CN104166818A - Authority control method, device and system - Google Patents
Authority control method, device and system Download PDFInfo
- Publication number
- CN104166818A CN104166818A CN201410313120.7A CN201410313120A CN104166818A CN 104166818 A CN104166818 A CN 104166818A CN 201410313120 A CN201410313120 A CN 201410313120A CN 104166818 A CN104166818 A CN 104166818A
- Authority
- CN
- China
- Prior art keywords
- program
- processing
- processed
- peripheral accessory
- managed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 88
- 230000002093 peripheral effect Effects 0.000 claims description 247
- 238000012545 processing Methods 0.000 claims description 166
- 230000008569 process Effects 0.000 claims description 46
- 238000009434 installation Methods 0.000 claims description 26
- 230000004044 response Effects 0.000 claims description 23
- 238000013475 authorization Methods 0.000 claims description 9
- 230000006855 networking Effects 0.000 description 14
- 230000006870 function Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 9
- 238000001514 detection method Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides an authority control method, device and system. The authority control method comprises the steps that when a first program to be processed is detected, whether the first program is allowed to be processed or not is judged according to preset periphery accessories, and the first program belongs to preset managed programs; when the first program is allowed to be processed, the first program is processed. The method can improve the reliability of authority control, and lower the using complexity and cost.
Description
Technical Field
The present invention relates to the field of security processing technologies, and in particular, to a method, an apparatus, and a system for controlling a right.
Background
In order to protect the privacy or property of the user, the mobile phone needs to be subjected to authority control. At present, there are two methods for controlling the authority of a mobile phone, one is to control through mobile phone software, and the other is to use a token (token) mode.
However, the control mode through the mobile phone software can still be cracked violently, so that privacy or property loss is caused, and the reliability of the control mode is not high enough; the token mode needs to be networked with a remote server every time the token mode is used, and the price is high, so that the token mode is inconvenient to use and high in cost.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
To this end, an object of the present invention is to provide an authorization control method, which can improve the reliability of authorization control and reduce the complexity and cost of use.
Another object of the present invention is to provide an authorization control device.
Another object of the present invention is to provide an entitlement control system.
In order to achieve the above object, an authority control method provided in an embodiment of a first aspect of the present invention includes: when a first program is detected to be processed, judging whether the first program is allowed to be processed according to a preset peripheral accessory, wherein the first program belongs to a preset managed program; and when the first program is allowed to be processed, processing the first program.
The permission control method provided by the embodiment of the first aspect of the invention realizes safety control according to the cooperation of two physically separated devices, namely the mobile device and the peripheral accessory, by judging whether to allow processing of the program according to the peripheral accessory, and can avoid the loss caused by the fact that the software arranged on the mobile device is cracked because the corresponding processing can be carried out only by the permission of the peripheral accessory even if the software on the mobile device is cracked violently, thereby improving the reliability of permission control, avoiding a networking server and reducing the use complexity and cost.
In order to achieve the above object, an authority control method according to an embodiment of a second aspect of the present invention includes: when the mobile equipment is to process a first program, judging whether the first program is allowed to be processed or not; and when the first program is allowed to be processed, instructing the mobile equipment to process the first program.
According to the authority control method provided by the embodiment of the second aspect of the invention, when the mobile equipment is required to process the first program, whether the mobile equipment is allowed or not is judged, and the mobile equipment is indicated to process after the mobile equipment is allowed, so that safety control is realized according to the cooperation of two physically separated devices, namely the mobile equipment and peripheral accessories, even if software on the mobile equipment is cracked violently, corresponding processing can be carried out due to the fact that the peripheral accessories are still allowed, the loss caused after the software on the mobile equipment is cracked can be avoided, the reliability of authority control is improved, a network server is not required, and the use complexity and the cost can be reduced.
In order to achieve the above object, an authorization control device according to an embodiment of a third aspect of the present invention includes: the device comprises a judging module, a judging module and a judging module, wherein the judging module is used for judging whether to allow processing of a first program according to a preset peripheral accessory when the first program is detected to be processed, and the first program belongs to a preset managed program; and the processing module is used for processing the first program when the first program is allowed to be processed.
The permission control device provided by the embodiment of the third aspect of the invention realizes safety control according to the cooperation of two physically separated devices, namely the mobile device and the peripheral accessory, by judging whether to allow the processing of the program according to the peripheral accessory, even if the software on the mobile device is cracked violently, the corresponding processing can be carried out only by the permission of the peripheral accessory, so that the loss caused by the cracking of the software on the mobile device can be avoided, the reliability of the permission control is improved, a networking server is not needed, and the use complexity and the cost can be reduced.
In order to achieve the above object, a right control device according to a fourth aspect of the present invention includes: the mobile device comprises a judging module, a judging module and a judging module, wherein the judging module is used for judging whether to allow a first program to be processed when the mobile device is to process the first program; and the indicating module is used for indicating the mobile equipment to process the first program when the first program is allowed to be processed.
The permission control device provided by the embodiment of the fourth aspect of the invention judges whether the mobile device is permitted or not when the mobile device is required to process the first program, and indicates the mobile device to process after permission, so that safety control is realized according to the cooperation of two physically separated devices, namely the mobile device and the peripheral accessory, even if software on the mobile device is cracked violently, corresponding processing can be performed due to permission of the peripheral accessory, loss caused after the software on the mobile device is cracked can be avoided, the reliability of permission control is improved, a network server is not required, and the use complexity and cost can be reduced.
In order to achieve the above object, an authority control system according to an embodiment of a fifth aspect of the present invention includes: the apparatus as claimed in any one of the embodiments of the third aspect, and the apparatus as claimed in any one of the embodiments of the fourth aspect.
The authority control system provided by the embodiment of the fifth aspect of the invention realizes safety control according to the cooperation of two physically separated devices, namely the mobile device and the peripheral accessory, by judging whether to allow processing of the program according to the peripheral accessory, and can avoid the loss caused by the fact that the software arranged on the mobile device is cracked because the corresponding processing can be carried out only by the permission of the peripheral accessory even if the software on the mobile device is cracked violently, thereby improving the reliability of authority control, avoiding a networking server and reducing the use complexity and cost.
In order to achieve the above object, a mobile device according to a sixth embodiment of the present invention includes: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the mobile equipment; the memory is used for storing executable program codes; the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the steps of: when a first program is detected to be processed, judging whether the first program is allowed to be processed according to a preset peripheral accessory, wherein the first program belongs to a preset managed program; and when the first program is allowed to be processed, processing the first program.
According to the mobile device provided by the embodiment of the sixth aspect of the invention, whether the processing of the program is allowed or not is judged according to the peripheral accessory, so that the safety control is realized according to the cooperation of the mobile device and the peripheral accessory which are physically separated, even if the software on the mobile device is cracked violently, the corresponding processing can be performed only by the permission of the peripheral accessory, the loss caused after the software on the mobile device is cracked can be avoided, the reliability of authority control is improved, a networking server is not needed, and the use complexity and the cost can be reduced.
To achieve the above object, a peripheral accessory according to a seventh embodiment of the present invention includes: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the peripheral accessory; the memory is used for storing executable program codes; the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the steps of: when the mobile equipment is to process a first program, judging whether the first program is allowed to be processed or not; and when the first program is allowed to be processed, instructing the mobile equipment to process the first program.
The peripheral accessory provided in the seventh embodiment of the present invention determines whether to allow the mobile device to process the first program by the mobile device, and indicates the mobile device to process the first program after the first program is allowed, so that security control is performed according to cooperation between the mobile device and the peripheral accessory, and even if software on the mobile device is cracked violently, corresponding processing can be performed only by the permission of the peripheral accessory, so that a loss caused by the fact that the software on the mobile device is cracked is avoided, reliability of authority control is improved, a network server is not required, and complexity and cost of use can be reduced.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart of a method for controlling authority according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for controlling authority according to another embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for controlling authority according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of a right control device according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a right control device according to another embodiment of the present invention;
fig. 6 is a schematic structural diagram of a right control device according to another embodiment of the present invention;
fig. 7 is a schematic structural diagram of a right control device according to another embodiment of the present invention;
fig. 8 is a schematic structural diagram of a rights control system according to another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention. On the contrary, the embodiments of the invention include all changes, modifications and equivalents coming within the spirit and terms of the claims appended hereto.
Fig. 1 is a schematic flow chart of a method for controlling permissions according to an embodiment of the present invention, where the method includes:
s11: when a first program is detected to be processed, judging whether the first program is allowed to be processed according to a preset peripheral accessory, wherein the first program belongs to a preset managed program;
the execution main body of the embodiment may be a mobile device, and the mobile device may specifically implement a corresponding process by setting a security control program. The mobile device comprises a mobile phone, a tablet computer and the like.
A peripheral accessory is a device that is capable of establishing a connection with a mobile device, and the connection between the peripheral accessory and the mobile device may be a wired connection or a wireless connection.
Specifically, the peripheral accessory may be a device that is directly plugged into the headphone jack, and when the peripheral accessory is plugged into the headphone jack, a connection is established with the mobile device. Or,
the peripheral accessory may establish a connection with the mobile device by at least one of: universal Serial Bus (USB) interface, Near Field Communication (NFC), bluetooth, wifi, and the like.
After the peripheral accessory is connected with the mobile device, the mobile device can be paired with the peripheral accessory through the connection, so that the peripheral accessory can be identified. For example, the mobile device sends a message to the peripheral accessory, the peripheral accessory returns an identifier of the peripheral accessory after receiving the message, and the mobile device determines that the pairing with the peripheral accessory is successful when determining that the returned identifier is consistent with the identifier of the peripheral accessory configured in advance.
Further, the peripheral accessory may be provided separately or embedded in other devices, for example, in a wearable product, such as a bracelet or the like. The user can be facilitated by embedding the peripheral accessories into the wearable product, and the practicability of the wearable product is enhanced.
Specifically, the determining whether to allow the processing of the first program according to the preset peripheral accessory may include:
when the mobile device is successfully paired with the peripheral accessory, indicating that the first program is allowed to be processed; or the mobile device interacts with the peripheral accessory and judges whether the first program is allowed to be processed or not according to the response of the peripheral accessory.
In addition, the detection of the processing of the first program may be an indication that the first program is to be processed when the name of the program to be processed coincides with a preset name, for example, the software to be managed is preset to include software a, and then the detection of the installation of the software a or the start of the software a belongs to the detected software a to be processed. Alternatively, the detection of the first program to be processed means that the name of the program to be processed coincides with a preset name and the processing item coincides with a preset processing item, for example, the start of the management software a is preset, which indicates that the software a to be processed is detected when the software a is started, and when the installation software a does not belong to the detected software a to be processed.
S12: and when the first program is allowed to be processed, processing the first program.
Wherein the processing of the first program may include: start, install, uninstall, or cancel management, etc. For example, it may be preset that the software a needs to be managed, and when the software a is started, it needs to be judged first according to the peripheral accessory, and when the peripheral accessory allows the software a to be started, the software a can be started. Otherwise, the information without authority processing is displayed to the user.
For another example, it is preset that certain system function items, such as GPS or camera, need to be managed when being started, and when the user enables the camera, the mobile device first determines whether the use is allowed according to the peripheral accessory, and when determining that the use is allowed, the user is allowed to use the camera.
For another example, when installing an application of preset content, for example, preset authority such as reading a short message or an address book, or permission to install may be determined first. For example, when an application with the capability of reading short messages is to be installed on the mobile device, whether installation is allowed or not can be judged through the peripheral accessory firstly, and if not, installation cannot be carried out. Alternatively, when an application without a license signature is to be installed, it is also first determined whether installation is permitted by the peripheral accessory, and if not, installation cannot be performed.
According to the embodiment, whether the processing of the program is allowed or not is judged according to the peripheral accessories, so that the safety control is realized according to the matching of the mobile equipment and the two physically separated equipment of the peripheral accessories, even if the software on the mobile equipment is cracked violently, the corresponding processing can be carried out only by the permission of the peripheral accessories, the loss caused after the software on the mobile equipment is cracked can be avoided, the reliability of authority control is improved, a networking server is not needed, and the use complexity and the use cost can be reduced.
Fig. 2 is a schematic flow chart of a method for controlling authority according to another embodiment of the present invention, where the method includes:
s21: when a mobile device is to process a first program, it is determined whether processing of the first program is permitted.
The execution main body of the embodiment may be a peripheral accessory, and the peripheral accessory may be independently set or may be embedded in other devices, for example, a wearable product, such as a bracelet and the like. The user can be facilitated by embedding the peripheral accessories into the wearable product, and the practicability of the wearable product is enhanced.
The peripheral accessory may first establish a connection with the mobile device, the peripheral accessory may be a device that plugs directly into the headphone jack, and the peripheral accessory establishes a connection with the mobile device when plugged into the headphone jack. Or,
the peripheral accessory may establish a connection with the mobile device by at least one of: USB interface, NFC, bluetooth, wifi etc.
After the peripheral accessory is connected with the mobile device, the mobile device can be paired with the peripheral accessory through the connection, so that the peripheral accessory can be identified. For example, the mobile device sends a message to the peripheral accessory, the peripheral accessory returns an identifier of the peripheral accessory after receiving the message, and the mobile device determines that the pairing with the peripheral accessory is successful when determining that the returned identifier is consistent with the identifier of the peripheral accessory configured in advance.
The peripheral accessory may determine whether to allow the mobile device to process the first program directly based on whether the pairing with the mobile device is successful, for example, when the pairing of the peripheral accessory with the mobile device is successful, it indicates that the mobile device can process the first program. Or, the peripheral accessory may receive a processing request sent by the mobile device, where the processing request carries information to be processed, and the peripheral accessory determines whether to allow the mobile device to process the first program according to a preset rule or according to a selection of a user. For example, the peripheral accessory is preset to disallow installation of an application without a signed license, when the mobile device is to install an application without a signed license, a processing request sent by the mobile device may carry the application to be installed without the signed license, and after the peripheral accessory receives the request, the peripheral accessory may return a response that installation is not allowed due to the preset disallowance of installation. Or after the peripheral accessory receives the processing request, the user judges whether to allow the processing according to the information carried in the processing request, and returns a response of allowing or not allowing through the peripheral accessory.
S22: and when the first program is allowed to be processed, instructing the mobile equipment to process the first program.
For example, the peripheral accessory returns a response message to the mobile device that allows processing for the mobile device to process the first program.
In the embodiment, when the mobile device is used for processing the first program, whether the mobile device is allowed or not is judged, the mobile device is indicated to process after the permission, safety control is realized according to the matching of the two physically separated devices, namely the mobile device and the peripheral accessories, even if software on the mobile device is cracked violently, corresponding processing can be carried out due to the fact that the permission of the peripheral accessories is still required, the loss caused after the software on the mobile device is cracked can be avoided, the reliability of authority control is improved, a networking server is not required, and the use complexity and the use cost can be reduced.
Fig. 3 is a flowchart illustrating a method for controlling authority according to another embodiment of the present invention, including:
s301: and starting preset safety management software.
The execution subject of the present embodiment may be a mobile device.
The security management software has a higher privilege than other programs of the system so that the operation of the mobile device on other programs in the system can be monitored.
The authority of the security management software can be higher than that of other programs by modifying the system layer by a manufacturer or granting higher authority to the security management software by a user.
In addition, the safety management software can be matched with other software, for example, as a function item of a hundred-degree guard, so as to improve the viscosity and the activity of the product.
S302: and pairing the security management software and the peripheral accessories.
Wherein the mobile device may first connect with the peripheral accessory, the connection may comprise the peripheral accessory being directly plugged into the mobile device, or the peripheral accessory establishing a wired or wireless connection with the mobile device, for example, establishing a connection through a USB interface, NFC, bluetooth or wifi.
After the mobile device establishes a connection with the peripheral accessory, the mobile device may perform a pairing process, for example, the mobile device sends a request message to the peripheral accessory, and the peripheral accessory returns an identifier of the peripheral accessory after receiving the request message.
The peripheral accessories can be arranged independently or embedded in a wearable product.
S303: and judging whether the pairing is successful, if so, executing S305, otherwise, executing S304.
The mobile device can compare the received identifier with a pre-configured identifier of the peripheral accessory corresponding to the security management software, if the received identifier is consistent with the pre-configured identifier of the peripheral accessory corresponding to the security management software, the pairing is successful, and otherwise, the pairing is unsuccessful.
And S304, ending.
S305: the program to be managed is set.
For example, it is set that the start of the software a is to be managed, or it is set that some system function items such as a camera, a GPS, and the like are to be managed, or it is set that an application having some authority such as reading a short message or an address book is to be managed, or it is set that an application having no license signature is to be managed, and the like.
S306: the processing of other programs by the system is monitored by the security management software.
S307: and judging whether the managed program needs to be processed, if so, executing S311, otherwise, repeatedly executing S306 and the subsequent steps.
For example, when software a is to be started, since the starting software a is managed, it can be determined that the managed program is to be processed. Alternatively, for another example, when a camera is to be used, since the use of the camera is managed, it can be determined that a managed program is to be processed.
S308: and judging whether to cancel management operation on the managed program, if so, executing S311, otherwise, repeatedly executing S306 and the subsequent steps.
For example, it is previously set that software a is managed at the time of startup, and when the startup of software a is to be canceled in a managed program, it may be determined that an operation of canceling the management is to be performed on the managed program.
S309: and judging whether to forcibly uninstall the security management software, if so, executing S310, and otherwise, repeatedly executing S306 and the subsequent steps.
S310: a clear instruction is sent to the system of the mobile device to clear the user data in the managed program.
S311: and sending a processing request to the peripheral accessory, wherein the processing request carries information of the operation to be performed.
For example, information to start the software a is carried in the processing request.
S312: and receiving a processing response sent by the peripheral accessory, and judging whether corresponding operation is authorized according to the processing response, if so, executing S313, and otherwise, executing S314.
The peripheral accessory can judge whether to allow corresponding operation according to preconfigured information or according to selection of a user and information carried in the processing request. For example, the processing request indicates that software a is to be started, and the peripheral accessory is preset to be unable to start software a, the processing response may carry information indicating that there is no authority, and the mobile device may determine that there is no authority to start software a according to the processing response, and cannot start software a.
S313: and executing the corresponding request operation.
For example, software a is started.
S314: no permission is prompted.
For example, no operation authority is displayed to the user through the screen of the mobile terminal, and the software a is not started.
According to the embodiment, the permission control is realized through the matching of the mobile equipment and the peripheral accessories, the peripheral accessories of the mobile equipment are physically separated, and even if software on the mobile equipment is cracked violently, corresponding processing can be carried out due to the permission of the peripheral accessories, so that the loss caused after the software on the mobile equipment is cracked can be avoided, the reliability of the permission control is improved, a networking server is not needed, and the use complexity and the use cost can be reduced. In this embodiment, the security management software is set to have a higher authority than other programs, so that the security management software can control other programs, the security management software is prevented from being controlled by other programs, and the security is improved. By placing the peripheral accessories in the wearable product, the performance of the wearable product can be enhanced and the user experience improved. The embodiment can improve the viscosity and the activity of the product by matching the safety management software with other software.
Fig. 4 is a schematic structural diagram of an authorization control device according to another embodiment of the present invention, where the device 40 includes a determining module 41 and a processing module 42.
The judging module 41 is configured to, when detecting that a first program is to be processed, judge whether to allow processing of the first program according to a preset peripheral accessory, where the first program belongs to a preset managed program;
the device can be located in a mobile device, and the mobile device can specifically realize a corresponding process by setting a safety control program. The mobile device comprises a mobile phone, a tablet computer and the like.
Further, the peripheral accessory may be provided separately or embedded in other devices, for example, in a wearable product, such as a bracelet or the like. The user can be facilitated by embedding the peripheral accessories into the wearable product, and the practicability of the wearable product is enhanced.
Specifically, the determining module 41 is specifically configured to: sending a processing request to the peripheral accessory so that the peripheral accessory judges whether to allow the first program to be processed according to the processing request; and receiving a processing response which is sent by the peripheral accessory and corresponds to the processing request, wherein the processing response comprises information whether the first program is allowed to be processed or not. Or,
the determining module 41 is specifically configured to: determining to allow processing of the first program after the peripheral accessory pairing is successful.
The processing module 42 is configured to process the first program when the first program is allowed to be processed.
Wherein the processing of the first program may include: start, install, uninstall, or cancel management, etc. For example, it may be preset that the software a needs to be managed, and when the software a is started, it needs to be judged first according to the peripheral accessory, and when the peripheral accessory allows the software a to be started, the software a can be started. Otherwise, the information without authority processing is displayed to the user.
For another example, it is preset that certain system function items, such as GPS or camera, need to be managed when being started, and when the user enables the camera, the mobile device first determines whether the use is allowed according to the peripheral accessory, and when determining that the use is allowed, the user is allowed to use the camera.
For another example, when installing an application of preset content, for example, preset authority such as reading a short message or an address book, or permission to install may be determined first. For example, when an application with the capability of reading short messages is to be installed on the mobile device, whether installation is allowed or not can be judged through the peripheral accessory firstly, and if not, installation cannot be carried out. Alternatively, when an application without a license signature is to be installed, it is also first determined whether installation is permitted by the peripheral accessory, and if not, installation cannot be performed.
According to the embodiment, whether the processing of the program is allowed or not is judged according to the peripheral accessories, so that the safety control is realized according to the matching of the mobile equipment and the two physically separated equipment of the peripheral accessories, even if the software on the mobile equipment is cracked violently, the corresponding processing can be carried out only by the permission of the peripheral accessories, the loss caused after the software on the mobile equipment is cracked can be avoided, the reliability of authority control is improved, a networking server is not needed, and the use complexity and the use cost can be reduced.
Fig. 5 is a schematic structural diagram of an authorization control device according to another embodiment of the present invention, in which the device 40 further includes a pairing module 43, and the pairing module 43 is used for establishing a connection with the peripheral accessory; and pairing the peripheral accessory through the connection so as to judge whether to allow the first program to be processed according to the preset peripheral accessory after pairing.
A peripheral accessory is a device that is capable of establishing a connection with a mobile device, and the connection between the peripheral accessory and the mobile device may be a wired connection or a wireless connection.
Specifically, the peripheral accessory may be a device that is directly plugged into the headphone jack, and when the peripheral accessory is plugged into the headphone jack, a connection is established with the mobile device. Or,
the peripheral accessory may establish a connection with the mobile device by at least one of: USB interface, NFC, bluetooth, wifi etc.
After the peripheral accessory is connected with the mobile device, the mobile device can be paired with the peripheral accessory through the connection, so that the peripheral accessory can be identified. For example, the mobile device sends a message to the peripheral accessory, the peripheral accessory returns an identifier of the peripheral accessory after receiving the message, and the mobile device determines that the pairing with the peripheral accessory is successful when determining that the returned identifier is consistent with the identifier of the peripheral accessory configured in advance.
The apparatus 40 may further include: a first setting module 44, configured to set managed programs and corresponding processing items, where the managed programs include at least one program.
For example, it is set that the start of the software a is to be managed, or it is set that some system function items such as a camera, a GPS, and the like are to be managed, or it is set that an application having some authority such as reading a short message or an address book is to be managed, or it is set that an application having no license signature is to be managed, and the like.
The apparatus 40 may further include: and a clearing module 45, configured to send a clearing instruction to the system of the mobile device when the managed program is forcibly uninstalled, where the clearing instruction is used to clear the user data in the managed program.
For example, when the security management software is forcibly uninstalled, a clear instruction is sent to the managed program to clear the user data in the managed program.
The apparatus 40 may further include: a determining module 46, configured to receive a user processing instruction of the first program; and when the first program belongs to the set managed program and the processing instruction is consistent with the processing item corresponding to the first program, determining that the first program is detected to be processed.
For example, detecting that the first program to be processed includes the process name being processed in accordance with a preset and the content of the process being in accordance with a preset process item, for example, the start of the management software a is preset, indicates that the software a to be processed is detected when the software a is started, and indicates that the installation software a does not belong to the detected software a to be processed.
The setting managed program and the corresponding processing item include at least one of:
the setting processing item is a program managed during starting operation, and the program managed during starting operation comprises software and/or system function items;
the setting processing item is a program managed at the time of installation operation, and the program managed at the time of installation operation includes preset content including preset rights and/or signature permissions.
The processing module 42 may be specifically configured to: processing a preset processing item on the first program; or, performing a cancel management operation on the first program.
For example, software a is started or management of software a is cancelled.
The apparatus 40 may further include: a second setting module 47 for setting a right, which is higher than the managed program, to detect whether the first program is to be processed.
The security management software has a higher privilege than other programs of the system so that the operation of the mobile device on other programs in the system can be monitored.
The authority of the security management software can be higher than that of other programs by modifying the system layer by a manufacturer or granting higher authority to the security management software by a user.
According to the embodiment, the permission control is realized through the matching of the mobile equipment and the peripheral accessories, the peripheral accessories of the mobile equipment are physically separated, and even if software on the mobile equipment is cracked violently, corresponding processing can be carried out due to the permission of the peripheral accessories, so that the loss caused after the software on the mobile equipment is cracked can be avoided, the reliability of the permission control is improved, a networking server is not needed, and the use complexity and the use cost can be reduced. In this embodiment, the security management software is set to have a higher authority than other programs, so that the security management software can control other programs, the security management software is prevented from being controlled by other programs, and the security is improved. By placing the peripheral accessories in the wearable product, the performance of the wearable product can be enhanced and the user experience improved. The embodiment can improve the viscosity and the activity of the product by matching the safety management software with other software.
Fig. 6 is a schematic structural diagram of a rights control device according to another embodiment of the present invention, where the device 60 includes a determining module 61 and an indicating module 62.
The judging module 61 is configured to, when the mobile device is to process a first program, judge whether to allow processing of the first program;
in one embodiment, the determining module 61 is specifically configured to: receiving a processing request sent by the mobile device, wherein the processing request is sent by the mobile device after detecting that a first program is to be processed; and judging whether to allow the first program to be processed according to the processing request.
Further, the processing request carries processing information of the first program, and the determining module is further specifically configured to: and judging whether to allow the first program to be processed or not according to a preset rule or the selection of a user and the processing information of the first program.
In one embodiment, the determining module 61 is specifically configured to: and after the pairing with the mobile equipment is successful, determining that the first program is allowed to be processed.
The instruction module 62 is configured to instruct the mobile device to process the first program when the processing of the first program is allowed.
For example, the peripheral accessory returns a response message to the mobile device that allows processing for the mobile device to process the first program.
Referring to fig. 7, the apparatus may further include a pairing module 63 for establishing a connection with the mobile device; and pairing the mobile equipment through the connection so as to judge whether to allow the first program to be processed after pairing.
The peripheral accessory may first establish a connection with the mobile device, the peripheral accessory may be a device that plugs directly into the headphone jack, and the peripheral accessory establishes a connection with the mobile device when plugged into the headphone jack. Or,
the peripheral accessory may establish a connection with the mobile device by at least one of: USB interface, NFC, bluetooth, wifi etc.
After the peripheral accessory is connected with the mobile device, the mobile device can be paired with the peripheral accessory through the connection, so that the peripheral accessory can be identified. For example, the mobile device sends a message to the peripheral accessory, the peripheral accessory returns an identifier of the peripheral accessory after receiving the message, and the mobile device determines that the pairing with the peripheral accessory is successful when determining that the returned identifier is consistent with the identifier of the peripheral accessory configured in advance.
In the embodiment, when the mobile device is used for processing the first program, whether the mobile device is allowed or not is judged, the mobile device is indicated to process after the permission, safety control is realized according to the matching of the two physically separated devices, namely the mobile device and the peripheral accessories, even if software on the mobile device is cracked violently, corresponding processing can be carried out due to the fact that the permission of the peripheral accessories is still required, the loss caused after the software on the mobile device is cracked can be avoided, the reliability of authority control is improved, a networking server is not required, and the use complexity and the use cost can be reduced.
Fig. 8 is a schematic structural diagram of an authorization control system according to another embodiment of the present invention, where the system 80 includes a mobile device 81 and a peripheral accessory 82. The mobile device 81 may be as shown in fig. 4 or fig. 5 and the peripheral accessory 82 may be as shown in fig. 6 or fig. 7.
In the embodiment, when the mobile device is used for processing the first program, whether the mobile device is allowed or not is judged, the mobile device is indicated to process after the permission, safety control is realized according to the matching of the two physically separated devices, namely the mobile device and the peripheral accessories, even if software on the mobile device is cracked violently, corresponding processing can be carried out due to the fact that the permission of the peripheral accessories is still required, the loss caused after the software on the mobile device is cracked can be avoided, the reliability of authority control is improved, a networking server is not required, and the use complexity and the use cost can be reduced.
The embodiment of the invention also provides mobile equipment which comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in the space enclosed by the shell, and the processor and the memory are arranged on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the mobile equipment; the memory is used for storing executable program codes; the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the steps of:
s11': when a first program is detected to be processed, judging whether the first program is allowed to be processed according to a preset peripheral accessory, wherein the first program belongs to a preset managed program;
the execution main body of the embodiment may be a mobile device, and the mobile device may specifically implement a corresponding process by setting a security control program. The mobile device comprises a mobile phone, a tablet computer and the like.
A peripheral accessory is a device that is capable of establishing a connection with a mobile device, and the connection between the peripheral accessory and the mobile device may be a wired connection or a wireless connection.
Specifically, the peripheral accessory may be a device that is directly plugged into the headphone jack, and when the peripheral accessory is plugged into the headphone jack, a connection is established with the mobile device. Or,
the peripheral accessory may establish a connection with the mobile device by at least one of: USB interface, NFC, bluetooth, wifi etc.
After the peripheral accessory is connected with the mobile device, the mobile device can be paired with the peripheral accessory through the connection, so that the peripheral accessory can be identified. For example, the mobile device sends a message to the peripheral accessory, the peripheral accessory returns an identifier of the peripheral accessory after receiving the message, and the mobile device determines that the pairing with the peripheral accessory is successful when determining that the returned identifier is consistent with the identifier of the peripheral accessory configured in advance.
Further, the peripheral accessory may be provided separately or embedded in other devices, for example, in a wearable product, such as a bracelet or the like. The user can be facilitated by embedding the peripheral accessories into the wearable product, and the practicability of the wearable product is enhanced.
Specifically, the determining whether to allow the processing of the first program according to the preset peripheral accessory may include:
when the mobile device is successfully paired with the peripheral accessory, indicating that the first program is allowed to be processed; or the mobile device interacts with the peripheral accessory and judges whether the first program is allowed to be processed or not according to the response of the peripheral accessory.
In addition, the detection of the processing of the first program may be an indication that the first program is to be processed when the name of the program to be processed coincides with a preset name, for example, the software to be managed is preset to include software a, and then the detection of the installation of the software a or the start of the software a belongs to the detected software a to be processed. Alternatively, the detection of the first program to be processed means that the name of the program to be processed coincides with a preset name and the processing item coincides with a preset processing item, for example, the start of the management software a is preset, which indicates that the software a to be processed is detected when the software a is started, and when the installation software a does not belong to the detected software a to be processed.
S12': and when the first program is allowed to be processed, processing the first program.
Wherein the processing of the first program may include: start, install, uninstall, or cancel management, etc. For example, it may be preset that the software a needs to be managed, and when the software a is started, it needs to be judged first according to the peripheral accessory, and when the peripheral accessory allows the software a to be started, the software a can be started. Otherwise, the information without authority processing is displayed to the user.
For another example, it is preset that certain system function items, such as GPS or camera, need to be managed when being started, and when the user enables the camera, the mobile device first determines whether the use is allowed according to the peripheral accessory, and when determining that the use is allowed, the user is allowed to use the camera.
For another example, when installing an application of preset content, for example, preset authority such as reading a short message or an address book, or permission to install may be determined first. For example, when an application with the capability of reading short messages is to be installed on the mobile device, whether installation is allowed or not can be judged through the peripheral accessory firstly, and if not, installation cannot be carried out. Alternatively, when an application without a license signature is to be installed, it is also first determined whether installation is permitted by the peripheral accessory, and if not, installation cannot be performed.
According to the embodiment, whether the processing of the program is allowed or not is judged according to the peripheral accessories, so that the safety control is realized according to the matching of the mobile equipment and the two physically separated equipment of the peripheral accessories, even if the software on the mobile equipment is cracked violently, the corresponding processing can be carried out only by the permission of the peripheral accessories, the loss caused after the software on the mobile equipment is cracked can be avoided, the reliability of authority control is improved, a networking server is not needed, and the use complexity and the use cost can be reduced.
In another embodiment, the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the steps of:
s301': and starting preset safety management software.
The execution subject of the present embodiment may be a mobile device.
The security management software has a higher privilege than other programs of the system so that the operation of the mobile device on other programs in the system can be monitored.
The authority of the security management software can be higher than that of other programs by modifying the system layer by a manufacturer or granting higher authority to the security management software by a user.
In addition, the safety management software can be matched with other software, for example, as a function item of a hundred-degree guard, so as to improve the viscosity and the activity of the product.
S302': and pairing the security management software and the peripheral accessories.
Wherein the mobile device may first connect with the peripheral accessory, the connection may comprise the peripheral accessory being directly plugged into the mobile device, or the peripheral accessory establishing a wired or wireless connection with the mobile device, for example, establishing a connection through a USB interface, NFC, bluetooth or wifi.
After the mobile device establishes a connection with the peripheral accessory, the mobile device may perform a pairing process, for example, the mobile device sends a request message to the peripheral accessory, and the peripheral accessory returns an identifier of the peripheral accessory after receiving the request message.
The peripheral accessories can be arranged independently or embedded in a wearable product.
S303': and judging whether the pairing is successful, if so, executing S305 ', otherwise, executing S304'.
The mobile device can compare the received identifier with a pre-configured identifier of the peripheral accessory corresponding to the security management software, if the received identifier is consistent with the pre-configured identifier of the peripheral accessory corresponding to the security management software, the pairing is successful, and otherwise, the pairing is unsuccessful.
And S304' ending.
S305': the program to be managed is set.
For example, it is set that the start of the software a is to be managed, or it is set that some system function items such as a camera, a GPS, and the like are to be managed, or it is set that an application having some authority such as reading a short message or an address book is to be managed, or it is set that an application having no license signature is to be managed, and the like.
S306': the processing of other programs by the system is monitored by the security management software.
S307': judging whether the managed program needs to be processed, if so, executing S311 ', otherwise, repeatedly executing S306' and the subsequent steps.
For example, when software a is to be started, since the starting software a is managed, it can be determined that the managed program is to be processed. Alternatively, for another example, when a camera is to be used, since the use of the camera is managed, it can be determined that a managed program is to be processed.
S308': and judging whether to cancel management operation on the managed program, if so, executing S311 ', otherwise, repeatedly executing S306' and the subsequent steps.
For example, it is previously set that software a is managed at the time of startup, and when the startup of software a is to be canceled in a managed program, it may be determined that an operation of canceling the management is to be performed on the managed program.
S309': and judging whether to forcibly uninstall the security management software, if so, executing S310 ', otherwise, repeatedly executing S306' and the subsequent steps.
S310': a clear instruction is sent to the system of the mobile device to clear the user data in the managed program.
S311': and sending a processing request to the peripheral accessory, wherein the processing request carries information of the operation to be performed.
For example, information to start the software a is carried in the processing request.
S312': receiving a processing response sent by the peripheral accessory, and judging whether corresponding operation is authorized according to the processing response, if so, executing S313 ', otherwise, executing S314'.
The peripheral accessory can judge whether to allow corresponding operation according to preconfigured information or according to selection of a user and information carried in the processing request. For example, the processing request indicates that software a is to be started, and the peripheral accessory is preset to be unable to start software a, the processing response may carry information indicating that there is no authority, and the mobile device may determine that there is no authority to start software a according to the processing response, and cannot start software a.
S313': and executing the corresponding request operation.
For example, software a is started.
S314': no permission is prompted.
For example, no operation authority is displayed to the user through the screen of the mobile terminal, and the software a is not started.
According to the embodiment, the permission control is realized through the matching of the mobile equipment and the peripheral accessories, the peripheral accessories of the mobile equipment are physically separated, and even if software on the mobile equipment is cracked violently, corresponding processing can be carried out due to the permission of the peripheral accessories, so that the loss caused after the software on the mobile equipment is cracked can be avoided, the reliability of the permission control is improved, a networking server is not needed, and the use complexity and the use cost can be reduced. In this embodiment, the security management software is set to have a higher authority than other programs, so that the security management software can control other programs, the security management software is prevented from being controlled by other programs, and the security is improved. By placing the peripheral accessories in the wearable product, the performance of the wearable product can be enhanced and the user experience improved. The embodiment can improve the viscosity and the activity of the product by matching the safety management software with other software.
The embodiment of the invention also provides a peripheral accessory, which comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the peripheral accessory; the memory is used for storing executable program codes; the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the steps of:
s21': when a mobile device is to process a first program, it is determined whether processing of the first program is permitted.
The execution main body of the embodiment may be a peripheral accessory, and the peripheral accessory may be independently set or may be embedded in other devices, for example, a wearable product, such as a bracelet and the like. The user can be facilitated by embedding the peripheral accessories into the wearable product, and the practicability of the wearable product is enhanced.
The peripheral accessory may first establish a connection with the mobile device, the peripheral accessory may be a device that plugs directly into the headphone jack, and the peripheral accessory establishes a connection with the mobile device when plugged into the headphone jack. Or,
the peripheral accessory may establish a connection with the mobile device by at least one of: USB interface, NFC, bluetooth, wifi etc.
After the peripheral accessory is connected with the mobile device, the mobile device can be paired with the peripheral accessory through the connection, so that the peripheral accessory can be identified. For example, the mobile device sends a message to the peripheral accessory, the peripheral accessory returns an identifier of the peripheral accessory after receiving the message, and the mobile device determines that the pairing with the peripheral accessory is successful when determining that the returned identifier is consistent with the identifier of the peripheral accessory configured in advance.
The peripheral accessory may determine whether to allow the mobile device to process the first program directly based on whether the pairing with the mobile device is successful, for example, when the pairing of the peripheral accessory with the mobile device is successful, it indicates that the mobile device can process the first program. Or, the peripheral accessory may receive a processing request sent by the mobile device, where the processing request carries information to be processed, and the peripheral accessory determines whether to allow the mobile device to process the first program according to a preset rule or according to a selection of a user. For example, the peripheral accessory is preset to disallow installation of an application without a signed license, when the mobile device is to install an application without a signed license, a processing request sent by the mobile device may carry the application to be installed without the signed license, and after the peripheral accessory receives the request, the peripheral accessory may return a response that installation is not allowed due to the preset disallowance of installation. Or after the peripheral accessory receives the processing request, the user judges whether to allow the processing according to the information carried in the processing request, and returns a response of allowing or not allowing through the peripheral accessory.
S22': and when the first program is allowed to be processed, instructing the mobile equipment to process the first program.
For example, the peripheral accessory returns a response message to the mobile device that allows processing for the mobile device to process the first program.
In the embodiment, when the mobile device is used for processing the first program, whether the mobile device is allowed or not is judged, the mobile device is indicated to process after the permission, safety control is realized according to the matching of the two physically separated devices, namely the mobile device and the peripheral accessories, even if software on the mobile device is cracked violently, corresponding processing can be carried out due to the fact that the permission of the peripheral accessories is still required, the loss caused after the software on the mobile device is cracked can be avoided, the reliability of authority control is improved, a networking server is not required, and the use complexity and the use cost can be reduced.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present invention, "a plurality" means two or more unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (31)
1. An authority control method, comprising:
when a first program is detected to be processed, judging whether the first program is allowed to be processed according to a preset peripheral accessory, wherein the first program belongs to a preset managed program;
and when the first program is allowed to be processed, processing the first program.
2. The method according to claim 1, wherein the determining whether to allow the first program to be processed according to a preset peripheral accessory comprises:
sending a processing request to the peripheral accessory so that the peripheral accessory judges whether to allow the first program to be processed according to the processing request;
and receiving a processing response which is sent by the peripheral accessory and corresponds to the processing request, wherein the processing response comprises information whether the first program is allowed to be processed or not.
3. The method according to claim 1, wherein the determining whether to allow the first program to be processed according to a preset peripheral accessory comprises:
determining to allow processing of the first program after the peripheral accessory pairing is successful.
4. The method according to any one of claims 1 to 3, wherein before determining whether to allow the first program to be processed according to a preset peripheral accessory, the method further comprises:
establishing a connection with the peripheral accessory;
and pairing the peripheral accessory through the connection so as to judge whether to allow the first program to be processed according to the preset peripheral accessory after pairing.
5. The method of claim 4, wherein after the pairing is successful, the method further comprises:
setting managed programs and corresponding processing items, wherein the managed programs comprise at least one program.
6. The method of claim 5, further comprising:
when the managed program is forcibly unloaded, sending a clearing instruction to a system of the mobile device, wherein the clearing instruction is used for clearing the user data in the managed program.
7. The method of claim 5, further comprising:
receiving a processing instruction of a user to a first program;
and when the first program belongs to the set managed program and the processing instruction is consistent with the processing item corresponding to the first program, determining that the first program is detected to be processed.
8. The method of claim 5, wherein setting the managed program and corresponding processing items comprises at least one of:
the setting processing item is a program managed during starting operation, and the program managed during starting operation comprises software and/or system function items;
the setting processing item is a program managed at the time of installation operation, and the program managed at the time of installation operation includes preset content including preset rights and/or signature permissions.
9. The method of any of claims 1 to 3, wherein processing the first program comprises:
processing a preset processing item on the first program; or,
and performing cancel management operation on the first program.
10. The method of any of claims 1 to 3, further comprising:
setting a right, which is higher than the managed program, to detect whether the first program is to be processed.
11. An authority control method, comprising:
when the mobile equipment is to process a first program, judging whether the first program is allowed to be processed or not;
and when the first program is allowed to be processed, instructing the mobile equipment to process the first program.
12. The method of claim 11, wherein the determining whether to allow processing of the first program comprises:
receiving a processing request sent by the mobile device, wherein the processing request is sent by the mobile device after detecting that a first program is to be processed;
and judging whether to allow the first program to be processed according to the processing request.
13. The method according to claim 12, wherein the processing request carries processing information of a first program, and the determining whether to allow the first program to be processed according to the processing request includes:
and judging whether to allow the first program to be processed or not according to a preset rule or the selection of a user and the processing information of the first program.
14. The method of claim 11, wherein the determining whether to allow processing of the first program comprises:
and after the pairing with the mobile equipment is successful, determining that the first program is allowed to be processed.
15. The method according to any one of claims 11 to 14, further comprising:
establishing a connection with the mobile device;
and pairing the mobile equipment through the connection so as to judge whether to allow the first program to be processed after pairing.
16. An authorization control device, comprising:
the device comprises a judging module, a judging module and a judging module, wherein the judging module is used for judging whether to allow processing of a first program according to a preset peripheral accessory when the first program is detected to be processed, and the first program belongs to a preset managed program;
and the processing module is used for processing the first program when the first program is allowed to be processed.
17. The apparatus of claim 16, wherein the determining module is specifically configured to:
sending a processing request to the peripheral accessory so that the peripheral accessory judges whether to allow the first program to be processed according to the processing request;
and receiving a processing response which is sent by the peripheral accessory and corresponds to the processing request, wherein the processing response comprises information whether the first program is allowed to be processed or not.
18. The apparatus of claim 16, wherein the determining module is specifically configured to:
determining to allow processing of the first program after the peripheral accessory pairing is successful.
19. The apparatus of any one of claims 16 to 18, further comprising:
a pairing module for establishing a connection with the peripheral accessory; and pairing the peripheral accessory through the connection so as to judge whether to allow the first program to be processed according to the preset peripheral accessory after pairing.
20. The apparatus of claim 19, further comprising:
the first setting module is used for setting managed programs and corresponding processing items, and the managed programs comprise at least one program.
21. The apparatus of claim 20, further comprising:
and the clearing module is used for sending a clearing instruction to a system of the mobile equipment when the mobile equipment is forcibly unloaded, and the clearing instruction is used for clearing the user data in the managed program.
22. The apparatus of claim 20, further comprising:
the determining module is used for receiving a processing instruction of a user to the first program; and when the first program belongs to the set managed program and the processing instruction is consistent with the processing item corresponding to the first program, determining that the first program is detected to be processed.
23. The apparatus of claim 20, wherein the setting of managed programs and corresponding processing items comprises at least one of:
the setting processing item is a program managed during starting operation, and the program managed during starting operation comprises software and/or system function items;
the setting processing item is a program managed at the time of installation operation, and the program managed at the time of installation operation includes preset content including preset rights and/or signature permissions.
24. The apparatus according to any one of claims 16 to 18, wherein the processing module is specifically configured to:
processing a preset processing item on the first program; or,
and performing cancel management operation on the first program.
25. The apparatus of any one of claims 16 to 18, further comprising:
a second setting module for setting a right, which is higher than the managed program, to detect whether the first program is to be processed.
26. An authorization control device, comprising:
the mobile device comprises a judging module, a judging module and a judging module, wherein the judging module is used for judging whether to allow a first program to be processed when the mobile device is to process the first program;
and the indicating module is used for indicating the mobile equipment to process the first program when the first program is allowed to be processed.
27. The apparatus of claim 26, wherein the determining module is specifically configured to:
receiving a processing request sent by the mobile device, wherein the processing request is sent by the mobile device after detecting that a first program is to be processed;
and judging whether to allow the first program to be processed according to the processing request.
28. The apparatus of claim 27, wherein the processing request carries processing information of the first program, and the determining module is further specifically configured to:
and judging whether to allow the first program to be processed or not according to a preset rule or the selection of a user and the processing information of the first program.
29. The apparatus of claim 26, wherein the determining module is specifically configured to:
and after the pairing with the mobile equipment is successful, determining that the first program is allowed to be processed.
30. The apparatus of any one of claims 26 to 29, further comprising:
a pairing module for establishing a connection with the mobile device; and pairing the mobile equipment through the connection so as to judge whether to allow the first program to be processed after pairing.
31. An entitlement control system, comprising:
the apparatus of any one of claims 16 to 25; and the number of the first and second groups,
the device of any one of claims 26 to 30.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410313120.7A CN104166818B (en) | 2014-07-02 | 2014-07-02 | authority control method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410313120.7A CN104166818B (en) | 2014-07-02 | 2014-07-02 | authority control method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104166818A true CN104166818A (en) | 2014-11-26 |
CN104166818B CN104166818B (en) | 2018-01-09 |
Family
ID=51910627
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410313120.7A Active CN104166818B (en) | 2014-07-02 | 2014-07-02 | authority control method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104166818B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108990041A (en) * | 2017-06-01 | 2018-12-11 | 中国移动通信有限公司研究院 | A kind of method and apparatus carrying out the setting of major-minor card |
WO2020132876A1 (en) * | 2018-12-25 | 2020-07-02 | 奇安信安全技术(珠海)有限公司 | Operation detection method and system, and electronic device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014067379A (en) * | 2012-09-27 | 2014-04-17 | Canon Inc | Device apparatus, and control method and program therefor |
CN103744810A (en) * | 2013-12-23 | 2014-04-23 | 西安酷派软件科技有限公司 | Terminal, electronic device and synchronous display system and method |
CN103856621A (en) * | 2012-12-06 | 2014-06-11 | 北京三星通信技术研究有限公司 | Method and device for authorization between user devices |
-
2014
- 2014-07-02 CN CN201410313120.7A patent/CN104166818B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014067379A (en) * | 2012-09-27 | 2014-04-17 | Canon Inc | Device apparatus, and control method and program therefor |
CN103856621A (en) * | 2012-12-06 | 2014-06-11 | 北京三星通信技术研究有限公司 | Method and device for authorization between user devices |
CN103744810A (en) * | 2013-12-23 | 2014-04-23 | 西安酷派软件科技有限公司 | Terminal, electronic device and synchronous display system and method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108990041A (en) * | 2017-06-01 | 2018-12-11 | 中国移动通信有限公司研究院 | A kind of method and apparatus carrying out the setting of major-minor card |
CN108990041B (en) * | 2017-06-01 | 2021-08-06 | 中国移动通信有限公司研究院 | Method and equipment for setting main card and auxiliary card |
WO2020132876A1 (en) * | 2018-12-25 | 2020-07-02 | 奇安信安全技术(珠海)有限公司 | Operation detection method and system, and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN104166818B (en) | 2018-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107579966B (en) | Control method, device and system for remotely accessing intranet and terminal equipment | |
US20120135683A1 (en) | System and method for configuring an access list for bluetooth devices | |
US8654977B2 (en) | System and method for controlling access between Bluetooth devices | |
US8458448B2 (en) | Method of installing a wireless network | |
WO2014197323A1 (en) | Device locator disable authentication | |
US10664620B2 (en) | Modular system for controlling usability of a device | |
CN107636675B (en) | Device and method comprising a module for controlling the availability of a device | |
US20150050882A1 (en) | User equipment, communication method, program, and communication system | |
US20210049254A1 (en) | Add-on modem for wireless devices and methods useful in conjunction therewith | |
CN105493098B (en) | Terminal device, method for protecting terminal device, and terminal management server | |
CN111818528B (en) | Connection method and device of wireless local area network, storage medium and wireless access equipment | |
US9430638B2 (en) | Authentication method, authentication apparatus and authentication device | |
CN106096923A (en) | A kind of secure payment means of defence and electronic equipment | |
CN104166818B (en) | authority control method, device and system | |
CN106684985B (en) | Wireless charging control method and wireless charging device | |
EP2458907B1 (en) | Method and device for controlling access between wireless communication devices | |
EP3482579B1 (en) | Automatic secure data transfer with a motor vehicle | |
WO2016062017A1 (en) | Wireless network connection method and apparatus, and computer storage medium | |
US11503080B2 (en) | Remote management of a user device | |
CN107491669B (en) | Super user permission obtaining method and device | |
US9572031B2 (en) | Information processing device and authentication control method | |
JP6091854B2 (en) | Information processing apparatus and control method | |
CN114391134A (en) | Flashing processing method and related device | |
KR101578383B1 (en) | System and method of controlling user device using profile | |
KR101521476B1 (en) | Device apparatus and computer-readable recording medium for protective of device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |