CN106559213A - Device management method, equipment and system - Google Patents

Device management method, equipment and system Download PDF

Info

Publication number
CN106559213A
CN106559213A CN201510618086.9A CN201510618086A CN106559213A CN 106559213 A CN106559213 A CN 106559213A CN 201510618086 A CN201510618086 A CN 201510618086A CN 106559213 A CN106559213 A CN 106559213A
Authority
CN
China
Prior art keywords
terminal equipment
active user
device cluster
verified
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510618086.9A
Other languages
Chinese (zh)
Other versions
CN106559213B (en
Inventor
任杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510618086.9A priority Critical patent/CN106559213B/en
Publication of CN106559213A publication Critical patent/CN106559213A/en
Application granted granted Critical
Publication of CN106559213B publication Critical patent/CN106559213B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention discloses a kind of device management method, equipment and system;Method includes:Authentication information of the first terminal equipment in device cluster to the home subscriber of the shared device cluster of device cluster, until each terminal unit in device cluster gets the authentication information of home subscriber;First terminal equipment obtains the request operated for second terminal equipment by first terminal equipment active user;With authentication information of the second terminal equipment based on home subscriber, to first terminal equipment active user, whether the right of attribution with device cluster is verified;To make second terminal equipment higher level operation authority be opened to first terminal equipment active user when being verified, support the remote operation instruction of response first terminal equipment active user.Using the present invention, unified management operation can be carried out to different terminal units, it is ensured that the data safety of terminal unit.

Description

Device management method, equipment and system
Technical field
The present invention relates to the safety control technology of the communications field, more particularly to a kind of device management method, equipment And system.
Background technology
With the intellectuality of equipment (the such as terminal unit such as smart mobile phone, panel computer, notebook computer), People's terminal unit conventional except possessing PC, smart mobile phone etc., also possesses the more diversified intelligence of function Equipment, such as intelligent glasses (Google glasses), intelligent watch (Apple watch) etc., these equipment All have it is powerful intelligent, wherein the personal information of the user that is often stored with, at present, for user gathers around Some multiple terminal devices (such as mobile phone, intelligent watch, intelligent glasses) are particularly the terminal of different vendor and set The ununified administrative protection mechanism of data in standby.
For example, correlation technique use cloud platform account (the cloud platform account of such as Apple companies), by with The mode of the account and password combination at family is depended on come the administrative relationships set up between server and terminal unit Server realizing being managed for the data in the terminal unit to particular vendor (such as Apple companies), First, not all of manufacturer all supports in the form of cloud account service to be managed terminal unit, secondly, Even if all of manufacturer all provides cloud account service, user is also required to take using the cloud Account Logon of different vendor Business device could be realized being managed terminal unit, need to remember multiple different accounts and password, operate numerous Trivial inefficiency, and cloud account is often made with the verification mode of account and password, and safety is difficult to ensure that.
The content of the invention
The embodiment of the present invention provides a kind of device management method, equipment and system, and different terminals can be set It is standby to carry out unified management operation, it is ensured that the data safety of terminal unit.
What the technical scheme of the embodiment of the present invention was realized in:
The embodiment of the present invention provides a kind of device management method, and methods described includes:
First terminal equipment in device cluster shares the authentication of the home subscriber of the device cluster to the device cluster Information, until each terminal unit in the device cluster gets the authentication information of the home subscriber;
The first terminal equipment obtains the first terminal equipment active user and carries out for second terminal equipment The request of operation;
With authentication information of the second terminal equipment based on the home subscriber, whether active user is had The right of attribution of the device cluster is verified;So that the second terminal equipment is made when being verified to described First terminal equipment opens higher level operation authority, supports that the response first terminal equipment active user's is long-range Operational order.
The embodiment of the present invention provides a kind of first terminal equipment, and the first terminal equipment includes:
Shares unit, for the authentication information of the home subscriber of the device cluster is shared to device cluster, until institute State the authentication information that each terminal unit in device cluster gets the home subscriber;
Acquiring unit, for obtaining what first terminal equipment active user was operated for second terminal equipment Request;
Authentication unit, for the authentication information with the second terminal equipment based on the home subscriber, to One terminal unit active user whether verified by the right of attribution with the device cluster;With,
The second terminal equipment is made to open the first terminal equipment active user when being verified senior Operating right, supports the remote operation instruction of the response first terminal equipment active user.
The embodiment of the present invention provides a kind of device cluster system, including first terminal equipment and second terminal equipment are extremely Few two terminal units;Wherein,
The first terminal equipment, for the authentication information of the home subscriber of the device cluster is shared to device cluster, Until each terminal unit in the device cluster gets the authentication information of the home subscriber;
The first terminal equipment, is additionally operable to obtain first terminal equipment active user for second terminal equipment The request for being operated;
The first terminal equipment, is additionally operable to the authentication based on the home subscriber with the second terminal equipment Information, to first terminal equipment active user, whether the right of attribution with the device cluster is verified;
The second terminal equipment, for opening to the first terminal equipment active user when being verified Higher level operation authority, supports the remote operation instruction of the response first terminal equipment active user.
In the embodiment of the present invention, the authentication to user (namely right of attribution of checking user) is realized in device cluster, Operating right to all terminal units in the home subscriber open equipment group of device cluster, home subscriber can pass through Any one station terminal equipment in device cluster carries out the management to other-end equipment and operates, and this just can be effective Ensure the data safety of terminal unit, for example, can be erased by Remote management operations when terminal unit is lost Data, it is to avoid the situation that the data in the terminal unit lost are cracked;Equipment is relied on to the authentication of user Co-verification between group is realized, that is, the authentication to user is realized inside device cluster, it is not necessary to relied on Particular server so as to be easy in different application scenarios realize and save implementation cost.
Description of the drawings
Fig. 1 is the schematic diagram of a scenario one of equipment control in the embodiment of the present invention;
Fig. 2 is the schematic diagram of a scenario two of equipment control in the embodiment of the present invention;
Fig. 3 is the flowchart one of equipment control in the embodiment of the present invention;
Fig. 4 is the flowchart two of equipment control in the embodiment of the present invention;
Fig. 5 is the flowchart three of equipment control in the embodiment of the present invention;
Fig. 6 is the flowchart four of equipment control in the embodiment of the present invention;
Fig. 7 is the operation chart one of equipment control in the embodiment of the present invention;
Fig. 8 is the operation chart two of equipment control in the embodiment of the present invention;
Fig. 9 is the flowchart five of equipment control in the embodiment of the present invention;
Figure 10 is the structural representation of first terminal equipment in the embodiment of the present invention;
Figure 11 is the structural representation of device cluster in the embodiment of the present invention.
Specific embodiment
Below in conjunction with drawings and Examples, the present invention will be described in further detail.It should be appreciated that herein Described specific embodiment only to explain the present invention, is not intended to limit the present invention.
The embodiment of the present invention records a kind of device management method, and can apply to be made up of terminal unit sets In standby group, above-mentioned terminal unit can be smart mobile phone, panel computer or Wearable (such as Brilliant Eyes Mirror, intelligent watch etc.), can also be intelligent automobile, intelligent appliance (such as intelligent refrigerator, intelligent battery, machine Top box etc.);The operating system of smart mobile phone can be Android operation system, IOS or other are any The operation system that micro-computer architecture (at least including processor and internal memory) can be run on of third party's exploitation System (such as mobile edition linux system, blackberry QNX operating system etc.).
Terminal unit in device cluster can with built-in various communication modules to support the communication between terminal unit, Such as near-field communication (NFC) module, bluetooth communication, infrared communication module, WiFi communication module, honeybee Nest communication module (supports logical under various standards such as CDMA/WCDMA/TD-SCDMA under 2/3/4G Letter);When the terminal unit in device cluster needs to be communicated with target terminal equipment, closely can lead to Detect whether in the effective range of letter can with target terminal equipment carry out closely mode communication (as bluetooth, WiFi, by taking WiFi as an example, can be by sending echo request message to target terminal equipment, if received The packet that target terminal equipment is returned, then show in the range of in-plant efficient communication);If near Terminal unit is not detected in the effective range of distance, then can be based on telecommunication mode (as honeycomb leads to Letter) communicate with the foundation of target terminal equipment.
Exemplarily, set up in the mode of communication connection between the terminal unit in a kind of device cluster, for Each terminal unit in device cluster, can prestore the communication identifier of other-end equipment in device cluster (such as IP address, Bluetooth pairing information in separate tP address, LAN, the movement for carrying out needed for cellular communication Platform ISDN number), communication identifier of the terminal unit based on other-end equipment in device cluster directly with target end End equipment is set up and is communicated to connect, and can be based on short-range communication connection, remotely leads to during foundation communication The sequencing of letter connection is attempted setting up communication connection with target terminal equipment, is ensureing message transmission rate Under the premise of, moreover it is possible to ensure between terminal unit, can always set up communication connection.
One example is as shown in figure 1, smart mobile phone 100, intelligent watch 200, intelligent glasses 300, notes This computer 400, panel computer 500 collectively form device cluster, smart mobile phone 100, notebook computer 200 Set up with target terminal equipment with communication identifier of the panel computer 500 based on the respective target terminal equipment safeguarded Communication, when smart mobile phone 100 is expected to set up communication connection with the other equipment in device cluster, can be based on The communication identifier of the locally stored other equipment of smart mobile phone 100 directly sets up communication link with target terminal equipment Connect, intelligent watch 200, intelligent glasses 300 are covered by same WiFi network with smart mobile phone 100, because The short-range communication connection that this can be set up between terminal unit when attempting and setting up short-range communication connection, just The process (as copied) of big data is carried out between terminal unit;Notebook computer 400, panel computer 500 Not with smart mobile phone 100 in identical WiFi network, and notebook computer 400, panel computer 500 Bluetooth communication when being also not turned on, smart mobile phone 100 is attempted and notebook computer 400, flat board electricity Brain 500 sets up short-range communication connection failure, so attempt setting up cellular communication connection (such as 2G, 3G or 4G connects);Certainly, in practical application, smart mobile phone 100 can arrange the maximum for attempting setting up communication connection The interval time of communication connection is set up in number of times and trial, for example, attempting setting up with notebook computer 400 In-plant communication connection is continuous to fail 10 times, then show that notebook computer 400 is not presently within and closely lead to In the effective range of letter, and then set up long-range based on the communication identifier of the telecommunication of notebook computer 400 Communication connection.
Exemplarily, set up in the mode of communication between the terminal unit in another kind of device cluster, device cluster In terminal unit in the mark of other-end equipment that is only stored with device cluster, needing and target terminal During equipment communication, communication identifier of the mark based on target terminal equipment to server request target terminal equipment (can for example include the communication identifier of the communication identifier and telecommunication of short-range communication), and based on clothes The mark of the target terminal equipment that business device is returned is set up with target terminal equipment and is communicated, and certainly, is setting up communication During can based on short-range communication connection, telecommunication connect sequencing attempt and target terminal Equipment sets up communication connection, on the premise of message transmission rate is ensured, moreover it is possible to ensure total between terminal unit It is to set up communication connection;Mark of the server based on terminal unit is set and safeguards corresponding communication identifier, Can the terminal unit of device cluster communication identifier change when immediate updating, such terminal unit set up connect The newest communication identifier of target terminal equipment can be got when connecing from server, it is to avoid expect to initiate communication Terminal unit local maintenance communication identifier it is easily expired, and then lead to not and target terminal equipment is set up and connected The problem for connecing.
One example is as shown in Fig. 2 smart mobile phone 100, intelligent watch 200, intelligent glasses 300, notes This computer 400, panel computer 500 collectively form device cluster, smart mobile phone 100, notebook computer 200 Set up with target terminal equipment with communication identifier of the panel computer 500 based on the respective target terminal equipment safeguarded Communication, when smart mobile phone 100 is expected to set up communication connection with the other equipment in device cluster, from server 600 communication identifiers for obtaining other equipment in device cluster are directly set up with target terminal equipment and are communicated to connect, intelligence Energy wrist-watch 200, intelligent glasses 300 are covered by same WiFi network with smart mobile phone 100, therefore are being tasted The short-range communication connection that can be set up between terminal unit when short-range communication connects is set up in examination, is easy to terminal The process (as copied) of big data is carried out between equipment;Notebook computer 400, panel computer 500 not with intelligence Energy mobile phone 100 is in identical WiFi network, and notebook computer 400, the indigo plant of panel computer 500 When tooth communication module is also not turned on, smart mobile phone 100 is attempted and notebook computer 400, panel computer 500 Short-range communication connection failure is set up, and then attempts setting up cellular communication connection (as 2G, 3G or 4G connect Connect);Certainly, in practical application smart mobile phone 100 can arrange attempt set up communication connection maximum times, And attempt setting up the interval time of communication connection, for example attempting setting up closely with notebook computer 400 Communication connection continuously failure 10 times, then show that notebook computer 400 is not presently within having for short-range communication In the range of effect, and then telecommunication company is set up based on the communication identifier of the telecommunication of notebook computer 400 Connect.
Terminal unit in device cluster is often possible to have multiple user (such as intelligent television, panel computer), But user's only one of which that the equipment in device cluster is truly belonged to, in order to define in device cluster The right to use and the right of attribution of terminal unit, the right of attribution is with the height operated to the terminal unit in device cluster Level authority (the highest operating right namely root authority in such as Android device, highest operation in Fructus Mali pumilae equipment AppID account authorities bound in authority namely Fructus Mali pumilae equipment, in notebook computer, highest operating right is as managed Reason person's authority).
Referring to the device management method shown in Fig. 3, when a terminal unit in device cluster, (correspondence first is eventually End equipment) when the authentication information of the user belonged to by device cluster is got, based on whole in above-mentioned device cluster The communication mode of end equipment, to the authentication information of the home subscriber of the shared device cluster of device cluster, until device cluster In each terminal unit get the authentication information (step 101) of home subscriber, the terminal in device cluster Effective voucher of the equipment using the authentication information safeguarded as home subscriber, for authentication information cannot be submitted to User then not with the right of attribution to equipment, of course, it is possible to have the right to use (or also have the right to use, Domestic environment is entirely located according to the need setting, such as terminal unit in device cluster of practical application scene In, although device cluster only one of which home subscriber, but to can not submit in domestic environment authentication information its His member can distribute the right to use);
Exemplarily, an embodiment of the authentication information of home subscriber is shared in terminal unit in device cluster In, terminal unit (correspondence first terminal equipment) can be based in the communication identifier and device cluster for being stored Other-end equipment sets up the authentication information that communication connection sends home subscriber;Alternatively, in order to ensure user Authentication information transmission safety, each terminal unit in first terminal equipment and device cluster carries out two-way Certification, so that first terminal equipment and second terminal equipment carry out two-way authentication as an example, first terminal equipment is to the Two terminal units send the key for making an appointment with second terminal equipment, if the key and second terminal The cipher key match preserved in equipment, then certification success of the second terminal equipment to first terminal equipment, second eventually End equipment continues to first terminal equipment to send the key made an appointment with first terminal equipment, if the key With the cipher key match preserved in first terminal equipment, then it is double between first terminal equipment and second terminal equipment Complete to certification, secure connection is set up after the completion of two-way authentication;The authentication of the home subscriber of device cluster is believed Breath is encrypted to process with integrity protection and sent to the terminal for completing two-way authentication by secure connection and is set It is standby, encryption here can using symmetrically or non-symmetrically cipher mode (can the agreement in device cluster in advance, Avoid by the probability of Brute Force), so-called integrity protection refers to that scanning obtains the numeral of authentication information and plucks Will, for example digital digest can (MD5, Message-Digest Algorithm be 5) using Message-Digest Algorithm 5 Authentication information is calculated and is obtained, when the terminal unit in device cluster receives home subscriber by secure connection Also authentication information is scanned after authentication information and obtains digital digest, if with first terminal equipment by peace The digital digest matching of full linkup transmit, the then authentication information for judging home subscriber be not modified thus be It is believable.
By taking the device cluster shown in Fig. 1 as an example, it is assumed that the terminal unit in device cluster all belongs to user 1, Smart mobile phone 100 gets the authentication information of the biological information as home subscriber of user 1, such as fingerprint, Palmmprint, iris, vocal print and face etc., can be combined with user 1 submission personal information information such as name, Birthday, address, occupational information etc. lifted as authentication information, further authentication information as user 1 with Card credibility and safety, lifting crack difficulty;
After smart mobile phone 100 gets the authentication information of the submission of user 1, can be based on the pen for being stored Remember the communication identifier of this computer 200, panel computer 500, notebook computer 400 and panel computer 500, with Different communication connection correspondence between other-end equipment in device cluster sends acquired authentication information;Can Selection of land, the other-end equipment in device cluster carry out safety and integrity after authentication information is received Verification, verify successfully it is rear to smart mobile phone 100 transmission acknowledgement information, if smart mobile phone 100 is being expected The acknowledgment message that the transmission of other-end equipment is not received in time can then retransmit authentication information, until receiving really Receive message or determine that other-end equipment is unreachable after sending times reach predetermined value.
Exemplarily, another embodiment party for sharing the authentication information of home subscriber in terminal unit in device cluster In formula, terminal unit (correspondence first terminal equipment) can be based on the other-end in the device cluster for being stored The mark of equipment, obtains corresponding communication identifier from server, to build with the other-end equipment in device cluster The vertical authentication information (can be with using encrypted transmission mode) for communicating to connect and sending home subscriber;Illustrated with Fig. 2 Device cluster as a example by, it is assumed that the terminal unit in device cluster all belongs to user 1, and smart mobile phone 100 is obtained Get the authentication information of the biological information as home subscriber of user 1, such as fingerprint, palmmprint, iris, Vocal print and face etc., can be combined with user 1 submission personal information information for example name, the birthday, address, Occupational information etc. further lifts authentication information as the voucher credibility and peace of user 1 as authentication information Quan Xing, lifting crack difficulty;
After smart mobile phone 100 gets the authentication information of the submission of user 1, stored pen can be passed through Remember the communication identifier of this computer 200, panel computer 500, notebook computer 400 and panel computer 500, from The correspondence of server 600 obtains communication identifier, is set up with the other-end equipment in device cluster based on communication identifier Communicate to connect and acquired authentication information is sent with correspondence;Alternatively, the other-end equipment in device cluster exists Safety and the verification of integrity are carried out after receiving authentication information, backward smart mobile phone successfully is verified 100 send acknowledgement information, if smart mobile phone 100 does not receive other-end equipment within the scheduled time and sends out The acknowledgment message sent can then retransmit authentication information, until receiving acknowledgment message, or reach predetermined in sending times Determine after value that other-end equipment is unreachable.
When there is the demand operated to the terminal unit in device cluster in the home subscriber of device cluster, can be with base (referred to as present terminal equipment, corresponds to first eventually to member terminal equipment in the device cluster currently held End equipment), submit to target terminal equipment (correspondence second terminal equipment, user's desired operation in device cluster Terminal unit) request that operated, present terminal equipment (first terminal equipment) gets first terminal Equipment active user (referred to as active user, namely user to be verified) is for other-end equipment ( Two terminal units) request (step 102) that operated, due to the terminal unit in now device cluster also not Confirm whether active user has the right of attribution of device cluster, therefore active user is not with to the end in device cluster The super-ordinate right operated by end equipment;In order to verify whether active user has the right of attribution of device cluster, when Front terminal unit (first terminal equipment) is tieed up based on respective with target terminal equipment (second terminal equipment) Whether the authentication information of the home subscriber of shield, there is the right of attribution of device cluster to be verified (step active user It is rapid 103);When being verified, target terminal equipment confirms home subscriber of the active user for device cluster, to Present terminal equipment sends and confirms that the right of attribution of active user confirms message, and active user can not hold mesh In the case of mark terminal unit, it is connected to target with target terminal communication between devices via present terminal equipment Terminal unit assigns remote operation instruction, completes the operation management to target terminal equipment.
Referring to Fig. 4, exemplarily, set with target terminal as present terminal equipment (first terminal equipment) Whether standby (second terminal equipment) has the embodiment party verified by the right of attribution of device cluster to active user Whether formula, authentication information of the present terminal equipment based on home subscriber possess the ownership of device cluster to active user When power carries out the first level verification (step 201), compare the authentication information and home subscriber of active user's submission Authentication information, if consistent, the first order is verified;Set to target terminal when the first order is verified Preparation send the authentication information (step 202) that the first instruction and active user submit to, the response of target terminal equipment First instruction, the right of attribution for whether possessing device cluster to active user carry out the second level verification (step 203), Other letters of active user as authentication information includes the biological information of active user, can also be included Breath such as personal information information etc., therefore the second level verification and the first level verification can respectively in authentication information Checking flow process is verified and saved to partial information, and such as the first level verification is used for the biology for verifying active user Characteristic information, the second level verification are used for the personal information information for verifying user;Certainly, the first level verification and Second verification intactly can also be verified to the authentication information of active user respectively;Target terminal equipment exists The home subscriber that active user is the device cluster is determined when the second level is verified, is that active user opens height Level operating right (step 204), it is alternatively possible to send to present terminal equipment open higher level operation authority Confirm message (step 205), the remote operation instruction that active user can subsequently be submitted to by present terminal equipment Send to target terminal equipment (step 206), to perform remote operation instruction (step by target terminal equipment 207), alternatively, when being finished, target terminal equipment sends instruction execution result to present terminal equipment Message (step 208), realizes remote operation of the active user to target terminal equipment.
Referring to Fig. 5, exemplarily, as present terminal equipment with target terminal device authentication active user it is Another embodiment that the no right of attribution with device cluster is verified, present terminal equipment are based on home subscriber Authentication information when being verified (step 301) to the right of attribution whether active user possesses device cluster, than Whether the authentication information submitted to active user is consistent with the authentication information of home subscriber, verifies if consistent Pass through, when being verified, the authentication that the second instruction and active user submit to is sent to target terminal equipment Information (step 302, the second instruction are to distinguish with the aforesaid first instruction), the second instruction indicates present terminal Equipment passes through to current user authentication, can open higher level operation authority to active user, so that target terminal Equipment response second is instructed, and opens higher level operation authority (step 303) to active user, that is to say, that mesh Present terminal equipment in device cluster is identified as testing for credible equipment, i.e. present terminal equipment by mark terminal unit Card result is credibly, so as to without the need for being verified again to save checking flow process to active user;Alternatively, Target terminal equipment can send to present terminal equipment and open higher level operation authority confirmation message (step 304), present terminal equipment subsequently can send the remote operation instruction that active user submits to target terminal Equipment (step 305), to perform remote operation instruction (step 306) by target terminal equipment, alternatively, When being finished, target terminal equipment sends instruction execution result message (step to present terminal equipment 307), realize remote operation of the active user to target terminal equipment.
Referring to Fig. 6, exemplarily, as present terminal equipment with target terminal device authentication active user it is Another embodiment that the no right of attribution with device cluster is verified, present terminal equipment get current use During the request of the operation target terminal equipment that family is submitted to, the 3rd is sent to target terminal equipment and instructed and current The authentication information (step 401) that user submits to, authentication information of the target terminal equipment based on home subscriber is to working as Whether front user possesses the right of attribution of the device cluster is verified (step 402), when being verified to institute State active user and open higher level operation authority (step 403), it is alternatively possible to send to present terminal equipment Open higher level operation authority confirms message (step 404), and active user can subsequently be carried by present terminal equipment The remote operation instruction of friendship is sent to target terminal equipment (step 405), remote to be performed by target terminal equipment Journey operational order (step 406), alternatively, when being finished, target terminal equipment is to present terminal equipment Instruction execution result message (step 407) is sent, remote operation of the active user to target terminal equipment is realized.
Exemplarily, as it was previously stated, present terminal equipment is set with whether target terminal device authentication user has The right of attribution of standby group has three kinds of verification modes, including:1), present terminal equipment carries out the first order and tests mode Card, target terminal equipment carries out the second level verification, as present terminal equipment and target terminal equipment all can be right Active user carries out verifying that therefore safety is senior;Mode 2), in present terminal equipment and target terminal equipment One active user is verified, safety be less than mode 1, but checking flow process can be saved;
Verify active user when can be optionally above-mentioned a kind of verification mode;Alternatively, present terminal sets It is standby to determine whether active user is had with target terminal equipment based on the trusted grade of target terminal equipment The verification mode verified by the right of attribution for having device cluster;Present terminal equipment can in advance with device cluster in Other-end equipment carries out mutual trust certification respectively, to determine trusted of other-end equipment in device cluster etc. Level, the trusted grade of terminal unit are related to following:Terminal unit adds the duration of device cluster;Terminal sets The standby number of times communicated with present terminal device history;When the trusted grade of target terminal equipment is less than expected During trusted grade, can with by the way of safer 1, when target terminal equipment trusted grade not During less than expected trusted grade, can be with employing mode 2 saving checking flow process.
Two typical scenes are given below to illustrate remotely control target terminal equipment.
1) in Fig. 1, user only held smart mobile phone at 1 (home subscriber 1 of device cluster) current time to scene 100, although and intelligent watch 200 in the environment that user 1 is presently in, user 1 is not intended to not Look on the premise of intelligent watch 200 (or being possible to temporarily find intelligent watch 200) to intelligence Wrist-watch 200 is operated, and such as deletes significant data or lookup information etc..
As shown in fig. 7, in 100 display device group of smart mobile phone other-end equipment mark, for current User chooses the terminal unit for being desired with operating, when active user's determination needs to operate intelligent watch 200, Smart mobile phone 100 obtain active user authentication information, and with intelligent watch 200 using it is aforesaid either one Formula is verified to active user, and when being verified, smart mobile phone 100 can be presented to intelligent watch 200 Operation interface, as shown in figure 8, intelligent watch 200 for example can be shown on the screen of smart mobile phone 100 Desktop, so that user is operated to intelligent glasses 300, as intelligent glasses 300 are opened to active user Super-ordinate right is put, therefore the operation that active user is carried out to intelligent glasses 300 by smart mobile phone 100 is not By user's Permission Constraints.
2) user currently holds smart mobile phone 100 to scene, panel computer 500 out of doors during use accidentally Lose, cause personal important information to reveal to avoid the data in panel computer from maliciously being cracked, 1 phase of user The data that prestige is erased in panel computer 500.
The mark of other-end equipment in 100 display device group of smart mobile phone, wishes so that active user chooses The terminal unit for being operated, when active user's determination needs to operate panel computer 500, smart mobile phone 100 The authentication information of active user is obtained, and aforesaid either type is adopted to active user with panel computer 500 Verified, when being verified, smart mobile phone 100 can be presented the operation interface to panel computer 500, The desktop of intelligence panel computer 500 can be shown on the screen of smart mobile phone 100 for example, so that user is to flat Plate computer 500 carries out data erasing operation, as panel computer 500 has opened super-ordinate right to active user, Therefore user's Permission Constraints are not received in the operation that active user is carried out to panel computer 500.
Present terminal equipment is to, after being verified of active user, supporting user via present terminal equipment Remote operation is carried out to target terminal equipment (second terminal equipment), referring to Fig. 9, subsequently, if currently User also ask to device cluster in the request that operated of another target terminal equipment (third terminal equipment) (step 501), history checking record of the present terminal equipment based on the active user for being stored is (in device cluster Equipment can support for multiple users use, that is, terminal unit can for multiple users distribute the right to use, But only home subscriber has the right of attribution of terminal unit), whether judge with target terminal equipment once to current User is verified (step 502), if passed through, shows active user with the ownership to device cluster Power, then send the 4th instruction (step 504) to another target terminal equipment of active user's desired operation, separately One target terminal equipment opens higher level operation authority (step 505), alternatively, another target to active user Terminal unit can send to present terminal equipment and open higher level operation authority confirmation message (step 506), when Front terminal unit subsequently can send the remote operation instruction that active user submits to another target terminal equipment (step 507), to perform remote operation instruction (step 508) by another target terminal equipment, so as to reach The purpose of checking flow process is saved, alternatively, another target terminal equipment is set to present terminal when being finished Preparation send instruction execution result message (step 509), realizes long-range behaviour of the active user to target terminal equipment Make;
If present terminal equipment is verified to active user with target terminal equipment not passing through, with another end Authentication information of the end equipment based on home subscriber, to active user, whether the right of attribution with device cluster is tested Card (step 503), verification process are identical with the verification process of target terminal equipment with aforementioned present terminal equipment, When being verified, another terminal unit opens higher level operation authority (step 505) to active user, alternatively, Another target terminal equipment can send to present terminal equipment and open higher level operation authority confirmation message (step 506), present terminal equipment subsequently can send the remote operation instruction that active user submits to another target Terminal unit (step 507), to perform remote operation instruction (step 508) by another target terminal equipment, So as to reach save checking flow process purpose, alternatively, when being finished another target terminal equipment to work as Front terminal unit sends instruction execution result message (step 509), realizes active user to target terminal equipment Remote operation.
Referring to Figure 10, the embodiment of the present invention also states that a kind of first terminal equipment 700, including:
Shares unit 710, the authentication information of the home subscriber for sharing device cluster in device cluster, until Each terminal unit in device cluster gets the authentication information of home subscriber;Acquiring unit 720, is used for Active user is obtained for second terminal equipment (namely active user expects to carry out remote-operated target device) The request for being operated;Authentication unit 730, believes for the authentication with second terminal equipment based on home subscriber Breath, to active user, whether the right of attribution with device cluster is verified;So that second is made when being verified Terminal unit opens higher level operation authority to active user, supports the remote operation instruction of response active user.
Exemplarily, authentication unit 730 includes:First order authentication module, for the mirror based on home subscriber Whether power information possesses the right of attribution of device cluster to active user carries out the first level verification;Second level authentication module, Instruct for sending first to second terminal equipment when the first order is verified, first instructs for indicating to work as The authentication information that front user submits to, is returned with indicating whether second terminal equipment possesses device cluster to active user Category power carries out the second level verification, and opens higher level operation authority to active user when the second level is verified.
Exemplarily, whether authentication unit 730 is additionally operable to the authentication information based on home subscriber to active user The right of attribution for possessing device cluster is verified;When being verified, when being verified to second terminal equipment Send second to instruct, second instructs for indicating that second terminal equipment opens higher level operation authority to active user.
Exemplarily, authentication unit 730 is additionally operable to send the 3rd instruction, the 3rd instruction to second terminal equipment For indicating whether authentication information of the second terminal equipment based on home subscriber possesses device cluster to active user The right of attribution is verified, when being verified to active user's opening higher level operation authority.
Exemplarily, acquiring unit 720, be additionally operable to obtain active user for third terminal equipment (namely Active user expects another target terminal equipment for carrying out in remote-operated device cluster) request that operated; Authentication unit 730, if being additionally operable to be verified active user with second terminal equipment, to the 3rd Terminal unit sends the 4th and instructs, and the 4th instructs for indicating that it is senior that third terminal equipment is opened to active user Operating right;Authentication unit 730, is not led to if being additionally operable to verify active user with second terminal equipment Cross, then the authentication information with third terminal equipment based on home subscriber, to active user whether application apparatus group The right of attribution verified;To make third terminal equipment open senior behaviour to active user when being verified Make authority, support the remote operation instruction of response active user.
Exemplarily, authentication unit 730, are additionally operable to carry out mutual trust certification with the terminal unit in device cluster, Determine the trusted grade of the terminal unit in device cluster;Authentication unit 730, is additionally operable to based on determined by Second terminal equipment trusted grade, it is determined that whether there is device cluster to active user with second terminal equipment The verification mode verified by the right of attribution.
Exemplarily, shares unit 710 includes:Link block, for setting with each terminal in device cluster It is standby to carry out two-way authentication, secure connection is set up after the completion of two-way authentication;Sharing module (is connected with link block Connect), for by the authentication information of home subscriber be encrypted and integrity protection process, based on secure connection to Terminal unit sends the authentication information of the home subscriber through encryption and integrity protection.
In practical application, shares unit 710, acquiring unit 720 and authentication unit 730 can be by first terminals Processor, microprocessor (MCU), special IC (ASIC) or logic programmable door in equipment Array (FPGA) is realized.
Referring to Figure 11, the embodiment of the present invention also states that a kind of device cluster system, including at least two terminal units, First terminal equipment 700, second terminal equipment 800 and third terminal equipment 900 3 are only shown in Figure 11 Terminal unit, first terminal equipment 700, second terminal equipment 800 and third terminal equipment constitution equipment group, It is assumed here that the terminal unit that first terminal equipment 700 is active user to be held, second terminal equipment 800 is Active user expects to carry out remote-operated terminal unit, and third terminal equipment 900 is that current user operation is remote Desired remote-operated terminal unit after journey operation second terminal equipment 800.
First terminal equipment 700, the authentication information of the home subscriber for sharing device cluster in device cluster, directly Each terminal unit into device cluster gets the authentication information of home subscriber;
First terminal equipment 700, is additionally operable to acquisition active user and is operated for second terminal equipment 800 Request;
First terminal equipment 700, is additionally operable to the authentication information based on home subscriber with second terminal equipment 800, To active user, whether the right of attribution with device cluster is verified;
Second terminal equipment 800, for higher level operation authority being opened to active user when being verified, Hold the remote operation instruction of response active user.
First terminal equipment 700 is additionally operable to the authentication information based on home subscriber and sets to whether active user possesses The right of attribution of standby group carries out the first level verification;
First is sent to second terminal equipment 800 when the first order is verified to instruct, first instructs for referring to Show the authentication information that active user submits to, to indicate second terminal equipment 800 is set to whether active user possesses The right of attribution of standby group carries out the second level verification, and opens senior behaviour to active user when the second level is verified Make authority.
First terminal equipment 700 is additionally operable to the authentication information based on home subscriber and sets to whether active user possesses The right of attribution of standby group is verified;When being verified, when being verified to second terminal equipment 800 The second instruction is sent, second instructs for indicating that second terminal equipment 800 opens higher level operation power to active user Limit.
First terminal equipment 700 is additionally operable to send the 3rd instruction to second terminal equipment 800, and the 3rd instruction is used Whether device cluster is possessed to active user in instruction authentication information of the second terminal equipment 800 based on home subscriber The right of attribution verified, when being verified to active user open higher level operation authority.
First terminal equipment 700 is additionally operable to obtain what active user was operated for third terminal equipment 900 Request;If being verified to active user with second terminal equipment 800, to third terminal equipment 900 The 4th instruction is sent, the 4th instructs for indicating that third terminal equipment 900 opens higher level operation to active user Authority;Do not passed through if verifying to active user with second terminal equipment 800, with third terminal equipment 900 authentication informations based on home subscriber, to active user, whether the right of attribution of application apparatus group is verified; To make when being verified third terminal equipment 900 open higher level operation authority to active user, support to ring Answer the remote operation instruction of active user.
First terminal equipment 700 is additionally operable to carry out mutual trust certification with the terminal unit in device cluster, determines equipment The trusted grade of the terminal unit in group;The trusted grade based on determined by, it is determined that setting with second terminal Whether standby 800 couples of active users have the verification mode verified by the right of attribution of device cluster.
First terminal equipment 700 is additionally operable to carry out two-way authentication with each terminal unit in device cluster, double Secure connection is set up to after the completion of certification;By the authentication information of home subscriber be encrypted with integrity protection Reason, sends the authentication letter of the home subscriber through encryption and integrity protection based on secure connection to terminal unit Breath.
The embodiment of the present invention also states that a kind of computer-readable medium, can be ROM (for example, read-only storages Device, FLASH memory, transfer device etc.), magnetic storage medium (for example, tape, disc driver etc.), Optical storage medium (for example, CD-ROM, DVD-ROM, paper card, paper tape etc.) and other know The program storage of type;Be stored with computer-readable medium computer executable instructions, works as execute instruction When, cause at least one of first terminal equipment computing device in device cluster to include following operation: The authentication information of the home subscriber of device cluster is shared in device cluster, until each terminal unit in device cluster is equal Get the authentication information of home subscriber;Obtain the request operated for second terminal equipment by active user; With authentication information of the second terminal equipment based on home subscriber, whether there is the ownership of device cluster to active user Power is verified;To make second terminal equipment open higher level operation authority to active user when being verified, Support the remote operation instruction of response active user.
In sum, the equipment in the device cluster that the embodiment of the present invention is recorded can be different vendor's production, and The operating system of the terminal unit operation in device cluster can also be different (such as typical Android system and IOS systems System), only can realize by the account of cloud account and password that server is produced with single manufacturer with correlation technique Terminal unit between administrative relationships compare, the management to terminal unit is more flexible, the end in device cluster End equipment can update (addition, deletion) at any time according to the demand of home subscriber, can realize in equipment Any terminal unit (not differentiating between the operating system of manufacturer and operation) in group carries out remote management, for example, exist Terminal unit erases data to protect privacy of user when losing;
Correlation technique is to rely on specific particular server corresponding with cloud account to verify so as to reality user The terminal unit of existing a certain manufacturer is managed, as long as and the terminal unit in the embodiment of the present invention in device cluster Can be communicated with one another and the right of attribution of user is verified, in realization more flexibly, saved specially Door arranges the cost of server, and the specific node being independent of in device cluster, stability are also higher;
Historical information based on the checking to user to the terminal unit in user's subsequent operation device cluster at Reason, for example, tested when before to being then not required to be verified to save checking flow process again during user's checking success before Checking is re-started to user just during card failure, it is ensured that the safety operated to terminal unit in device cluster.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of said method embodiment can Complete with by the related hardware of programmed instruction, aforesaid program can be stored in an embodied on computer readable and deposit In storage media, the program upon execution, performs the step of including said method embodiment;And aforesaid storage Medium includes:Movable storage device, random access memory (RAM, Random Access Memory), Read only memory (ROM, Read-Only Memory), magnetic disc or CD etc. are various can be with storage program The medium of code.
Or, if the above-mentioned integrated unit of the present invention is realized using in the form of software function module and as independently Production marketing or use when, it is also possible to be stored in a computer read/write memory medium.Based on so Understanding, the part that the technical scheme of the embodiment of the present invention is substantially contributed to correlation technique in other words can To be embodied in the form of software product, the computer software product is stored in a storage medium, bag Include some instructions to use so that a computer equipment (can be personal computer, server or network Equipment etc.) perform all or part of each embodiment methods described of the invention.And aforesaid storage medium bag Include:Movable storage device, RAM, ROM, magnetic disc or CD etc. are various can be with Jie of store program codes Matter.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited to This, any those familiar with the art the invention discloses technical scope in, can readily occur in Change or replacement, should all be included within the scope of the present invention.Therefore, protection scope of the present invention should It is defined by the scope of the claims.

Claims (15)

1. a kind of device management method, it is characterised in that methods described includes:
First terminal equipment in device cluster shares the authentication of the home subscriber of the device cluster to the device cluster Information, until each terminal unit in the device cluster gets the authentication information of the home subscriber;
The first terminal equipment obtains the first terminal equipment active user and carries out for second terminal equipment The request of operation;
With authentication information of the second terminal equipment based on the home subscriber, whether active user is had The right of attribution of the device cluster is verified;So that the second terminal equipment is made when being verified to described First terminal equipment opens higher level operation authority, supports that the response first terminal equipment active user's is long-range Operational order.
2. the method for claim 1, it is characterised in that it is described with second terminal equipment based on described Whether the authentication information of home subscriber, have the right of attribution of the device cluster to first terminal equipment active user Verified, including:
Authentication information of the first terminal equipment based on the home subscriber is current to the first terminal equipment Whether user possesses the right of attribution of the device cluster carries out the first level verification;
First is sent to the second terminal equipment when the first order is verified to instruct, first instruction is used It is in the authentication information for indicating that the second terminal equipment is submitted to based on the first terminal equipment active user, right The right of attribution whether the first terminal equipment active user possesses the device cluster carries out the second level verification, and Higher level operation authority is opened to the first terminal equipment active user when the second level is verified.
3. the method for claim 1, it is characterised in that it is described with second terminal equipment based on described Whether the authentication information of home subscriber, have the right of attribution of the device cluster to first terminal equipment active user Verified, including:
Authentication information of the first terminal equipment based on the home subscriber is current to the first terminal equipment Whether user possesses the right of attribution of the device cluster is verified;
Second is sent to the second terminal equipment when being verified to instruct, described second instructs for indicating The second terminal equipment opens higher level operation authority to the first terminal equipment active user.
4. the method for claim 1, it is characterised in that it is described with second terminal equipment based on described Whether the authentication information of home subscriber, have the right of attribution of the device cluster to first terminal equipment active user Verified, including:
The first terminal equipment sends the 3rd to the second terminal equipment and instructs, and the described 3rd instructs and be used for Indicate that authentication information of the second terminal equipment based on the home subscriber is current to the first terminal equipment Whether user possesses the right of attribution of the device cluster is verified, the first terminal is set when being verified Standby active user opens higher level operation authority.
5. the method for claim 1, it is characterised in that methods described also includes:
The first terminal equipment obtains the first terminal equipment active user and carries out for third terminal equipment The request of operation;
If being verified to the first terminal equipment active user with the second terminal equipment, to The third terminal equipment sends the 4th and instructs, and the described 4th instructs for indicating the third terminal equipment pair The first terminal equipment active user opens higher level operation authority;
Do not passed through if verifying to the first terminal equipment active user with the second terminal equipment, With authentication information of the third terminal equipment based on the home subscriber, it is current to the first terminal equipment Whether user is verified using the right of attribution of the device cluster;So that the described 3rd is made when being verified eventually End equipment opens higher level operation authority to the first terminal equipment active user, supports response described first eventually The remote operation instruction of end equipment active user.
6. the method for claim 1, it is characterised in that methods described also includes:
The first terminal equipment carries out mutual trust certification with the terminal unit in the device cluster, it is determined that described set The trusted grade of the terminal unit in standby group;
The second terminal equipment trusted grade based on determined by, it is determined that with the second terminal equipment pair Whether the first terminal equipment active user has the authentication verified by the right of attribution of the device cluster Formula.
7. the method as described in any one of claim 1 to 6, it is characterised in that methods described also includes:
The first terminal equipment carries out two-way authentication with each terminal unit in the device cluster, two-way Secure connection is set up after the completion of certification;
The authentication information of the home subscriber is encrypted and integrity protection process, is connected based on the safety Connect to the terminal unit and send the authentication information of the home subscriber through encryption and integrity protection.
8. a kind of first terminal equipment, it is characterised in that the first terminal equipment includes:
Shares unit, for the authentication information of the home subscriber of the device cluster is shared to device cluster, until institute State the authentication information that each terminal unit in device cluster gets the home subscriber;
Acquiring unit, for obtaining what first terminal equipment active user was operated for second terminal equipment Request;
Authentication unit, for the authentication information with the second terminal equipment based on the home subscriber, to One terminal unit active user whether verified by the right of attribution with the device cluster;With,
The second terminal equipment is made to open the first terminal equipment active user when being verified senior Operating right, supports the remote operation instruction of the response first terminal equipment active user.
9. first terminal equipment as claimed in claim 8, it is characterised in that the authentication unit includes:
First order authentication module, for the authentication information based on the home subscriber to the first terminal equipment Whether active user possesses the right of attribution of the device cluster carries out the first level verification;
Second level authentication module, for sending first to the second terminal equipment when the first order is verified Instruction, described first instructs for indicating that the second terminal equipment is currently used based on the first terminal equipment Whether the authentication information that family is submitted to, possess the ownership of the device cluster to the first terminal equipment active user Power carries out the second level verification, and the first terminal equipment active user is opened when the second level is verified Higher level operation authority.
10. first terminal equipment as claimed in claim 8, it is characterised in that
The authentication unit, is additionally operable to the authentication information based on the home subscriber to the first terminal equipment Whether active user possesses the right of attribution of the device cluster is verified;
When being verified, second is sent to the second terminal equipment when being verified and instructed, described the Two instruct for indicating that the second terminal equipment opens higher level operation to the first terminal equipment active user Authority.
11. first terminal equipment as claimed in claim 8, it is characterised in that
The authentication unit, is additionally operable to send the 3rd instruction, the 3rd instruction to the second terminal equipment For indicating authentication information of the second terminal equipment based on the home subscriber to the first terminal equipment Whether active user possesses the right of attribution of the device cluster is verified, when being verified to described first eventually End equipment active user opens higher level operation authority.
12. first terminal equipment as claimed in claim 8, it is characterised in that
The acquiring unit, is additionally operable to obtain the first terminal equipment active user for third terminal equipment The request for being operated;
The authentication unit, if being additionally operable to currently use the first terminal equipment with the second terminal equipment Family is verified, then send the 4th to the third terminal equipment and instruct, and the described 4th instructs for referring to Show that the third terminal equipment opens higher level operation authority to the first terminal equipment active user;
The authentication unit, if being additionally operable to currently use the first terminal equipment with the second terminal equipment Family is verified not pass through, then the authentication information with the third terminal equipment based on the home subscriber, right Whether the first terminal equipment active user is verified using the right of attribution of the device cluster;To test Card by when make the third terminal equipment to the first terminal equipment active user open higher level operation power Limit, supports the remote operation instruction of the response first terminal equipment active user.
13. first terminal equipment as claimed in claim 8, it is characterised in that
The authentication unit, is additionally operable to carry out mutual trust certification with the terminal unit in the device cluster, determines institute State the trusted grade of the terminal unit in device cluster;
The authentication unit, is additionally operable to the trusted grade of the second terminal equipment based on determined by, really It is fixed whether to there is the device cluster to return the first terminal equipment active user with the second terminal equipment The verification mode verified by category power.
The 14. first terminal equipment as described in any one of claim 8 to 13, it is characterised in that described point Enjoying unit includes:
Link block, for carrying out two-way authentication with each terminal unit in the device cluster, recognizes two-way Secure connection is set up after the completion of card;
Sharing module, for the authentication information of the home subscriber is encrypted and integrity protection process, The home subscriber through encryption and integrity protection is sent based on the secure connection to the terminal unit Authentication information.
15. a kind of device cluster systems, it is characterised in that include:First terminal equipment and second terminal equipment At least two terminal units;Wherein,
The first terminal equipment, for the authentication information of the home subscriber of the device cluster is shared to device cluster, Until each terminal unit in the device cluster gets the authentication information of the home subscriber;
The first terminal equipment, is additionally operable to obtain first terminal equipment active user for second terminal equipment The request for being operated;
The first terminal equipment, is additionally operable to the authentication based on the home subscriber with the second terminal equipment Information, to first terminal equipment active user, whether the right of attribution with the device cluster is verified;
The second terminal equipment, for opening to the first terminal equipment active user when being verified Higher level operation authority, supports the remote operation instruction of the response first terminal equipment active user.
CN201510618086.9A 2015-09-24 2015-09-24 Equipment management method, equipment and system Active CN106559213B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510618086.9A CN106559213B (en) 2015-09-24 2015-09-24 Equipment management method, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510618086.9A CN106559213B (en) 2015-09-24 2015-09-24 Equipment management method, equipment and system

Publications (2)

Publication Number Publication Date
CN106559213A true CN106559213A (en) 2017-04-05
CN106559213B CN106559213B (en) 2020-06-16

Family

ID=58414227

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510618086.9A Active CN106559213B (en) 2015-09-24 2015-09-24 Equipment management method, equipment and system

Country Status (1)

Country Link
CN (1) CN106559213B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786647A (en) * 2017-10-16 2018-03-09 深圳市合信自动化技术有限公司 A kind of PLC remote device managements method, apparatus and system based on social attribute
CN110362981A (en) * 2019-06-29 2019-10-22 上海淇毓信息科技有限公司 The method and system of abnormal behaviour are judged based on credible equipment fingerprint
CN112235767A (en) * 2020-10-13 2021-01-15 深圳市晨北科技有限公司 Connection management method, device and medium
CN113055340A (en) * 2019-12-26 2021-06-29 华为技术有限公司 Authentication method and device
CN113806723A (en) * 2021-09-27 2021-12-17 三星电子(中国)研发中心 Double-factor authentication method and device
CN113830026A (en) * 2020-06-24 2021-12-24 华为技术有限公司 Equipment control method and computer readable storage medium
CN116232775A (en) * 2023-05-09 2023-06-06 北京天辰信科技有限公司 One-to-many communication method and system based on authority setting

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316282A (en) * 2008-07-07 2008-12-03 深圳华为通信技术有限公司 Terminal long-range control method and correlative devices
US20090077249A1 (en) * 2007-08-07 2009-03-19 Xingwen Chen Method and device for implementing remote control of a terminal
US20100015942A1 (en) * 2007-01-29 2010-01-21 Zte Corporation System and Method for Realizing Remote Control to Terminal Data
CN102957584A (en) * 2011-08-25 2013-03-06 华为终端有限公司 Home network equipment management method, control equipment and home network equipment
CN103618706A (en) * 2013-11-19 2014-03-05 深圳Tcl新技术有限公司 Control system and method for mutual access of intelligent devices
CN103634275A (en) * 2012-08-21 2014-03-12 联想(北京)有限公司 Multi-device management and task migration methods and management server
CN103746812A (en) * 2013-12-30 2014-04-23 迈普通信技术股份有限公司 Access authentication method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100015942A1 (en) * 2007-01-29 2010-01-21 Zte Corporation System and Method for Realizing Remote Control to Terminal Data
US20090077249A1 (en) * 2007-08-07 2009-03-19 Xingwen Chen Method and device for implementing remote control of a terminal
CN101316282A (en) * 2008-07-07 2008-12-03 深圳华为通信技术有限公司 Terminal long-range control method and correlative devices
CN102957584A (en) * 2011-08-25 2013-03-06 华为终端有限公司 Home network equipment management method, control equipment and home network equipment
CN103634275A (en) * 2012-08-21 2014-03-12 联想(北京)有限公司 Multi-device management and task migration methods and management server
CN103618706A (en) * 2013-11-19 2014-03-05 深圳Tcl新技术有限公司 Control system and method for mutual access of intelligent devices
CN103746812A (en) * 2013-12-30 2014-04-23 迈普通信技术股份有限公司 Access authentication method and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786647A (en) * 2017-10-16 2018-03-09 深圳市合信自动化技术有限公司 A kind of PLC remote device managements method, apparatus and system based on social attribute
CN110362981A (en) * 2019-06-29 2019-10-22 上海淇毓信息科技有限公司 The method and system of abnormal behaviour are judged based on credible equipment fingerprint
CN110362981B (en) * 2019-06-29 2022-12-02 上海淇毓信息科技有限公司 Method and system for judging abnormal behavior based on trusted device fingerprint
CN113055340A (en) * 2019-12-26 2021-06-29 华为技术有限公司 Authentication method and device
CN113055340B (en) * 2019-12-26 2023-09-26 华为技术有限公司 Authentication method and equipment
CN113830026A (en) * 2020-06-24 2021-12-24 华为技术有限公司 Equipment control method and computer readable storage medium
CN112235767A (en) * 2020-10-13 2021-01-15 深圳市晨北科技有限公司 Connection management method, device and medium
CN113806723A (en) * 2021-09-27 2021-12-17 三星电子(中国)研发中心 Double-factor authentication method and device
CN116232775A (en) * 2023-05-09 2023-06-06 北京天辰信科技有限公司 One-to-many communication method and system based on authority setting

Also Published As

Publication number Publication date
CN106559213B (en) 2020-06-16

Similar Documents

Publication Publication Date Title
US11937081B2 (en) Quorum-based secure authentication
CN106559213A (en) Device management method, equipment and system
US8819792B2 (en) Assignment and distribution of access credentials to mobile communication devices
CN106134143B (en) Method, apparatus and system for dynamic network access-in management
CN105654580B (en) Access control method and system, electronic lock, management and visitor's terminal
CN104320389B (en) A kind of fusion identity protection system and method based on cloud computing
CN103310169B (en) A kind of method protecting SD card data and protection system
CN107948321A (en) The remote-authorization method and system of vehicle
CN104363207B (en) Multiple-factor strengthens safely authorization and identification method
US9256723B2 (en) Security key using multi-OTP, security service apparatus, security system
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN105282868B (en) System and method for WiFi network to be temporarily added
CN105790957A (en) eSIM card data sharing method and related equipment and system thereof
CN106488453A (en) A kind of method and system of portal certification
CN105337974A (en) Account authorization method, account login method, account authorization device and client end
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN106027475A (en) Secret key obtaining method and identity card information transmission method and system
CN109451496A (en) Connection authentication method and authentication system thereof
CN109685946A (en) Open method, device, equipment and the storage medium of lockset
CN112347188A (en) Authorization and access auditing system and method based on private chain
CN110324820A (en) A kind of Internet of Things safety right appraisal method, system and readable medium
CN109409041A (en) A kind of server-side safety certifying method and system based on the application of more certificates
CN107566112A (en) Dynamic encryption and decryption method and server
US20210243188A1 (en) Methods and apparatus for authenticating devices
CN106713298B (en) A kind of communication means and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant