it is desirable to relax,
Owing to credible equipment is provided that the mobile phone of the head of a family, after the head of a family agrees to the request of student, authorized by the mobile phone of oneself, put
Open the online of certain time and the access function of Games Software.
As it is shown in fig. 7, for utilizing believable equipment to carry out the flow chart of function of surfing the Net restriction.When user wants to access network,
Enter the state of function of surfing the Net mandate;Select the authorization of credible equipment, for example, NFC, WIFI direct-connected or bluetooth, accordingly
Ground, is set up connection by corresponding mode, is identified credible equipment;Its backward credible equipment obtains and authorizes, and authenticates into if authorized
Merit, then read and authorize the time allowed and authorize access network.
As shown in Figure 8, for utilizing believable equipment to carry out the flow chart of routine access restriction.When wanting that running indignation bird answers
When using program, enter and authorize the state unlocked;Select the authorization of credible equipment, for example, NFC, WIFI direct-connected or bluetooth,
Correspondingly, set up connection by corresponding mode, identify credible equipment;Its backward credible equipment obtains and authorizes, if authorizing mirror
Weigh successfully, then read the time allowing to authorize operation program and run program, otherwise returning out of service.
Correspondingly, furthermore, Fig. 9 is the schematic diagram being realized credible equipment identification by NFC mode;Figure 10 is for passing through
WIFI Direct connects the schematic diagram realizing credible equipment identification;Figure 11 is to realize credible equipment identification by bluetooth approach
Schematic diagram.Set up after connecting, obtain the indications such as the coding of equipment, ID or physical address, if with the credible equipment of record
Indications is consistent, then authenticated by credible equipment, sends authenticating result to credible equipment.
As shown in figure 12, for credible equipment licensing process schematic diagram, subscriber equipment sends request Request, the most credible
Equipment response Response.
Specifically, the data structure of subscriber equipment transmission Request is the most as shown in the table:
Request type | Required parameter |
01: password is forgotten | Null |
02: change card | Null |
03: program is run | Program name |
04: other | Other |
The data structure of credible equipment Response is the most as shown in the table:
Request type | Whether agree to | Parameter |
01: password is forgotten | 1: agree to;0: disagree | |
03: program is run | 1: agree to;0: disagree | Time span |
Other: type is mated with request | Ibid |
Thereafter, subscriber equipment performs corresponding operation according to the result of Response, if agreed to, runs request
Behavior;If request is not agreed, then returns and exit.
Those skilled in the art are appreciated that and realize all or part of step that above-described embodiment method is carried
Suddenly the program that can be by completes to instruct relevant hardware, and described program can be stored in a kind of computer-readable storage medium
In matter, this program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to
It is that unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated mould
Block both can realize to use the form of hardware, it would however also be possible to employ the form of software function module realizes.Described integrated module is such as
When fruit is using the form realization of software function module and as independent production marketing or use, it is also possible to be stored in a computer
In read/write memory medium.Storage medium mentioned above can be read only memory, disk or CD etc..
The above is only the some embodiments of the present invention, it is noted that for the ordinary skill people of the art
For Yuan, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (13)
1. the method authorized between a subscriber equipment, it is characterised in that comprise the following steps:
Subscriber equipment the machine run need through mandate application, to credible equipment obtain authorize: described subscriber equipment with
Other subscriber equipmenies are set up and are connected, and identify credible equipment, and send request to credible equipment;
After obtaining mandate, described subscriber equipment runs the described application through authorizing;
Wherein, described subscriber equipment is set up with other subscriber equipmenies and is connected, and obtains the indications of other subscriber equipmenies described, works as institute
State indications instruction other subscriber equipmenies described when being credible equipment, obtain to described credible equipment and authorize.
2. the method authorized between subscriber equipment as claimed in claim 1, it is characterised in that subscriber equipment runs in the machine and needs
Before the application authorized, also to include arranging credible equipment:
Described subscriber equipment arranges credible equipment list and corresponding subscriber equipment is recorded as credible equipment;Or, described user
Equipment is set up with other subscriber equipmenies and is connected, and corresponding subscriber equipment is recorded as credible equipment.
3. the method authorized between subscriber equipment as claimed in claim 2, it is characterised in that described record credible equipment is note
Recording the indications of described credible equipment, described indications includes following one or more information:
MAC Address, Bluetooth address or MEID.
4. the method authorized between subscriber equipment as claimed in claim 2, it is characterised in that described connection includes following one
Or various ways:
Connection is remotely set up by mobile cellular network or computer network;
Connected by WIFI hot spot;
Connected by near-field communication NFC;
Connected by WIFI Direct;
Connected by Bluetooth.
5. the method authorized between subscriber equipment as claimed in claim 1, it is characterised in that described needs should through authorize
With including that one or more of is applied:
Modify password;
Change subscriber card;
Access the Internet;
Data access;
Run application program.
6. the method authorized between subscriber equipment as claimed in claim 5, it is characterised in that described subscriber equipment sets to credible
When standby acquisition authorizes, described mandate also includes the time range allowing to access described application.
7. a subscriber equipment, it is characterised in that include authorization module and run module,
Described authorization module, authorizes for obtaining to credible equipment: sets up with other subscriber equipmenies and is connected, identifies credible equipment,
And send request to credible equipment;
Described operation module, runs the application needed through authorizing in the machine, awards when described authorization module obtains credible equipment
Quan Hou, for running the described application through authorizing;
Wherein, described authorization module is set up with other subscriber equipmenies and is connected, and obtains the indications of other subscriber equipmenies described;Work as institute
State authorization module to judge, when described indications instruction other subscriber equipmenies described are credible equipment, to obtain to described credible equipment and award
Power.
8. subscriber equipment as claimed in claim 7, it is characterised in that also include communication module and memory module,
Described communication module, is connected for setting up with other subscriber equipmenies;
Described memory module, for being recorded as credible equipment by corresponding subscriber equipment.
9. subscriber equipment as claimed in claim 8, it is characterised in that described memory module is for recording described credible equipment
Indications, described indications includes following one or more information:
MAC Address, Bluetooth address or MEID.
10. subscriber equipment as claimed in claim 8, the connection that described communication module is set up includes one or more of side
Formula:
Connection is remotely set up by mobile cellular network or computer network;
Connected by WIFI hot spot;
Connected by near-field communication NFC;
Connected by WIFI Direct;
Connected by Bluetooth.
11. subscriber equipmenies as claimed in claim 7, it is characterised in that described needs include through the application authorized with next
Plant or multiple application:
Modify password;
Change subscriber card;
Access the Internet;
Data access;
Run application program.
12. subscriber equipmenies as claimed in claim 11, it is characterised in that described authorization module obtains to credible equipment and authorizes
Time, described mandate also includes the time range allowing to access described application.
13. subscriber equipmenies as claimed in claim 8, it is characterised in that described subscriber equipment includes mobile phone, personal digital assistant
PDA or panel computer.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610455029.8A CN106060259B (en) | 2012-12-06 | 2012-12-06 | Method and device for authorization between user equipment |
CN201210519658.4A CN103856621B (en) | 2012-12-06 | 2012-12-06 | The method and device authorized between subscriber equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210519658.4A CN103856621B (en) | 2012-12-06 | 2012-12-06 | The method and device authorized between subscriber equipment |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610455029.8A Division CN106060259B (en) | 2012-12-06 | 2012-12-06 | Method and device for authorization between user equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103856621A CN103856621A (en) | 2014-06-11 |
CN103856621B true CN103856621B (en) | 2016-08-17 |
Family
ID=50863818
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210519658.4A Active CN103856621B (en) | 2012-12-06 | 2012-12-06 | The method and device authorized between subscriber equipment |
CN201610455029.8A Active CN106060259B (en) | 2012-12-06 | 2012-12-06 | Method and device for authorization between user equipment |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610455029.8A Active CN106060259B (en) | 2012-12-06 | 2012-12-06 | Method and device for authorization between user equipment |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN103856621B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104166818B (en) * | 2014-07-02 | 2018-01-09 | 百度在线网络技术(北京)有限公司 | authority control method, device and system |
CN104751035A (en) * | 2015-03-26 | 2015-07-01 | 广东欧珀移动通信有限公司 | Unlocking method and device of intelligent terminal |
CN105592071A (en) * | 2015-11-16 | 2016-05-18 | 中国银联股份有限公司 | Method and device for authorization between devices |
CN106791037B (en) * | 2016-11-30 | 2021-01-15 | 腾讯科技(深圳)有限公司 | Operation triggering method and system, mobile terminal and electromagnetic field generating equipment |
CN109614785B (en) * | 2018-11-01 | 2021-05-25 | Oppo广东移动通信有限公司 | Application operation control method and device, storage medium and electronic equipment |
CN111783065A (en) * | 2020-06-30 | 2020-10-16 | 上海闻泰电子科技有限公司 | Authorization method and device based on two-dimension code, electronic equipment and storage medium |
CN113111316A (en) * | 2021-04-22 | 2021-07-13 | 北京天空卫士网络安全技术有限公司 | Method, device and system for application authorization management |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101098230B (en) * | 2006-06-29 | 2010-12-08 | 联想(北京)有限公司 | Method and system for checking user facility operation application |
EP2050242A1 (en) * | 2006-07-31 | 2009-04-22 | Telecom Italia S.p.A. | A system for implementing security on telecommunications terminals |
CN101068383B (en) * | 2007-06-18 | 2010-06-02 | 中兴通讯股份有限公司 | Student terminal configuration method and system based on terminal management business |
CN101790126B (en) * | 2009-12-16 | 2013-04-03 | 惠州Tcl移动通信有限公司 | Mobile communication terminal with limitative function and realizing method thereof |
US8798610B2 (en) * | 2010-03-26 | 2014-08-05 | Intel Corporation | Method and apparatus for bearer and server independent parental control on smartphone, managed by the smartphone |
CN101951495B (en) * | 2010-09-10 | 2012-05-16 | 深圳市华曦达科技股份有限公司 | System and method for authorizing digital television to play television program by mobile communication terminal |
CN102184352A (en) * | 2011-03-16 | 2011-09-14 | 东南大学 | Automatic protecting method for computer system based on Bluetooth device authentication |
CN102413236A (en) * | 2011-11-09 | 2012-04-11 | 希姆通信息技术(上海)有限公司 | Method for managing functions of mobile phone and mobile phone |
-
2012
- 2012-12-06 CN CN201210519658.4A patent/CN103856621B/en active Active
- 2012-12-06 CN CN201610455029.8A patent/CN106060259B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN103856621A (en) | 2014-06-11 |
CN106060259A (en) | 2016-10-26 |
CN106060259B (en) | 2020-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103856621B (en) | The method and device authorized between subscriber equipment | |
JP4726950B2 (en) | Mobile phone and access control method | |
US8064883B2 (en) | Mobile terminal having anti-theft function and anti-theft method | |
CN100498690C (en) | Secure device, terminal device, gate device, system and method | |
CN102243590B (en) | Method for being communicated between the application program and Vehicular system on external equipment | |
US20070278290A1 (en) | User-configurable priority list for mobile device electronic payment applications | |
CN101543099B (en) | Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses | |
CN104318170B (en) | A kind of method and device based on multi-mobile-terminal protection data safety | |
KR102232966B1 (en) | Un-tact digital key service system and method thereof | |
TWI449397B (en) | Near field communication electronic device, login system using the same and method thereof | |
JP2007537680A (en) | Authentication wireless phone system | |
CN105282868B (en) | System and method for WiFi network to be temporarily added | |
CN102546530B (en) | Method, device and ERP (enterprise resource planning) system for user identity and permission validation | |
JP4966387B2 (en) | Power supply system | |
CN104159228A (en) | A Wi-Fi display and connecting method and system | |
CN103905191A (en) | Verification method applied to mobile terminal, mobile terminal and system | |
CN103607253B (en) | A kind of method and system of control mobile terminal | |
CN102868764A (en) | Personal information system based on cloud computing and formed by dependent special terminals | |
JP2006287832A (en) | Communication terminal apparatus | |
Noll et al. | Admittance services through mobile phone short messages | |
CN106776066A (en) | Multi-system function processing method and device | |
EP1860605A1 (en) | Electronic money system, information storage medium, and mobile terminal device | |
JP6065623B2 (en) | Information management device, portable terminal device, and program | |
US20080272187A1 (en) | Electronic Money System, Information Storage Medium, and Mobile Terminal Device | |
CN103813310B (en) | Lock community apparatus and method and control device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |