CN106559213B - Equipment management method, equipment and system - Google Patents

Equipment management method, equipment and system Download PDF

Info

Publication number
CN106559213B
CN106559213B CN201510618086.9A CN201510618086A CN106559213B CN 106559213 B CN106559213 B CN 106559213B CN 201510618086 A CN201510618086 A CN 201510618086A CN 106559213 B CN106559213 B CN 106559213B
Authority
CN
China
Prior art keywords
terminal device
current user
terminal
equipment
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510618086.9A
Other languages
Chinese (zh)
Other versions
CN106559213A (en
Inventor
任杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510618086.9A priority Critical patent/CN106559213B/en
Publication of CN106559213A publication Critical patent/CN106559213A/en
Application granted granted Critical
Publication of CN106559213B publication Critical patent/CN106559213B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a device management method, device and system; the method comprises the following steps: a first terminal device in the device group shares authentication information of an attribution user of the device group with the device group until each terminal device in the device group acquires the authentication information of the attribution user; the method comprises the steps that a first terminal device obtains a request of a current user of the first terminal device for operating a second terminal device; verifying whether the current user of the first terminal equipment has the ownership of the equipment group or not based on the authentication information of the ownership user; and when the verification is passed, the second terminal equipment opens the advanced operation authority to the current user of the first terminal equipment, and the remote operation instruction responding to the current user of the first terminal equipment is supported. By adopting the invention, the unified management operation can be carried out on different terminal equipment, and the data security of the terminal equipment is ensured.

Description

Equipment management method, equipment and system
Technical Field
The present invention relates to security control technologies in the field of communications, and in particular, to a method, device, and system for device management.
Background
Along with the intellectualization of equipment (such as terminal equipment of smart phones, tablet computers, notebook computers and the like), people not only have conventional terminal equipment of PCs, smart phones and the like, but also have intelligent equipment with more diversified functions, such as smart glasses (Google glasses), smart watches (Apple watch) and the like, and the equipment has strong intelligence, wherein private information of users is often stored, and at present, no unified management and protection mechanism exists for data in a plurality of terminal equipment (such as mobile phones, smart watches, smart glasses) owned by users, especially terminal equipment of different manufacturers.
For example, in the related art, a cloud platform account (e.g., a cloud platform account of Apple company) is used, a management relationship between a server and a terminal device is established in a manner of combining an account number and a password of a user, and data in the terminal device of a specific manufacturer (e.g., Apple company) is managed depending on the server.
Disclosure of Invention
The embodiment of the invention provides a device management method, device and system, which can perform unified management operation on different terminal devices and ensure the data security of the terminal devices.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides a device management method, which comprises the following steps:
a first terminal device in a device group shares authentication information of an attribution user of the device group with the device group until each terminal device in the device group acquires the authentication information of the attribution user;
the first terminal equipment acquires a request of a current user of the first terminal equipment for operating the second terminal equipment;
verifying whether the current user has the ownership right of the equipment group or not based on the authentication information of the ownership user; and when the verification is passed, the second terminal device opens the advanced operation authority to the first terminal device, and the remote operation instruction of the current user of the first terminal device is supported to be responded.
An embodiment of the present invention provides a first terminal device, where the first terminal device includes:
the sharing unit is used for sharing the authentication information of the home subscriber of the equipment group with the equipment group until each terminal equipment in the equipment group acquires the authentication information of the home subscriber;
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a request of a current user of first terminal equipment for operating second terminal equipment;
the verification unit is used for verifying whether the current user of the first terminal equipment has the ownership of the equipment group or not based on the authentication information of the ownership user with the second terminal equipment; so that the user can select the required time for the operation,
and when the verification is passed, the second terminal equipment opens advanced operation authority to the current user of the first terminal equipment, and the remote operation instruction of the current user of the first terminal equipment is supported to respond.
The embodiment of the invention provides an equipment group system, which comprises at least two pieces of terminal equipment, namely a first terminal equipment and a second terminal equipment; wherein the content of the first and second substances,
the first terminal device is configured to share the authentication information of the home subscriber of the device group with the device group until each terminal device in the device group acquires the authentication information of the home subscriber;
the first terminal device is also used for acquiring a request of a current user of the first terminal device for operating the second terminal device;
the first terminal device is further configured to verify, with the second terminal device, whether the current user of the first terminal device has the ownership right of the device group based on the authentication information of the ownership user;
and the second terminal device is used for opening advanced operation authority to the current user of the first terminal device when the verification is passed, and supporting the response of a remote operation instruction of the current user of the first terminal device.
In the embodiment of the invention, authentication of users (namely, verification of the ownership of the users) is realized in the equipment group, the operation authority of all terminal devices in the equipment group is opened for the ownership user of the equipment group, and the ownership user can perform management operation on other terminal devices through any terminal device in the equipment group, so that the data safety of the terminal devices can be effectively ensured, for example, when the terminal devices are lost, the data can be erased through remote management operation, and the situation that the data in the lost terminal devices are cracked is avoided; the authentication of the user depends on the cooperative verification among the equipment groups, namely the authentication of the user is realized in the equipment groups, and a specific server is not required, so that the authentication is easily realized in different application scenes, and the implementation cost is saved.
Drawings
FIG. 1 is a first scenario diagram illustrating device management in an embodiment of the present invention;
FIG. 2 is a diagram illustrating a second scenario of device management according to an embodiment of the present invention;
FIG. 3 is a flow chart of a first implementation of device management in an embodiment of the present invention;
FIG. 4 is a flow chart of a second implementation of device management in an embodiment of the present invention;
FIG. 5 is a flow chart of a third implementation of device management in an embodiment of the present invention;
FIG. 6 is a flow chart of a fourth implementation of device management in an embodiment of the present invention;
FIG. 7 is a first diagram illustrating operation of device management in an embodiment of the present invention;
FIG. 8 is a second schematic diagram illustrating the operation of device management in an embodiment of the present invention;
FIG. 9 is a flow chart of a fifth implementation of device management in an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a first terminal device in the embodiment of the present invention;
fig. 11 is a schematic structural diagram of a device cluster according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the invention records an equipment management method, which can be applied to an equipment group formed by terminal equipment, wherein the terminal equipment can be a smart phone, a tablet personal computer or wearable equipment (such as smart glasses, a smart watch and the like), and also can be a smart car and a smart household appliance (such as a smart refrigerator, a smart battery, a set top box and the like); the operating system of the smartphone may be an android operating system, an IOS operating system, or any other operating system developed by a third party and capable of running on a microcomputer structure (including at least a processor and a memory) (e.g., a mobile Linux system, a blackberry QNX operating system, etc.).
Various communication modules can be built in the terminal devices in the device group to support communication between the terminal devices, such as a Near Field Communication (NFC) module, a bluetooth communication module, an infrared communication module, a WiFi communication module, and a cellular communication module (supporting communication under 2/3/4G in various standards, such as CDMA/WCDMA/TD-SCDMA); when the terminal device in the device group needs to communicate with the target terminal device, it may be detected whether the communication in the near field manner with the target terminal device is possible within the effective range of the near field communication (such as bluetooth and WiFi, for example, WiFi, it may be indicated that the communication is within the effective communication range of the near field by sending an echo request message to the target terminal device if receiving a data packet returned by the target terminal device); if no terminal device is detected within a short range of validity, communication can be established with the target terminal device based on a telecommunication means, such as cellular communication.
For example, in a manner of establishing a communication connection between terminal devices in an equipment group, for each terminal device in the equipment group, communication identifiers (such as an independent IP address, an IP address in a local area network, bluetooth pairing information, and an ISDN number of a mobile station required for cellular communication) of other terminal devices in the equipment group may be prestored, the terminal device may directly establish a communication connection with a target terminal device based on the communication identifiers of the other terminal devices in the equipment group, and may attempt to establish a communication connection with the target terminal device based on a sequence of a near field communication connection and a remote field communication connection in a process of establishing communication, and on the premise of ensuring a data transmission rate, it may also be ensured that a communication connection can always be established between terminal devices.
As shown in fig. 1, the smart phone 100, the smart watch 200, the smart glasses 300, the notebook computer 400, and the tablet computer 500 together form a device group, the smart phone 100, the notebook computer 400, and the tablet computer 500 establish communication with a target terminal device based on a communication identifier of the target terminal device that is maintained by the respective device, when the smart phone 100 desires to establish communication connection with other devices in the device group, communication connection can be directly established with the target terminal device based on the communication identifier of the other devices that are locally stored in the smart phone 100, and both the smart watch 200 and the smart glasses 300 and the smart phone 100 are covered by the same WiFi network, so that near field communication connection between the terminal devices can be established when the near field communication connection is attempted to be established, and processing (such as copying) of large data between the terminal devices is facilitated; when the laptop 400 and the tablet computer 500 are not in the same WiFi network as the smartphone 100 and the bluetooth communication modules of the laptop 400 and the tablet computer 500 are not turned on, the smartphone 100 fails to attempt to establish a close-range communication connection with the laptop 400 and the tablet computer 500, and further attempts to establish a cellular communication connection (such as a 2G, 3G or 4G connection); of course, in practical applications, the smartphone 100 may set the maximum number of times of attempting to establish the communication connection and the interval time of attempting to establish the communication connection, for example, if the attempt to establish the short-distance communication connection with the laptop 400 fails for 10 times, it indicates that the laptop 400 is not currently in the effective range of the short-distance communication, and then the remote communication connection is established based on the communication identifier of the long-distance communication of the laptop 400.
Exemplarily, in another way of establishing communication between terminal devices in a device group, only identifiers of other terminal devices in the device group are stored in the terminal devices in the device group, when communication with a target terminal device is needed, a server is requested for a communication identifier of the target terminal device (for example, a communication identifier of near field communication and a communication identifier of remote communication may be included) based on the identifier of the target terminal device, and communication is established with the target terminal device based on the identifier of the target terminal device returned by the server, of course, in the process of establishing communication, communication connection may be attempted to be established with the target terminal device based on a sequence order of the near field communication connection and the remote communication connection, and on the premise of ensuring a data transmission rate, it is also ensured that communication connection can always be established between the terminal devices; the setting server maintains the corresponding communication identification based on the identification of the terminal equipment, and can update the communication identification of the terminal equipment of the equipment group instantly when the communication identification is changed, so that the terminal equipment can acquire the latest communication identification of the target terminal equipment from the server when connection is established, and the problem that the terminal equipment expecting to initiate communication is easy to expire at local maintenance communication identification and further cannot establish connection with the target terminal equipment is avoided.
As shown in fig. 2, the smart phone 100, the smart watch 200, the smart glasses 300, the notebook computer 400, and the tablet computer 500 together form a device group, the smart phone 100, the notebook computer 400, and the tablet computer 500 establish communication with a target terminal device based on a communication identifier of the target terminal device maintained by each of the smart phone 100, when the smart phone 100 desires to establish communication with other devices in the device group, the communication identifier of the other devices in the device group is obtained from the server 600 to directly establish communication connection with the target terminal device, and both the smart watch 200 and the smart glasses 300 and the smart phone 100 are covered by the same WiFi network, so that a near field communication connection between the terminal devices can be established when the near field communication connection is attempted to be established, and processing (such as copying) of large data between the terminal devices is facilitated; when the laptop 400 and the tablet computer 500 are not in the same WiFi network as the smartphone 100 and the bluetooth communication modules of the laptop 400 and the tablet computer 500 are not turned on, the smartphone 100 fails to attempt to establish a close-range communication connection with the laptop 400 and the tablet computer 500, and further attempts to establish a cellular communication connection (such as a 2G, 3G or 4G connection); of course, in practical applications, the smartphone 100 may set the maximum number of times of attempting to establish the communication connection and the interval time of attempting to establish the communication connection, for example, if the attempt to establish the short-distance communication connection with the laptop 400 fails for 10 times, it indicates that the laptop 400 is not currently in the effective range of the short-distance communication, and then the remote communication connection is established based on the communication identifier of the long-distance communication of the laptop 400.
The terminal device in the device group may often have multiple users (e.g., a smart television, a tablet computer), but the device in the device group really belongs to only one user, and in order to define the usage right and the ownership right of the terminal device in the device group, the ownership right has a high-level right to operate the terminal device in the device group (e.g., the highest operation right in an android device, that is, the root right, the highest operation right in an apple device, that is, the AppID account right bound to the apple device, and the highest operation right in a notebook computer, that is, the administrator right).
Referring to the device management method shown in fig. 3, when one terminal device (corresponding to a first terminal device) in the device group acquires the authentication information of the user to which the device group belongs, based on the communication mode of the terminal devices in the device group, the authentication information of the home subscriber of the device group is shared with the device group until each terminal device in the device group obtains the authentication information of the home subscriber (step 101), the terminal devices in the device group use the maintained authentication information as the valid certificate of the home subscriber, the user who cannot submit the authentication information does not have the ownership right of the device, and certainly, the user may have the use right (or also have no use right, and is set according to the needs of the actual application scenario, for example, all terminal devices in the device group are located in the home environment, although the device group has only one ownership user, the user may be assigned to other members who cannot submit the authentication information in the home environment);
for example, in an embodiment in which the terminal device shares the authentication information of the home subscriber in the device group, the terminal device (corresponding to the first terminal device) may establish a communication connection with other terminal devices in the device group based on the stored communication identifier to send the authentication information of the home subscriber; optionally, in order to ensure security of authentication information transmission of the user, the first terminal device performs bidirectional authentication with each terminal device in the device group, taking bidirectional authentication between the first terminal device and the second terminal device as an example, the first terminal device sends a key agreed in advance with the second terminal device to the second terminal device, if the key is matched with a key stored in the second terminal device, the authentication of the second terminal device with the first terminal device is successful, the second terminal device continues to send the key agreed in advance with the first terminal device to the first terminal device, if the key is matched with the key stored in the first terminal device, the bidirectional authentication between the first terminal device and the second terminal device is completed, and a secure connection is established after the bidirectional authentication is completed; the authentication information of the home subscriber of the equipment group is encrypted and processed with integrity protection and is sent to the terminal equipment which completes the bidirectional authentication through the secure connection, the encryption can adopt a symmetric or asymmetric encryption mode (can be agreed in advance in a device group, and the possibility of brute force cracking is avoided), the integrity protection refers to scanning to obtain a digital abstract of the authentication information, for example, the digital Digest may be obtained by calculating the authentication information using the information-Digest Algorithm 5(MD5, Message-Digest Algorithm 5), when the terminal equipment in the equipment group receives the authentication information of the home subscriber through the secure connection, the authentication information is also scanned to obtain the digital abstract, if the digital abstract is matched with the digital abstract sent by the first terminal equipment through the secure connection, the authentication information of the home subscriber is judged to be authentic without being modified.
Taking the device group shown in fig. 1 as an example, assuming that all terminal devices in the device group belong to the user 1, the smartphone 100 acquires biometric information of the user 1 as authentication information of the belonging user, such as a fingerprint, a palm print, an iris, a voiceprint, a face, and the like, and may further improve the reliability and security of the authentication information as a credential of the user 1 by using the personal data information submitted by the user 1, such as a name, a birthday, an address, professional information, and the like, and improve the difficulty of cracking;
after the smart phone 100 acquires the authentication information submitted by the user 1, the acquired authentication information may be correspondingly transmitted based on the stored communication identifiers of the smart watch 200, the smart glasses 300, the notebook computer 400, and the tablet computer 500, and different communication connections between the smart watch and other terminal devices in the device group; optionally, after receiving the authentication information, the other terminal devices in the device group check security and integrity, and after the verification succeeds, send acknowledgement information to the smart phone 100, and if the smart phone 100 does not receive acknowledgement information sent by the other terminal devices within an expected time, resend the authentication information until the acknowledgement information is received or it is determined that the other terminal devices are unreachable after the number of times of resending reaches a predetermined value.
For example, in another embodiment in which the terminal device shares the authentication information of the home subscriber in the device group, the terminal device (corresponding to the first terminal device) may obtain the corresponding communication identifier from the server based on the stored identifiers of the other terminal devices in the device group, to establish a communication connection with the other terminal devices in the device group, and to send the authentication information of the home subscriber (an encrypted transmission method may be adopted); taking the device group shown in fig. 2 as an example, assuming that all terminal devices in the device group belong to the user 1, the smartphone 100 acquires biometric information of the user 1 as authentication information of the belonging user, such as a fingerprint, a palm print, an iris, a voiceprint, a face, and the like, and may further improve the reliability and security of the authentication information as a credential of the user 1 by using the personal data information submitted by the user 1, such as a name, a birthday, an address, professional information, and the like, and improve the difficulty of cracking;
after the smart phone 100 acquires the authentication information submitted by the user 1, the communication identifier may be correspondingly acquired from the server 600 through the stored communication identifiers of the smart watch 200, the smart glasses 300, the notebook computer 400, and the tablet computer 500, and a communication connection is established with other terminal devices in the device group based on the communication identifier to correspondingly send the acquired authentication information; optionally, after receiving the authentication information, the other terminal devices in the device group check security and integrity, and after the verification is successful, send acknowledgement information to the smart phone 100, and if the smart phone 100 does not receive acknowledgement information sent by the other terminal devices within an expected time, retransmit the authentication information until the acknowledgement information is received, or determine that the other terminal devices are unreachable after the number of retransmissions reaches a predetermined value.
When a home user of an equipment group has a demand for operating terminal equipment in the equipment group, a request for operating a target terminal equipment (corresponding to a second terminal equipment and a terminal equipment expected to be operated by the user in the equipment group) can be submitted based on member terminal equipment (simply referred to as a current terminal equipment and corresponding to a first terminal equipment) in the equipment group which is currently held, the current terminal equipment (the first terminal equipment) acquires a request for operating the current user (simply referred to as a current user, namely a user to be authenticated) of the first terminal equipment aiming at other terminal equipment (the second terminal equipment) (step 102), and the current user does not have a high-level authority for operating the terminal equipment in the equipment group because the terminal equipment in the equipment group does not determine whether the current user has the home right of the equipment group at the moment; in order to verify whether the current user has the ownership right of the device group, the current terminal device (first terminal device) and the target terminal device (second terminal device) verify whether the current user has the ownership right of the device group based on the authentication information of the respective maintained ownership users (step 103); when the verification is passed, the target terminal equipment confirms that the current user is the attribution user of the equipment group, and sends an attribution right confirmation message for confirming the current user to the current terminal equipment, so that the current user can issue a remote operation instruction to the target terminal equipment through the communication connection between the current terminal equipment and the target terminal equipment under the condition that the current user does not hold the target terminal equipment, and the operation management of the target terminal equipment is completed.
Referring to fig. 4, as an exemplary embodiment of verifying whether the current terminal device (first terminal device) and the target terminal device (second terminal device) have the ownership of the device group, when the current terminal device performs a first-level verification (step 201) on whether the current user has the ownership of the device group based on the authentication information of the home user, the authentication information submitted by the current user is compared with the authentication information of the home user, and if the authentication information is consistent, the first-level verification passes; when the first-level verification passes, a first instruction and authentication information submitted by a current user are sent to a target terminal device (step 202), the target terminal device responds to the first instruction and carries out second-level verification on whether the current user has the ownership right of a device group or not (step 203), and the authentication information comprises the biological characteristic information of the current user and can also comprise other information of the current user such as personal profile information and the like, so that the second-level verification and the first-level verification can respectively carry out verification on partial information in the authentication information and save verification processes, such as the first-level verification is used for verifying the biological characteristic information of the current user, and the second-level verification is used for verifying the personal profile information of the user; certainly, the first-level verification and the second-level verification can also completely verify the authentication information of the current user respectively; when the second-level verification is passed, the target terminal device determines that the current user is a home user of the device group, and opens the advanced operation permission for the current user (step 204), optionally, an open advanced operation permission confirmation message may be sent to the current terminal device (step 205), the current terminal device may subsequently send the remote operation instruction submitted by the current user to the target terminal device (step 206), so that the target terminal device executes the remote operation instruction (step 207), optionally, the target terminal device sends an instruction execution result message to the current terminal device when the execution is completed (step 208), and remote operation of the current user on the target terminal device is realized.
Referring to fig. 5, as another embodiment of verifying whether the current terminal device and the target terminal device verify whether the current user has the ownership of the device group (step 301), when the current terminal device verifies whether the current user has the ownership of the device group based on the authentication information of the home user (step 301), comparing whether the authentication information submitted by the current user and the authentication information of the home user are consistent, if so, the verification is passed, and when the verification is passed, sending a second instruction and the authentication information submitted by the current user to the target terminal device (step 302, the second instruction is distinguished from the aforementioned first instruction), the second instruction indicating that the current terminal device passes the verification of the current user, the advanced operation right can be opened to the current user, so that the target terminal device opens the advanced operation right to the current user in response to the second instruction (step 303), that is, the target terminal device identifies the current terminal device in the device group as a trusted device, that is, the verification result of the current terminal device is trusted, so that the current user does not need to be verified again to save the verification process; optionally, the target terminal device may send an open advanced operation permission confirmation message to the current terminal device (step 304), the current terminal device may subsequently send the remote operation instruction submitted by the current user to the target terminal device (step 305) so as to be executed by the target terminal device (step 306), and optionally, the target terminal device sends an instruction execution result message to the current terminal device when the execution is completed (step 307), so as to implement the remote operation of the current user on the target terminal device.
Referring to fig. 6, as another embodiment of verifying whether the current terminal device and the target terminal device verify whether the current user has the ownership of the device group for verification, when the current terminal device obtains a request submitted by the current user to operate the target terminal device, the current terminal device sends a third instruction and authentication information submitted by the current user to the target terminal device (step 401), the target terminal device verifies whether the current user has the ownership of the device group based on the authentication information of the home user (step 402), opens the advanced operation right for the current user when the verification is passed (step 403), optionally sends an open advanced operation right confirmation message to the current terminal device (step 404), and the current terminal device may subsequently send a remote operation instruction submitted by the current user to the target terminal device (step 405), the target terminal device executes the remote operation instruction (step 406), and optionally, the target terminal device sends an instruction execution result message to the current terminal device when the execution is completed (step 407), so as to implement the remote operation of the current user on the target terminal device.
For example, as described above, there are three verification manners for the current terminal device and the target terminal device to verify whether the user has the ownership right of the device group, including: mode 1), the current terminal device performs first-level verification, the target terminal device performs second-level verification, and the current terminal device and the target terminal device both verify the current user, so that the safety is high; mode 2), one of the current terminal device and the target terminal device authenticates the current user, the security is lower than that of mode 1, but the authentication process can be saved;
one of the above authentication modes can be selected optionally when the current user is authenticated; alternatively, the current terminal device may determine, based on the trusted level of the target terminal device, a verification manner for verifying whether the current user has the ownership of the device group with the target terminal device; the current terminal device may perform mutual trust authentication with other terminal devices in the device group in advance to determine a trustworthiness level of the other terminal devices in the device group, where the trustworthiness level of the terminal device is related to: the time length for the terminal equipment to join the equipment group; the number of historical communication between the terminal equipment and the current terminal equipment; when the trustworthiness level of the target terminal device is lower than the expected trustworthiness level, a relatively secure mode 1 may be adopted, and when the trustworthiness level of the target terminal device is not lower than the expected trustworthiness level, a mode 2 may be adopted to save the verification process.
Two exemplary scenarios are given below to explain the remote control target terminal device.
Scenario 1) in fig. 1, a user 1 (a home user 1 of a device group) only holds a smartphone 100 at the current time, and although the smartwatch 200 is in an environment where the user 1 is currently located, the user 1 does not want to operate the smartwatch 200 without searching for the smartwatch 200 (or may not be able to find the smartwatch 200 for a while), for example, important data or search information is deleted or the like.
As shown in fig. 7, the smart phone 100 presents the identifiers of other terminal devices in the device group for the current user to select a terminal device that the current user wishes to operate, when the current user determines that the smart watch 200 needs to be operated, the smart phone 100 obtains the authentication information of the current user, and authenticates the current user with the smart watch 200 in any one of the aforementioned manners, and when the authentication passes, the smart phone 100 may present an operation interface to the smart watch 200, as shown in fig. 8, for example, a desktop of the smart watch 200 may be displayed on a screen of the smart phone 100, so that the user operates the smart glasses 300, and since the smart glasses 300 open a high-level right to the current user, the operation of the current user on the smart glasses 300 through the smart phone 100 is not restricted by the user right.
Scene 2) a user currently holds the smartphone 100, the tablet computer 500 is carelessly lost in an outdoor use process, and in order to prevent important personal information from being leaked due to malicious cracking of data in the tablet computer, the user 1 expects to erase the data in the tablet computer 500.
The smart phone 100 presents the identifiers of other terminal devices in the device group, so that the current user can select a terminal device that the current user wishes to operate, when the current user determines that the tablet computer 500 needs to be operated, the smart phone 100 obtains authentication information of the current user, and verifies the current user with the tablet computer 500 in any one of the aforementioned manners, when the verification is passed, the smart phone 100 can present an operation interface for the tablet computer 500, for example, a desktop of the smart tablet computer 500 can be displayed on a screen of the smart phone 100, so that the user can perform a data erasing operation on the tablet computer 500, and since the tablet computer 500 opens a high-level right to the current user, the operation performed by the current user on the tablet computer 500 is not restricted by the user right.
After the current terminal device passes the authentication of the current user, the user may be supported to remotely operate the target terminal device (second terminal device) via the current terminal device, see fig. 9, and then, if the current user also requests a request for operating another target terminal device (third terminal device) in the device group (step 501), the current terminal device determines whether the current user has been authenticated with the target terminal device based on the stored history authentication record of the current user (the devices in the device group may be supported for use by multiple users, that is, the terminal device may assign the right of use to multiple users, but only the home user has the right of home of the terminal device) (step 502), and if the current user has the right of home to the device group, a fourth instruction is sent to another target terminal device that the current user desires to operate (step 504), another target terminal device opens the advanced operation permission for the current user (step 505), optionally, another target terminal device may send an open advanced operation permission confirmation message to the current terminal device (step 506), and the current terminal device may subsequently send the remote operation instruction submitted by the current user to another target terminal device (step 507), so that the another target terminal device executes the remote operation instruction (step 508), thereby achieving the purpose of saving the verification process, optionally, another target terminal device sends an instruction execution result message to the current terminal device (step 509) when the execution is completed, thereby implementing the remote operation of the current user on the target terminal device;
if the current terminal device and the target terminal device do not verify the current user, then verifying whether the current user has the ownership right of the device group or not based on the authentication information of the ownership user with another terminal device (step 503), the verification process is the same as the verification process of the current terminal device and the target terminal device, when the verification is passed, the other terminal device opens the high-level operation authority to the current user (step 505), optionally, the other target terminal device can send an open high-level operation authority confirmation message to the current terminal device (step 506), the current terminal device can subsequently send the remote operation instruction submitted by the current user to another target terminal device (step 507), so that the other target terminal device executes the remote operation instruction (step 508), thereby achieving the purpose of saving the verification process, optionally, when the execution is finished, the other target terminal device sends an instruction execution result message to the current terminal device (step 508), and the other target terminal device can optionally send the instruction execution result message Step 509), the remote operation of the target terminal device by the current user is realized.
Referring to fig. 10, an embodiment of the present invention further describes a first terminal device 700, including:
the sharing unit 710 is configured to share the authentication information of the home subscriber of the device group in the device group until each terminal device in the device group acquires the authentication information of the home subscriber; an obtaining unit 720, configured to obtain a request for a current user to perform an operation on a second terminal device (that is, a target device that the current user desires to perform a remote operation); a verification unit 730, configured to verify, with the second terminal device, whether the current user has the ownership of the device group based on the authentication information of the ownership user; and when the verification is passed, the second terminal device opens the advanced operation authority to the current user, and the remote operation instruction of the current user is supported to respond.
Illustratively, the verification unit 730 includes: the first-stage verification module is used for performing first-stage verification on whether the current user has the ownership of the equipment group or not based on the authentication information of the ownership user; and the second-stage verification module is used for sending a first instruction to the second terminal equipment when the first-stage verification is passed, wherein the first instruction is used for indicating the authentication information submitted by the current user so as to indicate the second terminal equipment to carry out second-stage verification on whether the current user has the ownership of the equipment group, and open the advanced operation authority for the current user when the second-stage verification is passed.
Illustratively, the verifying unit 730 is further configured to verify whether the current user owns the ownership of the device group based on the authentication information of the home user; and when the verification is passed, sending a second instruction to the second terminal equipment when the verification is passed, wherein the second instruction is used for indicating the second terminal equipment to open the advanced operation authority to the current user.
Illustratively, the verifying unit 730 is further configured to send a third instruction to the second terminal device, where the third instruction is used to instruct the second terminal device to verify whether the current user owns the ownership of the device group based on the authentication information of the home user, and open the advanced operation right for the current user when the verification passes.
Illustratively, the obtaining unit 720 is further configured to obtain a request of the current user for operating a third terminal device (that is, another target terminal device in the device group that the current user desires to perform remote operation); the verification unit 730, configured to send a fourth instruction to the third terminal device if the current user is verified to pass through with the second terminal device, where the fourth instruction is used to instruct the third terminal device to open the advanced operation permission for the current user; the verifying unit 730, configured to verify, if the current user is not verified with the second terminal device, whether the current user uses the ownership of the device group with the third terminal device based on the authentication information of the ownership user; therefore, when the verification is passed, the third terminal device opens the advanced operation authority to the current user, and the remote operation instruction of the current user is supported to respond.
Illustratively, the verifying unit 730 is further configured to perform mutual trust authentication with the terminal devices in the device group, and determine a trustworthiness level of the terminal devices in the device group; the verifying unit 730 is further configured to determine, based on the determined trustworthiness level of the second terminal device, a verification manner for verifying whether the current user has the ownership of the device group with the second terminal device.
Exemplarily, the sharing unit 710 includes: the connection module is used for performing bidirectional authentication with each terminal device in the device group and establishing safe connection after the bidirectional authentication is completed; and the sharing module (connected with the connecting module) is used for encrypting and integrity protecting the authentication information of the home subscriber and sending the encrypted and integrity protected authentication information of the home subscriber to the terminal equipment based on the secure connection.
In practical applications, the sharing unit 710, the obtaining unit 720 and the verifying unit 730 may be implemented by a processor, a Microprocessor (MCU), an Application Specific Integrated Circuit (ASIC) or a logic programmable gate array (FPGA) in the first terminal device.
Referring to fig. 11, an embodiment of the present invention further describes an equipment group system, which includes at least two terminal equipments, only three terminal equipments, namely, a first terminal equipment 700, a second terminal equipment 800, and a third terminal equipment 900, are shown in fig. 11, where the first terminal equipment 700, the second terminal equipment 800, and the third terminal equipment form an equipment group, and it is assumed here that the first terminal equipment 700 is a terminal equipment held by a current user, the second terminal equipment 800 is a terminal equipment that the current user desires to perform a remote operation, and the third terminal equipment 900 is a terminal equipment that the current user desires to perform a remote operation after operating the second terminal equipment 800.
The first terminal device 700 is configured to share the authentication information of the home subscriber of the device group in the device group until each terminal device in the device group acquires the authentication information of the home subscriber;
the first terminal device 700 is further configured to obtain a request for the current user to operate the second terminal device 800;
the first terminal device 700 is further configured to verify, with the second terminal device 800, whether the current user has the ownership right of the device group based on the authentication information of the ownership user;
and the second terminal device 800 is configured to open the advanced operation right to the current user when the verification passes, and support responding to the remote operation instruction of the current user.
The first terminal device 700 is further configured to perform a first-level verification on whether the current user has the ownership right of the device group based on the authentication information of the ownership user;
and sending a first instruction to the second terminal device 800 when the first-level verification passes, wherein the first instruction is used for indicating authentication information submitted by the current user to indicate that the second terminal device 800 performs second-level verification on whether the current user has the ownership of the device group, and opens the advanced operation authority for the current user when the second-level verification passes.
The first terminal device 700 is further configured to verify whether the current user has the ownership right of the device group based on the authentication information of the ownership user; and when the verification is passed, sending a second instruction to the second terminal device 800 when the verification is passed, wherein the second instruction is used for indicating the second terminal device 800 to open the advanced operation authority to the current user.
The first terminal device 700 is further configured to send a third instruction to the second terminal device 800, where the third instruction is used to instruct the second terminal device 800 to verify whether the current user has the ownership right of the device group based on the authentication information of the ownership user, and open the advanced operation right for the current user when the verification passes.
The first terminal device 700 is further configured to obtain a request of a current user for operating the third terminal device 900; if the current user is verified with the second terminal device 800, sending a fourth instruction to the third terminal device 900, where the fourth instruction is used to instruct the third terminal device 900 to open the advanced operation permission for the current user; if the current user is not verified with the second terminal device 800, verifying whether the current user applies the ownership of the device group with the third terminal device 900 based on the authentication information of the ownership user; therefore, when the verification is passed, the third terminal device 900 is enabled to open the advanced operation authority to the current user, and the remote operation instruction responding to the current user is supported.
The first terminal device 700 is further configured to perform mutual trust authentication with terminal devices in the device group, and determine a trusted level of the terminal devices in the device group; based on the determined trustworthiness level, a verification means is determined for verifying whether the current user has the ownership of the device group with the second terminal device 800.
The first terminal device 700 is further configured to perform mutual authentication with each terminal device in the device group, and establish a secure connection after the mutual authentication is completed; and encrypting and integrity protecting the authentication information of the home subscriber, and sending the encrypted and integrity protected authentication information of the home subscriber to the terminal equipment based on the secure connection.
Embodiments of the present invention also describe a computer readable medium, which may be a ROM (e.g., read only memory, FLASH memory, transfer device, etc.), a magnetic storage medium (e.g., magnetic tape, disk drive, etc.), an optical storage medium (e.g., CD-ROM, DVD-ROM, paper card, paper tape, etc.), and other well-known types of program memory; the computer-readable medium has stored thereon computer-executable instructions that, when executed, cause at least one processor in a first terminal device in the device population to perform operations comprising: sharing authentication information of a home subscriber of the equipment group in the equipment group until each terminal equipment in the equipment group acquires the authentication information of the home subscriber; acquiring a request of a current user for operating a second terminal device; verifying whether the current user has the ownership of the equipment group or not based on the authentication information of the ownership user; and when the verification is passed, the second terminal equipment opens the advanced operation authority to the current user, and the remote operation instruction of the current user is supported to respond.
In summary, the devices in the device group described in the embodiment of the present invention may be produced by different manufacturers, and the operating systems run by the terminal devices in the device group may also be different (such as a typical android system and an IOS system), and compared with the related art that the management relationship between the server and the terminal devices produced by a single manufacturer can only be realized through an account and a password of a cloud account, the management of the terminal devices is more flexible, the terminal devices in the device group may be updated (added or deleted) at any time according to the requirements of an attributive user, and the remote management of any terminal device (without differentiating manufacturers and the operating systems) in the device group can be realized, for example, when the terminal device is lost, data is erased to protect the privacy of the user;
in the related technology, a specific server corresponding to a specific cloud account number is relied on to verify a user so as to realize the management of terminal equipment of a certain manufacturer, but in the embodiment of the invention, the authentication of the ownership of the user can be realized as long as the terminal equipment in an equipment group can communicate with each other, so that the implementation is more flexible, the cost of specially setting the server is saved, no special node in the equipment group is relied on, and the stability is higher;
the terminal equipment in the user subsequent operation equipment group is processed based on the history information of the user verification, for example, when the user verification is successful, the user verification is not required to be performed again so as to save the verification process, and when the user verification fails, the user verification is performed again, so that the operation safety of the terminal equipment in the equipment group is ensured.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Random Access Memory (RAM), a Read-Only Memory (ROM), a magnetic disk, and an optical disk.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a RAM, a ROM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (16)

1. A method for device management, the method comprising:
a first terminal device in the device group establishes communication connection with other terminal devices in the device group based on the stored communication identification, and sends authentication information of an attribution user until each terminal device in the device group acquires the authentication information of the attribution user;
the first terminal equipment acquires a request of a current user of the first terminal equipment for operating the second terminal equipment;
the first terminal equipment acquires authentication information submitted by the current user;
when the current user is successfully verified once, directly determining that the current user passes the verification;
when the current user is failed to be verified once, the first terminal equipment determines the credibility level of the second terminal equipment;
when the credibility level of the second terminal equipment is lower than the expected credibility level, the first terminal equipment and the second terminal equipment verify whether the current user has the ownership right of the equipment group for two times in the equipment group based on the authentication information of the ownership user;
when the credibility level of the second terminal equipment is not lower than the expected credibility level, the first terminal equipment and the second terminal equipment verify whether the current user has the ownership right of the equipment group or not in the equipment group based on the authentication information of the ownership user;
and when the verification is passed, enabling the second terminal equipment to open advanced operation authority to the first terminal equipment, and supporting the instruction of responding to the current user to remotely operate the second terminal equipment on the first terminal equipment.
2. The method of claim 1, wherein verifying within the device group whether the current user has the home right of the device group twice based on authentication information of the home user between the first terminal device and the second terminal device comprises:
the first terminal equipment performs first-level verification on whether the current user of the first terminal equipment has the ownership of the equipment group or not based on the authentication information of the ownership user;
and sending a first instruction to the second terminal equipment when the first-level verification is passed, wherein the first instruction is used for indicating the second terminal equipment to carry out second-level verification on whether the current user of the first terminal equipment has the ownership of the equipment group or not based on the authentication information submitted by the current user of the first terminal equipment, and opening advanced operation authority for the current user of the first terminal equipment when the second-level verification is passed.
3. The method of claim 1, wherein the verifying whether the current user has the home right of the device group within the device group based on the authentication information of the home user between the first terminal device and the second terminal device comprises:
the first terminal equipment verifies whether the current user of the first terminal equipment has the ownership of the equipment group or not based on the authentication information of the ownership user;
and sending a second instruction to the second terminal device when the verification is passed, wherein the second instruction is used for indicating the second terminal device to open the advanced operation authority to the current user of the first terminal device.
4. The method of claim 1, wherein the verifying whether the current user has the home right of the device group within the device group based on the authentication information of the home user between the first terminal device and the second terminal device comprises:
and the first terminal equipment sends a third instruction to the second terminal equipment, wherein the third instruction is used for indicating the second terminal equipment to verify whether the current user of the first terminal equipment has the ownership right of the equipment group or not based on the authentication information of the ownership user, and when the verification is passed, the advanced operation authority is opened for the current user of the first terminal equipment.
5. The method of claim 1, wherein the method further comprises:
the first terminal equipment acquires a request of a current user of the first terminal equipment for operating a third terminal equipment;
if the second terminal device passes the verification of the current user of the first terminal device, sending a fourth instruction to the third terminal device, wherein the fourth instruction is used for indicating the third terminal device to open advanced operation permission for the current user of the first terminal device;
if the second terminal device fails to verify the current user of the first terminal device, the third terminal device verifies whether the current user of the first terminal device applies the ownership of the device group based on the authentication information of the ownership user; and when the verification is passed, the third terminal device opens the advanced operation authority to the current user of the first terminal device, and the remote operation instruction of the current user of the first terminal device is supported to respond.
6. The method of claim 1, wherein said first terminal device determining a trustworthiness rating of said second terminal device comprises:
the first terminal equipment and the terminal equipment in the equipment group perform mutual trust authentication to determine the credible grade of the terminal equipment in the equipment group;
and determining a verification mode of verifying whether the current user of the first terminal equipment has the ownership of the equipment group or not by the second terminal equipment based on the determined trustworthiness level of the second terminal equipment.
7. The method of any of claims 1 to 6, further comprising:
the first terminal equipment and each terminal equipment in the equipment group carry out bidirectional authentication, and a safety connection is established after the bidirectional authentication is completed;
and encrypting and integrity protecting the authentication information of the home subscriber, and sending the encrypted and integrity protected authentication information of the home subscriber to the terminal equipment based on the secure connection.
8. A first terminal device, characterized in that the first terminal device comprises:
the sharing unit is used for establishing communication connection with other terminal equipment in the equipment group based on the stored communication identification and sending authentication information of the home subscriber until each terminal equipment in the equipment group acquires the authentication information of the home subscriber;
the acquisition unit is used for acquiring a request of a current user of the first terminal equipment for operating the second terminal equipment; the system is also used for acquiring the authentication information submitted by the current user;
the verification unit is used for directly determining that the current user passes the verification when the current user is successfully verified once; when the current user is failed to be verified once, the first terminal equipment determines the credibility level of the second terminal equipment; when the credibility level of the second terminal equipment is lower than the expected credibility level, the first terminal equipment and the second terminal equipment verify whether the current user has the ownership right of the equipment group for two times in the equipment group based on the authentication information of the ownership user; when the credibility level of the second terminal equipment is not lower than the expected credibility level, the first terminal equipment and the second terminal equipment verify whether the current user has the ownership right of the equipment group or not in the equipment group based on the authentication information of the ownership user; and when the verification is passed, enabling the second terminal equipment to open advanced operation authority to the first terminal equipment, and supporting the instruction of responding to the current user to remotely operate the second terminal equipment on the first terminal equipment.
9. The first terminal device of claim 8, wherein the authentication unit comprises:
the first-stage verification module is used for performing first-stage verification on whether the current user of the first terminal equipment has the ownership of the equipment group or not based on the authentication information of the ownership user;
and the second-stage verification module is used for sending a first instruction to the second terminal equipment when the first-stage verification is passed, wherein the first instruction is used for indicating the second terminal equipment to carry out second-stage verification on whether the current user of the first terminal equipment has the ownership of the equipment group or not based on the authentication information submitted by the current user of the first terminal equipment, and opening high-level operation authority for the current user of the first terminal equipment when the second-stage verification is passed.
10. The first terminal device of claim 8,
the verification unit is further configured to verify whether the current user of the first terminal device owns the ownership of the device group based on the authentication information of the ownership user;
and when the verification is passed, sending a second instruction to the second terminal device, wherein the second instruction is used for indicating the second terminal device to open the advanced operation authority to the current user of the first terminal device.
11. The first terminal device of claim 8,
the verification unit is further configured to send a third instruction to the second terminal device, where the third instruction is used to instruct the second terminal device to verify whether the current user of the first terminal device owns the ownership right of the device group based on the authentication information of the ownership user, and open a high-level operation right to the current user of the first terminal device when the verification passes.
12. The first terminal device of claim 8,
the obtaining unit is further configured to obtain a request for the current user of the first terminal device to operate the third terminal device;
the verification unit is further configured to send a fourth instruction to the third terminal device if the second terminal device passes verification of the current user of the first terminal device, where the fourth instruction is used to instruct the third terminal device to open a high-level operation right for the current user of the first terminal device;
the verification unit is further configured to verify, by the third terminal device, whether the current user of the first terminal device applies the ownership of the device group based on the authentication information of the ownership user if the current user of the first terminal device is not verified by the second terminal device; and when the verification is passed, the third terminal device opens the advanced operation authority to the current user of the first terminal device, and the remote operation instruction of the current user of the first terminal device is supported to respond.
13. The first terminal device of claim 8,
the verification unit is further configured to perform mutual trust authentication with the terminal device in the device group, and determine a trusted level of the terminal device in the device group;
the verification unit is further configured to determine, based on the determined trusted level of the second terminal device, a verification manner in which the second terminal device verifies whether the current user of the first terminal device has the ownership of the device group.
14. The first terminal device according to any one of claims 8 to 13, wherein the sharing unit includes:
the connection module is used for performing bidirectional authentication with each terminal device in the device group and establishing safe connection after the bidirectional authentication is completed;
and the sharing module is used for encrypting and integrity protecting the authentication information of the home subscriber and sending the encrypted and integrity protected authentication information of the home subscriber to the terminal equipment based on the secure connection.
15. A device cluster system, comprising: the first terminal equipment and the second terminal equipment are at least two pieces of terminal equipment; wherein the content of the first and second substances,
the first terminal device is configured to establish communication connection with other terminal devices in the device group based on the stored communication identifier, and send authentication information of the home subscriber until each terminal device in the device group acquires the authentication information of the home subscriber;
the first terminal device is also used for acquiring a request of a current user of the first terminal device for operating the second terminal device;
the first terminal device is further configured to acquire authentication information submitted by the current user;
the first terminal device is further configured to directly determine that the current user passes the authentication when the current user is successfully authenticated once; when the current user is failed to be verified once, the first terminal equipment determines the credibility level of the second terminal equipment; when the credibility level of the second terminal equipment is lower than the expected credibility level, the first terminal equipment and the second terminal equipment verify whether the current user has the ownership right of the equipment group for two times in the equipment group based on the authentication information of the ownership user; when the credibility level of the second terminal equipment is not lower than the expected credibility level, the first terminal equipment and the second terminal equipment verify whether the current user has the ownership right of the equipment group or not in the equipment group based on the authentication information of the ownership user;
and the second terminal device is used for opening advanced operation authority to the current user of the first terminal device when the verification is passed, and supporting an instruction for responding to the current user to remotely operate the second terminal device on the first terminal device.
16. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the device management method according to any one of claims 1 to 7.
CN201510618086.9A 2015-09-24 2015-09-24 Equipment management method, equipment and system Active CN106559213B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510618086.9A CN106559213B (en) 2015-09-24 2015-09-24 Equipment management method, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510618086.9A CN106559213B (en) 2015-09-24 2015-09-24 Equipment management method, equipment and system

Publications (2)

Publication Number Publication Date
CN106559213A CN106559213A (en) 2017-04-05
CN106559213B true CN106559213B (en) 2020-06-16

Family

ID=58414227

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510618086.9A Active CN106559213B (en) 2015-09-24 2015-09-24 Equipment management method, equipment and system

Country Status (1)

Country Link
CN (1) CN106559213B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786647A (en) * 2017-10-16 2018-03-09 深圳市合信自动化技术有限公司 A kind of PLC remote device managements method, apparatus and system based on social attribute
CN110362981B (en) * 2019-06-29 2022-12-02 上海淇毓信息科技有限公司 Method and system for judging abnormal behavior based on trusted device fingerprint
CN113055340B (en) * 2019-12-26 2023-09-26 华为技术有限公司 Authentication method and equipment
CN113830026A (en) * 2020-06-24 2021-12-24 华为技术有限公司 Equipment control method and computer readable storage medium
CN112235767A (en) * 2020-10-13 2021-01-15 深圳市晨北科技有限公司 Connection management method, device and medium
CN113806723A (en) * 2021-09-27 2021-12-17 三星电子(中国)研发中心 Double-factor authentication method and device
CN116232775B (en) * 2023-05-09 2023-07-18 北京天辰信科技有限公司 One-to-many communication method and system based on authority setting

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018375B (en) * 2007-01-29 2011-11-30 中兴通讯股份有限公司 Method for remotely controlling the terminal data
CN101364973A (en) * 2007-08-07 2009-02-11 联想(北京)有限公司 Method and apparatus implementing remote control
CN101316282B (en) * 2008-07-07 2011-07-06 华为终端有限公司 Terminal long-range control method and correlative devices
CN102957584B (en) * 2011-08-25 2015-03-18 华为终端有限公司 Home network equipment management method, control equipment and home network equipment
CN103634275A (en) * 2012-08-21 2014-03-12 联想(北京)有限公司 Multi-device management and task migration methods and management server
CN103618706B (en) * 2013-11-19 2018-11-02 深圳Tcl新技术有限公司 The control system and method that smart machine mutually accesses
CN103746812B (en) * 2013-12-30 2017-06-16 迈普通信技术股份有限公司 A kind of access authentication method and system

Also Published As

Publication number Publication date
CN106559213A (en) 2017-04-05

Similar Documents

Publication Publication Date Title
CN106559213B (en) Equipment management method, equipment and system
US10475264B2 (en) Application method of Bluetooth low-energy electronic lock based on built-in offline pairing passwords, interactive unlocking method of a Bluetooth electronic lock and electronic lock system
US9842446B2 (en) Systems and methods for lock access management using wireless signals
US11483708B2 (en) Network access tokens for accessories
KR101959492B1 (en) Methods and apparatus for user authentication and human intent verification in mobile devices
US11329982B2 (en) Managing internet of things devices using blockchain operations
US20200259667A1 (en) Distributed management system for remote devices and methods thereof
US9736131B2 (en) Secure login for subscriber devices
US9451454B2 (en) Mobile device identification for secure device access
US20130174239A1 (en) Reinforced authentication system and method using context information at the time of access to mobile cloud service
WO2015101125A1 (en) Network access control method and device
DK2924944T3 (en) Presence authentication
KR20160114620A (en) Methods, devices and systems for dynamic network access administration
US9294474B1 (en) Verification based on input comprising captured images, captured audio and tracked eye movement
US20210314293A1 (en) Method and system for using tunnel extensible authentication protocol (teap) for self-sovereign identity based authentication
US9443069B1 (en) Verification platform having interface adapted for communication with verification agent
WO2019056971A1 (en) Authentication method and device
CN109729000B (en) Instant messaging method and device
CN105763517A (en) Router security access and control method and system
CN110278084B (en) eID establishing method, related device and system
CN111031540B (en) Wireless network connection method and computer storage medium
CN109561413B (en) Bluetooth authentication and authorization method and system of BLE equipment
CN114760112B (en) Wireless local area network-oriented intelligent home equipment networking method, system, equipment and storage medium
KR20160146090A (en) Communication method and apparatus in smart-home system
CN115250192A (en) Robot network authentication system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant