CN104166818A - Authority control method, device and system - Google Patents

Authority control method, device and system Download PDF

Info

Publication number
CN104166818A
CN104166818A CN201410313120.7A CN201410313120A CN104166818A CN 104166818 A CN104166818 A CN 104166818A CN 201410313120 A CN201410313120 A CN 201410313120A CN 104166818 A CN104166818 A CN 104166818A
Authority
CN
China
Prior art keywords
program
peripheral equipment
mobile device
processing
managed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410313120.7A
Other languages
Chinese (zh)
Other versions
CN104166818B (en
Inventor
王玉和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201410313120.7A priority Critical patent/CN104166818B/en
Publication of CN104166818A publication Critical patent/CN104166818A/en
Application granted granted Critical
Publication of CN104166818B publication Critical patent/CN104166818B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides an authority control method, device and system. The authority control method comprises the steps that when a first program to be processed is detected, whether the first program is allowed to be processed or not is judged according to preset periphery accessories, and the first program belongs to preset managed programs; when the first program is allowed to be processed, the first program is processed. The method can improve the reliability of authority control, and lower the using complexity and cost.

Description

Authority control method, device and system
Technical field
The present invention relates to safe handling technical field, relate in particular to a kind of authority control method, device and system.
Background technology
In order to protect privacy of user or property, need to carry out control of authority to mobile phone.The method of mobile phone control authority mainly contains two kinds at present, and one is to control by cell phone software, and another kind is the mode with token (token).
But the mode of controlling by cell phone software still may be by Brute Force, thereby the privacy of causing or property loss make the reliability of which not high enough; And that token mode all needs while using with remote server networking and price is higher at every turn, make which use inconvenience and cost higher.
Summary of the invention
The present invention is intended to solve at least to a certain extent one of technical matters in correlation technique.
For this reason, one object of the present invention is to propose a kind of authority control method, and the method can improve the reliability of control of authority, and reduces use complexity and cost.
Another object of the present invention is to propose a kind of permission control device.
Another object of the present invention is to propose a kind of authority control system.
For achieving the above object, the authority control method that first aspect present invention embodiment proposes, comprise: detect will process the first program time, judge whether to allow described the first program to process according to the peripheral equipment setting in advance, described the first program belongs to the program being managed setting in advance; In the time allowing described the first program to process, described the first program is processed.
The authority control method that first aspect present invention embodiment proposes, by judge whether to allow the processing to program according to peripheral equipment, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
For achieving the above object, the authority control method that second aspect present invention embodiment proposes, comprising: in the time that mobile device will be processed the first program, judge whether to allow described the first program to process; In the time allowing described the first program to process, indicate described mobile device to process described the first program.
The authority control method that second aspect present invention embodiment proposes, will process the first program by mobile device time, judge whether to allow, after permission, indicate mobile device processing, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
For achieving the above object, the permission control device that third aspect present invention embodiment proposes, comprise: judge module, for detection of to will process the first program time, judge whether to allow described the first program to process according to the peripheral equipment setting in advance, described the first program belongs to the program being managed setting in advance; Processing module, in the time allowing described the first program to process, processes described the first program.
The permission control device that third aspect present invention embodiment proposes, by judge whether to allow the processing to program according to peripheral equipment, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
For achieving the above object, the permission control device that fourth aspect present invention embodiment proposes, comprising: judge module, in the time that mobile device will be processed the first program, judges whether to allow described the first program to process; Indicating module, in the time allowing described the first program to process, indicates described mobile device to process described the first program.
The permission control device that fourth aspect present invention embodiment proposes, will process the first program by mobile device time, judge whether to allow, after permission, indicate mobile device processing, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
For achieving the above object, the authority control system that fifth aspect present invention embodiment proposes, comprising: the device as described in third aspect embodiment any one, and device described in fourth aspect embodiment any one.
The authority control system that fifth aspect present invention embodiment proposes, by judge whether to allow the processing to program according to peripheral equipment, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
For achieving the above object, the mobile device that sixth aspect present invention embodiment proposes, comprising: housing, processor, storer, circuit board and power circuit, wherein, circuit board is placed in the interior volume that housing surrounds, and processor and storer are arranged on circuit board; Power circuit, is used to each circuit or the device power supply of mobile device; Storer is for stores executable programs code; Processor moves the program corresponding with executable program code by the executable program code of storing in read memory, for carrying out following steps: detect will process the first program time, judge whether to allow described the first program to process according to the peripheral equipment setting in advance, described the first program belongs to the program being managed setting in advance; In the time allowing described the first program to process, described the first program is processed.
The mobile device that sixth aspect present invention embodiment proposes, by judge whether to allow the processing to program according to peripheral equipment, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
For achieving the above object, the peripheral equipment that seventh aspect present invention embodiment proposes, comprising: housing, processor, storer, circuit board and power circuit, wherein, circuit board is placed in the interior volume that housing surrounds, and processor and storer are arranged on circuit board; Power circuit, is used to each circuit or the device power supply of peripheral equipment; Storer is for stores executable programs code; Processor moves the program corresponding with executable program code by the executable program code of storing in read memory, for carrying out following steps: in the time that mobile device will be processed the first program, judge whether to allow described the first program to process; In the time allowing described the first program to process, indicate described mobile device to process described the first program.
The peripheral equipment that seventh aspect present invention embodiment proposes, will process the first program by mobile device time, judge whether to allow, after permission, indicate mobile device processing, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
The aspect that the present invention is additional and advantage in the following description part provide, and part will become obviously from the following description, or recognize by practice of the present invention.
Brief description of the drawings
The present invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments obviously and easily and understand, wherein:
Fig. 1 is the schematic flow sheet of the authority control method of one embodiment of the invention proposition;
Fig. 2 is the schematic flow sheet of the authority control method of another embodiment of the present invention proposition;
Fig. 3 is the schematic flow sheet of the authority control method of another embodiment of the present invention proposition;
Fig. 4 is the structural representation of the permission control device of another embodiment of the present invention proposition;
Fig. 5 is the structural representation of the permission control device of another embodiment of the present invention proposition;
Fig. 6 is the structural representation of the permission control device of another embodiment of the present invention proposition;
Fig. 7 is the structural representation of the permission control device of another embodiment of the present invention proposition;
Fig. 8 is the structural representation of the authority control system of another embodiment of the present invention proposition.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of identical or similar functions from start to finish.Be exemplary below by the embodiment being described with reference to the drawings, only for explaining the present invention, and can not be interpreted as limitation of the present invention.On the contrary, embodiments of the invention comprise all changes, amendment and the equivalent within the scope of spirit and the intension that falls into additional claims.
Fig. 1 is the schematic flow sheet of the authority control method of one embodiment of the invention proposition, and the method comprises:
S11: detect will process the first program time, judge whether to allow described the first program to process according to the peripheral equipment setting in advance, described the first program belongs to the program being managed setting in advance;
Wherein, the executive agent of the present embodiment can be mobile device, and mobile device can specifically be realized corresponding flow process by security control program is set.Mobile device comprises mobile phone, panel computer etc.
Peripheral equipment is the equipment that can connect with mobile device, and being connected between peripheral equipment and mobile device can be wired connection or wireless connections.
Concrete, peripheral equipment can be the equipment of direct plugged earphone jack, after peripheral equipment is inserted into earphone jack, connects with mobile device.Or,
Peripheral equipment can being connected by least one foundation in following and mobile device: USB (universal serial bus) (Universal Serial Bus, USB) interface, near-field communication (Near Field Communication, NFC), bluetooth, wifi etc.
After peripheral equipment and mobile device connect, mobile device can also match by this connection and peripheral equipment, to peripheral equipment is carried out to identification.For example, mobile device to the periphery accessory sends a message, peripheral equipment receives the mark of returning to peripheral equipment after this message, and mobile device, in the time that the mark of determining the mark the returned peripheral equipment pre-configured with self is consistent, is determined and the successful matching of peripheral equipment.
Further, peripheral equipment can independently arrange and also can be embedded in other equipment, for example, be embedded in wearable product such as bracelet of wearable product etc.By peripheral equipment is embedded in wearable product and can be user-friendly to, and strengthen the practicality of wearable product.
Concrete, judge whether to allow the first program to process and can comprise according to the peripheral equipment setting in advance:
After mobile device and peripheral equipment successfully match, just show to allow the first program to process; Or mobile device and peripheral equipment carry out alternately, judge whether to allow the first program to process according to the response of peripheral equipment.
In addition, detect that first program of processing can be to show to process the first program in the time that program name to be processed is consistent with default title, for example, the default software being managed comprises software A, mounting software A ought be detected so or start software A all to belong to and detect and want process software A.Or, detect to process the first program refer to program name to be processed and processing item consistent with default title and default processing item consistent, for example, preset the startup of management software A, in the time starting software A, show to detect and want process software A, do not belong to and detect and want process software A and work as mounting software A.
S12: in the time allowing described the first program to process, described the first program is processed.
Wherein, can comprise the processing of the first program: start, pacify loading, unloading or cancel management etc.For example, can set in advance and need to be managed the startup of software A, in the time starting software A, need first to judge according to peripheral equipment so, when peripheral equipment allows just can start while starting software A.Otherwise, show the information that there is no authority processing to user.
Again for example, while setting in advance the startup to some systemic-function item, need to be managed, systemic-function item such as GPS or camera etc., so in the time that user enables camera, first mobile device judges whether to allow to use according to peripheral equipment, in the time judging permission use, just allows user to use camera.
Again for example, also can first judge whether to allow to install in the time that the application of preset content is installed, preset content is for example default access or license signature etc., and default access is reading short message or address list etc. such as.For example, when installing one while thering is the application of reading short message ability on mobile device, can first judge whether to allow to install by peripheral equipment, if do not allowed, can not install.Or, when installing one while thering is no the application of license signature, also first judge whether to allow to install by peripheral equipment, if do not allowed, can not install.
The present embodiment is by judging whether to allow the processing to program according to peripheral equipment, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
Fig. 2 is the schematic flow sheet of the authority control method of another embodiment of the present invention proposition, and the method comprises:
S21: in the time that mobile device will be processed the first program, judge whether to allow described the first program to process.
Wherein, the executive agent of the present embodiment can be peripheral equipment, and peripheral equipment can independently arrange and also can be embedded in other equipment, for example, be embedded in wearable product such as bracelet of wearable product etc.By peripheral equipment is embedded in wearable product and can be user-friendly to, and strengthen the practicality of wearable product.
First peripheral equipment can connect with mobile device, and peripheral equipment can be the equipment of direct plugged earphone jack, after peripheral equipment is inserted into earphone jack, connects with mobile device.Or,
Peripheral equipment can being connected by least one foundation in following and mobile device: USB interface, NFC, bluetooth, wifi etc.
After peripheral equipment and mobile device connect, mobile device can also match by this connection and peripheral equipment, to peripheral equipment is carried out to identification.For example, mobile device to the periphery accessory sends a message, peripheral equipment receives the mark of returning to peripheral equipment after this message, and mobile device, in the time that the mark of determining the mark the returned peripheral equipment pre-configured with self is consistent, is determined and the successful matching of peripheral equipment.
Peripheral equipment can be directly according to whether judging whether to allow mobile device to process the first program with mobile device successful matching, for example, when after peripheral equipment and mobile device successful matching, just show that mobile device can process the first program.Or peripheral equipment can receive the processing request that mobile device sends, to process in request and carry information to be processed, peripheral equipment, according to predefined rule or according to user's selection, judges whether to allow mobile device to process the first program.For example, in peripheral equipment, set in advance and do not allow to install the application of not signing and permitting, when mobile device to install one do not sign license application time, in the processing request of its transmission, can carry the application that the license of not signing will be installed, when peripheral equipment receives after this request, do not allow to install owing to setting in advance, peripheral equipment can return to the response that does not allow installation to mobile device.Or when peripheral equipment receives after the request of processing, user judges whether to allow to process according to processing the information of carrying in request, and is returned and allowed or unallowed response by peripheral equipment.
S22: in the time allowing described the first program to process, indicate described mobile device to process described the first program.
For example, peripheral equipment returns to the response message that allows processing to mobile device, so that mobile device is processed the first program.
When the present embodiment will be processed the first program by mobile device, judge whether to allow, after permission, indicate mobile device processing, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
Fig. 3 is the schematic flow sheet of the authority control method of another embodiment of the present invention proposition, comprising:
S301: start default safety management software.
Wherein, the executive agent of the present embodiment can be mobile device.
The authority of this safety management software is higher than the authority of other programs of system, to can monitor the operation of mobile device to other programs in system.
The mode that can be revised system layer or user and authorized by manufacturer safety management software higher-rights, makes the authority of safety management software higher than the authority of other programs.
In addition, this safety management software can coordinate with other software, for example, as the bodyguard's of Baidu function items, to improve product viscosity and liveness.
S302: safety management software and peripheral equipment are matched to processing.
Wherein, first mobile device can be connected with peripheral equipment, and connection can comprise that peripheral equipment directly inserts in mobile device, or, peripheral equipment is set up wired or wireless connection with mobile device, for example, connects by USB interface, NFC, bluetooth or wifi.
After mobile device and peripheral equipment connect, mobile device can match processing, and for example, mobile device to the periphery accessory sends a request message, and peripheral equipment receives the mark of returning to peripheral equipment after this request message.
Peripheral equipment can independently arrange, and also can be embedded in wearable product.
S303: judge whether successful matching, if so, carry out S305, otherwise, carry out S304.
Wherein, mobile device can by the mark of reception with pre-configured with safety management software the mark of corresponding peripheral equipment compare, if consistent, show successful matching, otherwise be unsuccessful.
S304: finish.
S305: the program that setting will be managed.
For example, the startup of setting software A will be managed, or, set and use some systemic-function item, as camera, GPS etc. will be managed, or, set to install and there is some authority, as the application of reading short message or address list will be managed, or the application that setting installation does not have license signature will be managed.
S306: the processing by safety management software supervisory system to other programs.
S307: judge whether to process the program being managed, if so, carry out S311, otherwise repeat S306 and subsequent step thereof.
For example, in the time will starting software A, be managed owing to starting software A, therefore can judge and will process the program being managed.Or, again for example, in the time will using camera, owing to using camera to be managed, therefore can judge and will process the program being managed.
S308: judge whether to cancel the program being managed the operation of management, if so, carry out S311, otherwise repeat S306 and subsequent step thereof.
For example, while presetting the startup to software A, be managed, in the time will cancelling the startup of software A in the program being managed, can judge the operation that will cancel to the program being managed management.
S309: judge whether to unload by force safety management software, if so, carry out S310, otherwise repeat S306 and subsequent step thereof.
S310: the system to mobile device sends clear instruction, to remove the user data in the program being managed.
S311: accessory transmission processing request to the periphery, process the information of carrying the operation that will carry out in request.
For example, in processing request, carry the information that will start software A.
S312: receive the processing response that peripheral equipment sends, and judged whether that according to this processing response authority carries out corresponding operating, if so, carry out S313, otherwise carry out S314.
Wherein, peripheral equipment can be according to pre-configured information or according to user's selection, and process the information of carrying in request and judge whether to allow corresponding operating.For example, the request of processing shows to start software A, and peripheral equipment sets in advance and can not start software A, in processing response, can carry the information that shows not have authority, mobile device can be determined the authority that is not activated software A according to this processing response, can not start software A.
S313: carry out respective request operation.
For example, start software A.
S314: prompting lack of competence.
For example, show without operating right to user by the screen of mobile terminal, do not start software A.
The present embodiment is realized control of authority by the cooperation of mobile device and peripheral equipment, because mobile device peripheral equipment is physical separation, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.The present embodiment is higher than the authority of other programs by safety management software is set, and can realize the control of safety management software to other programs, avoids safety management software by other programmed control, improves security.By peripheral equipment being arranged in wearable product, can strengthen the performance of wearable product, and improve user and experience.The present embodiment, by safety management software is coordinated with other softwares, can improve product viscosity and liveness.
Fig. 4 is the structural representation of the permission control device of another embodiment of the present invention proposition, and this device 40 comprises judge module 41 and processing module 42.
Judge module 41, for detection of to will process the first program time, judges whether to allow described the first program to process according to the peripheral equipment setting in advance, and described the first program belongs to the program being managed setting in advance;
This device can be arranged in mobile device, and mobile device can specifically be realized corresponding flow process by security control program is set.Mobile device comprises mobile phone, panel computer etc.
Further, peripheral equipment can independently arrange and also can be embedded in other equipment, for example, be embedded in wearable product such as bracelet of wearable product etc.By peripheral equipment is embedded in wearable product and can be user-friendly to, and strengthen the practicality of wearable product.
Concrete, described judge module 41 specifically for: to the request of described peripheral equipment transmission processing, so that described peripheral equipment judges whether to allow described the first program to process according to described processing request; What receive that described peripheral equipment sends asks corresponding processing response with described processing, comprises the information that described the first program is processed of whether allowing in described processing response.Or,
Described judge module 41 specifically for: after described peripheral equipment successful matching, determine allow described the first program is processed.
Processing module 42, in the time allowing described the first program to process, is processed described the first program.
Wherein, can comprise the processing of the first program: start, pacify loading, unloading or cancel management etc.For example, can set in advance and need to be managed the startup of software A, in the time starting software A, need first to judge according to peripheral equipment so, when peripheral equipment allows just can start while starting software A.Otherwise, show the information that there is no authority processing to user.
Again for example, while setting in advance the startup to some systemic-function item, need to be managed, systemic-function item such as GPS or camera etc., so in the time that user enables camera, first mobile device judges whether to allow to use according to peripheral equipment, in the time judging permission use, just allows user to use camera.
Again for example, also can first judge whether to allow to install in the time that the application of preset content is installed, preset content is for example default access or license signature etc., and default access is reading short message or address list etc. such as.For example, when installing one while thering is the application of reading short message ability on mobile device, can first judge whether to allow to install by peripheral equipment, if do not allowed, can not install.Or, when installing one while thering is no the application of license signature, also first judge whether to allow to install by peripheral equipment, if do not allowed, can not install.
The present embodiment is by judging whether to allow the processing to program according to peripheral equipment, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
Fig. 5 is the structural representation of the permission control device of another embodiment of the present invention proposition, and this device 40 also comprises matching module 43, and matching module 43 is for connecting with described peripheral equipment; Match by described connection and described peripheral equipment, so that after pairing, judge whether to allow described the first program to process according to the peripheral equipment setting in advance.
Peripheral equipment is the equipment that can connect with mobile device, and being connected between peripheral equipment and mobile device can be wired connection or wireless connections.
Concrete, peripheral equipment can be the equipment of direct plugged earphone jack, after peripheral equipment is inserted into earphone jack, connects with mobile device.Or,
Peripheral equipment can being connected by least one foundation in following and mobile device: USB interface, NFC, bluetooth, wifi etc.
After peripheral equipment and mobile device connect, mobile device can also match by this connection and peripheral equipment, to peripheral equipment is carried out to identification.For example, mobile device to the periphery accessory sends a message, peripheral equipment receives the mark of returning to peripheral equipment after this message, and mobile device, in the time that the mark of determining the mark the returned peripheral equipment pre-configured with self is consistent, is determined and the successful matching of peripheral equipment.
This device 40 can also comprise: first arranges module 44, for the program that is managed and corresponding processing item are set, described in the program that is managed comprise at least one program.
For example, the startup of setting software A will be managed, or, set and use some systemic-function item, as camera, GPS etc. will be managed, or, set to install and there is some authority, as the application of reading short message or address list will be managed, or the application that setting installation does not have license signature will be managed.
This device 40 can also comprise: remove module 45, for when unloaded by force, send clear instruction to the system of mobile device, the user data of the program being managed described in described clear instruction is used for removing.
For example, in the time unloading safety management software by force, send clear instruction to the program being managed, to remove the user data in the program being managed.
This device 40 can also comprise: determination module 46, for receiving the processing instruction of user to the first program; When described the first program belongs to the program being managed of described setting, and the described processing instruction processing item corresponding with described the first program be when consistent, determines to detect and will process the first program.
For example, detect and will process program name that the first program comprises processing with default consistent, and the content of processing is consistent with default processing item, for example, preset the startup of management software A, in the time starting software A, show to detect and want process software A, do not belong to and detect and want process software A and work as mounting software A.
The program that described setting is managed and corresponding processing item, comprise at least one in following:
The program that set handling item is managed while being start-up operation, the program being managed when described start-up operation comprises software and/or systemic-function item;
The program that set handling item is managed while being fitting operation, the program being managed when described fitting operation comprises preset content, described preset content comprises default access and/or signature license.
Processing module 42 can be specifically for: described the first program is carried out to the processing of default processing item; Or, described the first program is cancelled to bookkeeping.
For example, start software A or cancel the management to software A.
This device 40 can also comprise: second arranges module 47, and for authority is set, whether described authority, higher than the described program being managed, will process the first program to detect.
The authority of this safety management software is higher than the authority of other programs of system, to can monitor the operation of mobile device to other programs in system.
The mode that can be revised system layer or user and authorized by manufacturer safety management software higher-rights, makes the authority of safety management software higher than the authority of other programs.
The present embodiment is realized control of authority by the cooperation of mobile device and peripheral equipment, because mobile device peripheral equipment is physical separation, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.The present embodiment is higher than the authority of other programs by safety management software is set, and can realize the control of safety management software to other programs, avoids safety management software by other programmed control, improves security.By peripheral equipment being arranged in wearable product, can strengthen the performance of wearable product, and improve user and experience.The present embodiment, by safety management software is coordinated with other softwares, can improve product viscosity and liveness.
Fig. 6 is the structural representation of the permission control device of another embodiment of the present invention proposition, and this device 60 comprises judge module 61 and indicating module 62.
Judge module 61, in the time that mobile device will be processed the first program, judges whether to allow described the first program to process;
In an embodiment, described judge module 61 specifically for: receive the processing request that described mobile device sends, to be described mobile device send detecting after will processing the first program in described processing request; Judge whether to allow described the first program to process according to described processing request.
Further, in described processing request, carry the process information to the first program, described judge module further specifically for: according to predefined rule or user's selection, and the described process information to the first program, judge whether to allow described the first program to process.
In an embodiment, described judge module 61 specifically for: after described mobile device successful matching, determine allow described the first program is processed.
Indicating module 62, in the time allowing described the first program to process, indicates described mobile device to process described the first program.
For example, peripheral equipment returns to the response message that allows processing to mobile device, so that mobile device is processed the first program.
Referring to Fig. 7, this device can also comprise matching module 63, for connecting with described mobile device; Match by described connection and described mobile device, so that after pairing, judge whether to allow described the first program to process.
First peripheral equipment can connect with mobile device, and peripheral equipment can be the equipment of direct plugged earphone jack, after peripheral equipment is inserted into earphone jack, connects with mobile device.Or,
Peripheral equipment can being connected by least one foundation in following and mobile device: USB interface, NFC, bluetooth, wifi etc.
After peripheral equipment and mobile device connect, mobile device can also match by this connection and peripheral equipment, to peripheral equipment is carried out to identification.For example, mobile device to the periphery accessory sends a message, peripheral equipment receives the mark of returning to peripheral equipment after this message, and mobile device, in the time that the mark of determining the mark the returned peripheral equipment pre-configured with self is consistent, is determined and the successful matching of peripheral equipment.
When the present embodiment will be processed the first program by mobile device, judge whether to allow, after permission, indicate mobile device processing, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
Fig. 8 is the structural representation of the authority control system of another embodiment of the present invention proposition, and this system 80 comprises mobile device 81 and peripheral equipment 82.Mobile device 81 can be as shown in Fig. 4 or Fig. 5, and peripheral equipment 82 can be as shown in Fig. 6 or Fig. 7.
When the present embodiment will be processed the first program by mobile device, judge whether to allow, after permission, indicate mobile device processing, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
The embodiment of the present invention also provides a kind of mobile device, and this mobile device comprises housing, processor, storer, circuit board and power circuit, and wherein, circuit board is placed in the interior volume that housing surrounds, and processor and storer are arranged on circuit board; Power circuit, is used to each circuit or the device power supply of mobile device; Storer is for stores executable programs code; Processor moves the program corresponding with executable program code by the executable program code of storing in read memory, for carrying out following steps:
S11 ': detect will process the first program time, judge whether to allow described the first program to process according to the peripheral equipment setting in advance, described the first program belongs to the program being managed setting in advance;
Wherein, the executive agent of the present embodiment can be mobile device, and mobile device can specifically be realized corresponding flow process by security control program is set.Mobile device comprises mobile phone, panel computer etc.
Peripheral equipment is the equipment that can connect with mobile device, and being connected between peripheral equipment and mobile device can be wired connection or wireless connections.
Concrete, peripheral equipment can be the equipment of direct plugged earphone jack, after peripheral equipment is inserted into earphone jack, connects with mobile device.Or,
Peripheral equipment can being connected by least one foundation in following and mobile device: USB interface, NFC, bluetooth, wifi etc.
After peripheral equipment and mobile device connect, mobile device can also match by this connection and peripheral equipment, to peripheral equipment is carried out to identification.For example, mobile device to the periphery accessory sends a message, peripheral equipment receives the mark of returning to peripheral equipment after this message, and mobile device, in the time that the mark of determining the mark the returned peripheral equipment pre-configured with self is consistent, is determined and the successful matching of peripheral equipment.
Further, peripheral equipment can independently arrange and also can be embedded in other equipment, for example, be embedded in wearable product such as bracelet of wearable product etc.By peripheral equipment is embedded in wearable product and can be user-friendly to, and strengthen the practicality of wearable product.
Concrete, judge whether to allow the first program to process and can comprise according to the peripheral equipment setting in advance:
After mobile device and peripheral equipment successfully match, just show to allow the first program to process; Or mobile device and peripheral equipment carry out alternately, judge whether to allow the first program to process according to the response of peripheral equipment.
In addition, detect that first program of processing can be to show to process the first program in the time that program name to be processed is consistent with default title, for example, the default software being managed comprises software A, mounting software A ought be detected so or start software A all to belong to and detect and want process software A.Or, detect to process the first program refer to program name to be processed and processing item consistent with default title and default processing item consistent, for example, preset the startup of management software A, in the time starting software A, show to detect and want process software A, do not belong to and detect and want process software A and work as mounting software A.
S12 ': in the time allowing described the first program to process, described the first program is processed.
Wherein, can comprise the processing of the first program: start, pacify loading, unloading or cancel management etc.For example, can set in advance and need to be managed the startup of software A, in the time starting software A, need first to judge according to peripheral equipment so, when peripheral equipment allows just can start while starting software A.Otherwise, show the information that there is no authority processing to user.
Again for example, while setting in advance the startup to some systemic-function item, need to be managed, systemic-function item such as GPS or camera etc., so in the time that user enables camera, first mobile device judges whether to allow to use according to peripheral equipment, in the time judging permission use, just allows user to use camera.
Again for example, also can first judge whether to allow to install in the time that the application of preset content is installed, preset content is for example default access or license signature etc., and default access is reading short message or address list etc. such as.For example, when installing one while thering is the application of reading short message ability on mobile device, can first judge whether to allow to install by peripheral equipment, if do not allowed, can not install.Or, when installing one while thering is no the application of license signature, also first judge whether to allow to install by peripheral equipment, if do not allowed, can not install.
The present embodiment is by judging whether to allow the processing to program according to peripheral equipment, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
In another embodiment, processor moves the program corresponding with executable program code by the executable program code of storing in read memory, for carrying out following steps:
S301 ': start default safety management software.
Wherein, the executive agent of the present embodiment can be mobile device.
The authority of this safety management software is higher than the authority of other programs of system, to can monitor the operation of mobile device to other programs in system.
The mode that can be revised system layer or user and authorized by manufacturer safety management software higher-rights, makes the authority of safety management software higher than the authority of other programs.
In addition, this safety management software can coordinate with other software, for example, as the bodyguard's of Baidu function items, to improve product viscosity and liveness.
S302 ': safety management software and peripheral equipment are matched to processing.
Wherein, first mobile device can be connected with peripheral equipment, and connection can comprise that peripheral equipment directly inserts in mobile device, or, peripheral equipment is set up wired or wireless connection with mobile device, for example, connects by USB interface, NFC, bluetooth or wifi.
After mobile device and peripheral equipment connect, mobile device can match processing, and for example, mobile device to the periphery accessory sends a request message, and peripheral equipment receives the mark of returning to peripheral equipment after this request message.
Peripheral equipment can independently arrange, and also can be embedded in wearable product.
S303 ': judge whether successful matching, if so, carry out S305 ', otherwise, carry out S304 '.
Wherein, mobile device can by the mark of reception with pre-configured with safety management software the mark of corresponding peripheral equipment compare, if consistent, show successful matching, otherwise be unsuccessful.
S304 ': finish.
S305 ': the program that setting will be managed.
For example, the startup of setting software A will be managed, or, set and use some systemic-function item, as camera, GPS etc. will be managed, or, set to install and there is some authority, as the application of reading short message or address list will be managed, or the application that setting installation does not have license signature will be managed.
S306 ': the processing by safety management software supervisory system to other programs.
S307 ': judge whether to process the program being managed, if so, carry out S311 ', otherwise repeat S306 ' and subsequent step thereof.
For example, in the time will starting software A, be managed owing to starting software A, therefore can judge and will process the program being managed.Or, again for example, in the time will using camera, owing to using camera to be managed, therefore can judge and will process the program being managed.
S308 ': judge whether to cancel the program being managed the operation of management, if so, carry out S311 ', otherwise repeat S306 ' and subsequent step thereof.
For example, while presetting the startup to software A, be managed, in the time will cancelling the startup of software A in the program being managed, can judge the operation that will cancel to the program being managed management.
S309 ': judge whether to unload by force safety management software, if so, carry out S310 ', otherwise repeat S306 ' and subsequent step thereof.
S310 ': the system to mobile device sends clear instruction, to remove the user data in the program being managed.
S311 ': accessory transmission processing request to the periphery, process the information of carrying the operation that will carry out in request.
For example, in processing request, carry the information that will start software A.
S312 ': receive the processing response that peripheral equipment sends, and judged whether that according to this processing response authority carries out corresponding operating, if so, carry out S313 ', otherwise carry out S314 '.
Wherein, peripheral equipment can be according to pre-configured information or according to user's selection, and process the information of carrying in request and judge whether to allow corresponding operating.For example, the request of processing shows to start software A, and peripheral equipment sets in advance and can not start software A, in processing response, can carry the information that shows not have authority, mobile device can be determined the authority that is not activated software A according to this processing response, can not start software A.
S313 ': carry out respective request operation.
For example, start software A.
S314 ': prompting lack of competence.
For example, show without operating right to user by the screen of mobile terminal, do not start software A.
The present embodiment is realized control of authority by the cooperation of mobile device and peripheral equipment, because mobile device peripheral equipment is physical separation, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.The present embodiment is higher than the authority of other programs by safety management software is set, and can realize the control of safety management software to other programs, avoids safety management software by other programmed control, improves security.By peripheral equipment being arranged in wearable product, can strengthen the performance of wearable product, and improve user and experience.The present embodiment, by safety management software is coordinated with other softwares, can improve product viscosity and liveness.
The embodiment of the present invention also provides a kind of peripheral equipment, and this peripheral equipment comprises housing, processor, storer, circuit board and power circuit, and wherein, circuit board is placed in the interior volume that housing surrounds, and processor and storer are arranged on circuit board; Power circuit, is used to each circuit or the device power supply of peripheral equipment; Storer is for stores executable programs code; Processor moves the program corresponding with executable program code by the executable program code of storing in read memory, for carrying out following steps:
S21 ': in the time that mobile device will be processed the first program, judge whether to allow described the first program to process.
Wherein, the executive agent of the present embodiment can be peripheral equipment, and peripheral equipment can independently arrange and also can be embedded in other equipment, for example, be embedded in wearable product such as bracelet of wearable product etc.By peripheral equipment is embedded in wearable product and can be user-friendly to, and strengthen the practicality of wearable product.
First peripheral equipment can connect with mobile device, and peripheral equipment can be the equipment of direct plugged earphone jack, after peripheral equipment is inserted into earphone jack, connects with mobile device.Or,
Peripheral equipment can being connected by least one foundation in following and mobile device: USB interface, NFC, bluetooth, wifi etc.
After peripheral equipment and mobile device connect, mobile device can also match by this connection and peripheral equipment, to peripheral equipment is carried out to identification.For example, mobile device to the periphery accessory sends a message, peripheral equipment receives the mark of returning to peripheral equipment after this message, and mobile device, in the time that the mark of determining the mark the returned peripheral equipment pre-configured with self is consistent, is determined and the successful matching of peripheral equipment.
Peripheral equipment can be directly according to whether judging whether to allow mobile device to process the first program with mobile device successful matching, for example, when after peripheral equipment and mobile device successful matching, just show that mobile device can process the first program.Or peripheral equipment can receive the processing request that mobile device sends, to process in request and carry information to be processed, peripheral equipment, according to predefined rule or according to user's selection, judges whether to allow mobile device to process the first program.For example, in peripheral equipment, set in advance and do not allow to install the application of not signing and permitting, when mobile device to install one do not sign license application time, in the processing request of its transmission, can carry the application that the license of not signing will be installed, when peripheral equipment receives after this request, do not allow to install owing to setting in advance, peripheral equipment can return to the response that does not allow installation to mobile device.Or when peripheral equipment receives after the request of processing, user judges whether to allow to process according to processing the information of carrying in request, and is returned and allowed or unallowed response by peripheral equipment.
S22 ': in the time allowing described the first program to process, indicate described mobile device to process described the first program.
For example, peripheral equipment returns to the response message that allows processing to mobile device, so that mobile device is processed the first program.
When the present embodiment will be processed the first program by mobile device, judge whether to allow, after permission, indicate mobile device processing, realize according to the cooperation of the equipment of mobile device and these two physical separation of peripheral equipment and carried out security control, even if the software on mobile device is by Brute Force, because the permission that still needs peripheral equipment just can be carried out respective handling, the loss causing after can avoiding the single software being arranged on mobile device to be cracked, improve the reliability of control of authority, and do not need networked server, can reduce and use complexity and cost.
It should be noted that, in description of the invention, term " first ", " second " etc. are only for describing object, and can not be interpreted as instruction or hint relative importance.In addition,, in description of the invention, except as otherwise noted, the implication of " multiple " is two or more.
Any process of otherwise describing in process flow diagram or at this or method are described and can be understood to, represent to comprise that one or more is for realizing module, fragment or the part of code of executable instruction of step of specific logical function or process, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by contrary order, carry out function, this should be understood by embodiments of the invention person of ordinary skill in the field.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple steps or method can realize with being stored in software or the firmware carried out in storer and by suitable instruction execution system.For example, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic for data-signal being realized to the logic gates of logic function, there is the special IC of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is can carry out the hardware that instruction is relevant by program to complete, described program can be stored in a kind of computer-readable recording medium, this program, in the time carrying out, comprises step of embodiment of the method one or a combination set of.
In addition, the each functional unit in each embodiment of the present invention can be integrated in a processing module, can be also that the independent physics of unit exists, and also can be integrated in a module two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and also can adopt the form of software function module to realize.If described integrated module realizes and during as production marketing independently or use, also can be stored in a computer read/write memory medium using the form of software function module.
The above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
In the description of this instructions, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or example in conjunction with specific features, structure, material or the feature of this embodiment or example description.In this manual, the schematic statement of above-mentioned term is not necessarily referred to identical embodiment or example.And specific features, structure, material or the feature of description can be with suitable mode combination in any one or more embodiment or example.
Although illustrated and described embodiments of the invention above, be understandable that, above-described embodiment is exemplary, can not be interpreted as limitation of the present invention, and those of ordinary skill in the art can change above-described embodiment within the scope of the invention, amendment, replacement and modification.

Claims (31)

1. an authority control method, is characterized in that, comprising:
Detect will process the first program time, judge whether to allow described the first program to process according to the peripheral equipment setting in advance, described the first program belongs to the program being managed setting in advance;
In the time allowing described the first program to process, described the first program is processed.
2. method according to claim 1, is characterized in that, the peripheral equipment that described basis sets in advance judges whether to allow described the first program to process, and comprising:
To the request of described peripheral equipment transmission processing, so that described peripheral equipment judges whether to allow described the first program to process according to described processing request;
What receive that described peripheral equipment sends asks corresponding processing response with described processing, comprises the information that described the first program is processed of whether allowing in described processing response.
3. method according to claim 1, is characterized in that, the peripheral equipment that described basis sets in advance judges whether to allow described the first program to process, and comprising:
After described peripheral equipment successful matching, determine and allow described the first program to process.
4. according to the method described in claims 1 to 3 any one, it is characterized in that, before the peripheral equipment that described basis sets in advance judges whether that permission is processed described the first program, described method also comprises:
Connect with described peripheral equipment;
Match by described connection and described peripheral equipment, so that after pairing, judge whether to allow described the first program to process according to the peripheral equipment setting in advance.
5. method according to claim 4, is characterized in that, after described successful matching, described method also comprises:
The program that setting is managed and corresponding processing item, described in the program that is managed comprise at least one program.
6. method according to claim 5, is characterized in that, also comprises:
In the time being unloaded by force, send clear instruction to the system of mobile device, described clear instruction is for the user data of the program that is managed described in removing.
7. method according to claim 5, is characterized in that, also comprises:
Receive the processing instruction of user to the first program;
When described the first program belongs to the program being managed of described setting, and the described processing instruction processing item corresponding with described the first program be when consistent, determines to detect and will process the first program.
8. method according to claim 5, is characterized in that, the program that described setting is managed and corresponding processing item comprise at least one in following:
The program that set handling item is managed while being start-up operation, the program being managed when described start-up operation comprises software and/or systemic-function item;
The program that set handling item is managed while being fitting operation, the program being managed when described fitting operation comprises preset content, described preset content comprises default access and/or signature license.
9. according to the method described in claims 1 to 3 any one, it is characterized in that, described processing the first program comprises:
Described the first program is carried out to the processing of default processing item; Or,
Described the first program is cancelled to bookkeeping.
10. according to the method described in claims 1 to 3 any one, it is characterized in that, also comprise:
Authority is set, and whether described authority, higher than the described program being managed, will process the first program to detect.
11. 1 kinds of authority control methods, is characterized in that, comprising:
In the time that mobile device will be processed the first program, judge whether to allow described the first program to process;
In the time allowing described the first program to process, indicate described mobile device to process described the first program.
12. methods according to claim 11, is characterized in that, described in judge whether allow described the first program is processed, comprising:
Receive the processing request that described mobile device sends, to be described mobile device send detecting after will processing the first program in described processing request;
Judge whether to allow described the first program to process according to described processing request.
13. methods according to claim 12, is characterized in that, in described processing request, carry the process information to the first program, described according to described processing request judge whether allow described the first program is processed, comprising:
According to predefined rule or user's selection, and the described process information to the first program, judge whether to allow described the first program to process.
14. methods according to claim 11, is characterized in that, described in judge whether allow described the first program is processed, comprising:
After described mobile device successful matching, determine and allow described the first program to process.
15. according to claim 11 to the method described in 14 any one, it is characterized in that, described method also comprises:
Connect with described mobile device;
Match by described connection and described mobile device, so that after pairing, judge whether to allow described the first program to process.
16. 1 kinds of permission control devices, is characterized in that, comprising:
Judge module, for detection of to will process the first program time, judges whether to allow described the first program to process according to the peripheral equipment setting in advance, and described the first program belongs to the program being managed setting in advance;
Processing module, in the time allowing described the first program to process, processes described the first program.
17. devices according to claim 16, is characterized in that, described judge module specifically for:
To the request of described peripheral equipment transmission processing, so that described peripheral equipment judges whether to allow described the first program to process according to described processing request;
What receive that described peripheral equipment sends asks corresponding processing response with described processing, comprises the information that described the first program is processed of whether allowing in described processing response.
18. devices according to claim 16, is characterized in that, described judge module specifically for:
After described peripheral equipment successful matching, determine and allow described the first program to process.
19. according to claim 16 to the device described in 18 any one, it is characterized in that, also comprises:
Matching module, for connecting with described peripheral equipment; Match by described connection and described peripheral equipment, so that after pairing, judge whether to allow described the first program to process according to the peripheral equipment setting in advance.
20. devices according to claim 19, is characterized in that, also comprise:
First arranges module, for the program that is managed and corresponding processing item are set, described in the program that is managed comprise at least one program.
21. devices according to claim 20, is characterized in that, also comprise:
Remove module, for when unloaded by force, send clear instruction to the system of mobile device, the user data of the program being managed described in described clear instruction is used for removing.
22. devices according to claim 20, is characterized in that, also comprise:
Determination module, for receiving the processing instruction of user to the first program; When described the first program belongs to the program being managed of described setting, and the described processing instruction processing item corresponding with described the first program be when consistent, determines to detect and will process the first program.
23. devices according to claim 20, is characterized in that, the program that described setting is managed and corresponding processing item comprise at least one in following:
The program that set handling item is managed while being start-up operation, the program being managed when described start-up operation comprises software and/or systemic-function item;
The program that set handling item is managed while being fitting operation, the program being managed when described fitting operation comprises preset content, described preset content comprises default access and/or signature license.
24. according to claim 16 to the device described in 18 any one, it is characterized in that, described processing module specifically for:
Described the first program is carried out to the processing of default processing item; Or,
Described the first program is cancelled to bookkeeping.
25. according to claim 16 to the device described in 18 any one, it is characterized in that, also comprises:
Second arranges module, and for authority is set, whether described authority, higher than the described program being managed, will process the first program to detect.
26. 1 kinds of permission control devices, is characterized in that, comprising:
Judge module, in the time that mobile device will be processed the first program, judges whether to allow described the first program to process;
Indicating module, in the time allowing described the first program to process, indicates described mobile device to process described the first program.
27. devices according to claim 26, is characterized in that, described judge module specifically for:
Receive the processing request that described mobile device sends, to be described mobile device send detecting after will processing the first program in described processing request;
Judge whether to allow described the first program to process according to described processing request.
28. devices according to claim 27, is characterized in that, in described processing request, carry the process information to the first program, described judge module further specifically for:
According to predefined rule or user's selection, and the described process information to the first program, judge whether to allow described the first program to process.
29. devices according to claim 26, is characterized in that, described judge module specifically for:
After described mobile device successful matching, determine and allow described the first program to process.
30. according to the device described in claim 26 to 29 any one, it is characterized in that, also comprises:
Matching module, for connecting with described mobile device; Match by described connection and described mobile device, so that after pairing, judge whether to allow described the first program to process.
31. 1 kinds of authority control systems, is characterized in that, comprising:
Device as described in claim 16 to 25 any one; And,
Device as described in claim 26 to 30 any one.
CN201410313120.7A 2014-07-02 2014-07-02 authority control method, device and system Active CN104166818B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410313120.7A CN104166818B (en) 2014-07-02 2014-07-02 authority control method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410313120.7A CN104166818B (en) 2014-07-02 2014-07-02 authority control method, device and system

Publications (2)

Publication Number Publication Date
CN104166818A true CN104166818A (en) 2014-11-26
CN104166818B CN104166818B (en) 2018-01-09

Family

ID=51910627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410313120.7A Active CN104166818B (en) 2014-07-02 2014-07-02 authority control method, device and system

Country Status (1)

Country Link
CN (1) CN104166818B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108990041A (en) * 2017-06-01 2018-12-11 中国移动通信有限公司研究院 A kind of method and apparatus carrying out the setting of major-minor card
WO2020132876A1 (en) * 2018-12-25 2020-07-02 奇安信安全技术(珠海)有限公司 Operation detection method and system, and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014067379A (en) * 2012-09-27 2014-04-17 Canon Inc Device apparatus, and control method and program therefor
CN103744810A (en) * 2013-12-23 2014-04-23 西安酷派软件科技有限公司 Terminal, electronic device and synchronous display system and method
CN103856621A (en) * 2012-12-06 2014-06-11 北京三星通信技术研究有限公司 Method and device for authorization between user devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014067379A (en) * 2012-09-27 2014-04-17 Canon Inc Device apparatus, and control method and program therefor
CN103856621A (en) * 2012-12-06 2014-06-11 北京三星通信技术研究有限公司 Method and device for authorization between user devices
CN103744810A (en) * 2013-12-23 2014-04-23 西安酷派软件科技有限公司 Terminal, electronic device and synchronous display system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108990041A (en) * 2017-06-01 2018-12-11 中国移动通信有限公司研究院 A kind of method and apparatus carrying out the setting of major-minor card
CN108990041B (en) * 2017-06-01 2021-08-06 中国移动通信有限公司研究院 Method and equipment for setting main card and auxiliary card
WO2020132876A1 (en) * 2018-12-25 2020-07-02 奇安信安全技术(珠海)有限公司 Operation detection method and system, and electronic device

Also Published As

Publication number Publication date
CN104166818B (en) 2018-01-09

Similar Documents

Publication Publication Date Title
US11216549B2 (en) Security verification method and device
JP5973346B2 (en) COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM
US20150230044A1 (en) Updating vehicle software using a smartphone
CN106445309B (en) Application download entry display method and device
US11968749B2 (en) Method for installing subscriber profile and electronic device therefor
CN103019755B (en) The wireless program method for down loading of multi-CPU in embedded system
CN101393587A (en) Mobile equipment with security protection function and security protection method thereof
KR20190024169A (en) Method for probiding smart key service and electronic device thereof
CN102426639A (en) Information safety monitoring method and device
CN105493098B (en) Terminal device, method for protecting terminal device, and terminal management server
CN114205364A (en) Data backup method and equipment
CN102368852A (en) Information processing apparatus, information processing method and program
KR102490395B1 (en) Electronic device for sharing a key of external electronic device and method for the same
CN104166818A (en) Authority control method, device and system
KR102545127B1 (en) Electronic device for managing application associated with a key of external electronic device and the method for the same
KR102374828B1 (en) Electronic device transmitting data obtained from an external device based on identification information of a cover device to the cover device and control method thereof
JP6248521B2 (en) Vending machine setting system
CN103052060A (en) Method for improving information security of mobile terminal and mobile terminal
KR20210115452A (en) Method and electronic device for managing at least one device
CN106778297B (en) Application program running method and device and mobile terminal
CN106293324B (en) Vehicle computing system and method for communicating mobile device lock icons
JP6379688B2 (en) Mobile communication terminal, server, information processing system, information processing method, and SIM
CN117082446B (en) Equipment searching and positioning method and related equipment
KR102204053B1 (en) Monitoring system comprising attachable sesnor module
EP3291117B1 (en) Method and device having secure removable modules

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant