CN107172044A - A kind of terminal authorization control method and device - Google Patents

A kind of terminal authorization control method and device Download PDF

Info

Publication number
CN107172044A
CN107172044A CN201710339887.0A CN201710339887A CN107172044A CN 107172044 A CN107172044 A CN 107172044A CN 201710339887 A CN201710339887 A CN 201710339887A CN 107172044 A CN107172044 A CN 107172044A
Authority
CN
China
Prior art keywords
subscriber identification
blacklist
unique subscriber
terminal user
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710339887.0A
Other languages
Chinese (zh)
Inventor
徐佳宏
赵海林
何小芬
陈恋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ipanel TV Inc
Original Assignee
Shenzhen Ipanel TV Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ipanel TV Inc filed Critical Shenzhen Ipanel TV Inc
Priority to CN201710339887.0A priority Critical patent/CN107172044A/en
Publication of CN107172044A publication Critical patent/CN107172044A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities

Abstract

The embodiment of the present application provides a kind of terminal authorization control method and device, the corresponding limited users mark of all function privileges is write in same blacklist, i.e. target blacklist.After the unique subscriber identification of terminal user is obtained, judge the unique subscriber identification of the terminal user whether is included in target blacklist;If including the unique subscriber identification of the terminal user in target blacklist, whole restricted functions of the terminal user are limited.It can be realized using this method and difference in functionality authority is uniformly controlled, each function need not individually be controlled, after the request of some terminal user is received, a target blacklist, which only need to be inquired about, can complete to be controlled whole restricted functions of the terminal user, multiple blacklists need not be inquired about, therefore, control process is simplified, the resource needed for control process is saved.

Description

A kind of terminal authorization control method and device
Technical field
The invention belongs to field of computer technology, more particularly to a kind of terminal authorization control method and device.
Background technology
With developing rapidly for Internet technology, the various network applications based on internet are continued to bring out.Many networks should With that can limit the authority of terminal user, for example, some forum's class website, only allows to carry out point for some terminal users Praise, do not allow to be commented on;Or, only allow to browse for some terminal users, do not allow to carry out thumb up, comment etc..
At present, network application is managed respectively for different authorities, for example, by without the terminal user for commenting on authority Add in comment blacklist, that is, comment on the authority that the user in blacklist does not comment on;For example, by the end without thumb up authority End subscriber is added in thumb up blacklist, i.e., user's all authorities without thumb up in thumb up blacklist.If same user was both There is no thumb up authority and do not comment on authority, then the user had not only been included in thumb up blacklist but also included in comment blacklist. So, if the authority project of a network application is more, need to safeguard the blacklist of different rights project, Cai Nengshi respectively The management and control of existing difference in functionality authority, its management process will it is extremely complex, moreover, management process can take a large amount of moneys Source.
The content of the invention
In view of this, it is an object of the invention to provide a kind of terminal authorization control method and device, to realize to difference Function privilege project is managed collectively, and operating process is simple and has saved management resource.
In a first aspect, the application provides a kind of terminal authorization control method, including:
Obtain the unique subscriber identification of terminal user;
Judge whether to include in target blacklist and repertoire is included in the unique subscriber identification, the target blacklist The corresponding limited users mark of authority and each limited users identify corresponding whole restricted functions;
When including the unique subscriber identification in the target blacklist, the unique subscriber identification corresponding end is limited End performs the corresponding whole restricted functions of the terminal user.
Alternatively, it is described when including the unique subscriber identification in the target blacklist, limit the terminal user The corresponding whole restricted functions of the terminal user are performed, including:
The corresponding whole restricted rights of the unique subscriber identification are obtained from the target blacklist;
When receiving in the request that the corresponding terminal of the unique subscriber identification is sent comprising the restricted function, refusal The request.
Alternatively, after the limitation terminal user performs the corresponding whole restricted functions of the terminal user, Methods described also includes:
Limited prompt message is returned to the corresponding terminal of the unique subscriber identification.
Alternatively, methods described also includes:
The corresponding blacklist of each function privilege is obtained, the blacklist includes the corresponding restricted terminal of the function privilege The unique subscriber identification of user;
Whole blacklists is merged, the target blacklist is obtained.
Alternatively, whole blacklist is merged, and obtains the target blacklist, including:
The corresponding whole restricted functions of the same unique subscriber identification are searched from whole blacklists;
The mapping relations set up between the unique subscriber identification and whole restricted functions, and delete what is all repeated Unique subscriber identification.
Second aspect, the application provides a kind of terminal authorization control device, including:
First acquisition unit, the unique subscriber identification for obtaining terminal user;
Judging unit, for judging whether include the unique subscriber identification, the target blacklist in target blacklist In identify corresponding whole restricted functions comprising repertoire authority corresponding limited users mark and each limited users;
Authority limiting unit, for when in the target blacklist include the unique subscriber identification when, limitation described in only One user identifies corresponding terminal and performs the corresponding whole restricted functions of the terminal user.
Alternatively, the authority limiting unit includes:
First obtain subelement, for obtained from the target blacklist unique subscriber identification it is corresponding all by Limit authority;
Refuse subelement, for described when being included in the request for receiving the corresponding terminal transmission of the unique subscriber identification During restricted function, refuse the request.
Alternatively, described device also includes:
Tip element, for returning to limited prompt message to the corresponding terminal of the unique subscriber identification.
Alternatively, described device also includes:
Second acquisition unit, for obtaining the corresponding blacklist of each function privilege, the blacklist includes the function The unique subscriber identification of the corresponding restricted terminal user of authority;
Combining unit, for whole blacklists to be merged, obtains the target blacklist.
Alternatively, the combining unit, including:
Subelement is searched, for searching the corresponding whole of the same unique subscriber identification from whole blacklists Restricted function;
Mapping relations set up subelement, for setting up reflecting between the unique subscriber identification and whole restricted functions Relation is penetrated, and deletes the unique subscriber identification all repeated.
The terminal authorization control method that the embodiment of the present application is provided, the corresponding limited users mark of all function privileges is write Enter in same blacklist, i.e. target blacklist.After the unique subscriber identification of terminal user is obtained, judge in target blacklist Whether the unique subscriber identification of the terminal user is included;If including the unique subscriber mark of the terminal user in target blacklist Know, then whole restricted functions of the terminal user are limited.It can be realized using this method and difference in functionality authority is carried out It is uniformly controlled, it is not necessary to which each function is individually controlled, after the request of some terminal user is received, only need to inquires about one Individual target blacklist can complete to be controlled whole restricted functions of the terminal user, without inquiring about multiple blacklists, because This, simplifies control process, saves the resource needed for control process.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 shows a kind of flow chart of terminal authorization control method of the embodiment of the present application;
Fig. 2 shows a kind of S130 flow chart of the embodiment of the present application;
Fig. 3 shows the schematic flow sheet of another terminal authorization control method of the embodiment of the present application;
Fig. 4 shows a kind of schematic diagram for showing limited prompt message of the embodiment of the present application;
Fig. 5 shows the flow chart of another terminal authorization control method of the embodiment of the present application;
Fig. 6 shows a kind of S320 schematic flow sheet of the embodiment of the present application;
Fig. 7 shows a kind of block diagram of terminal authorization control device of the embodiment of the present application;
Fig. 8 shows a kind of block diagram of authority limiting unit of the embodiment of the present application;
Fig. 9 shows the block diagram of another terminal authorization control device of the embodiment of the present application;
Figure 10 shows the block diagram of another terminal authorization control device of the embodiment of the present application;
Figure 11 shows a kind of block diagram of combining unit of the embodiment of the present application.
Embodiment
Current terminal authorization control method, one is respectively created for the difference in functionality authority in same network application Blacklist, for same terminal user, it is necessary to search respectively whether unique comprising the terminal user in each blacklist User's mark determines the corresponding whole restricted functions of the terminal user, and therefore, current terminal authorization control process is extremely complex, And occupy more resource.It is this application provides a kind of terminal authorization control method, all function privileges are corresponding black List merges into a blacklist, i.e. target blacklist;One target blacklist of inquiry can be completed to the complete of the terminal user Portion's restricted function is controlled, without inquiring about multiple blacklists, therefore, simplifies control process, needed for saving control process Resource.
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 is referred to, a kind of flow chart of terminal authorization control method of the embodiment of the present application is shown, this method is applied to In server, as shown in figure 1, this method can include:
S110, obtains the unique subscriber identification of terminal user.
After the network application that server described in end user logs is provided, the server can obtain the terminal user Unique subscriber identification.
Unique subscriber identification can be account of the terminal user in the network application application, or, terminal user institute The unique mark of using terminal equipment.
S120, judges whether include the unique subscriber identification in target blacklist;If it is, performing S130;If not, Then terminate current process.
The corresponding limited users mark of repertoire authority and each limited users are included in the target blacklist Identify corresponding whole restricted functions.For example, for some forum's class network application, it includes browsing, thumb up and comment etc. are main Function;If certain terminal user does not have thumb up authority in the network application and comments on authority, only browse right, then the black name of target The unique subscriber identification of the terminal user is included in list, and the function that the terminal user that is correspondingly stored with is limited, for example, thumb up and Comment.
If in target blacklist do not include the terminal user unique subscriber identification, show the terminal user not by The function of limit;If including the unique subscriber identification of the terminal user in target blacklist, show that the terminal user has limited Function.
S130, limits the corresponding terminal of the unique subscriber identification and performs the limited work(of the corresponding whole of the terminal user Energy.
When unique subscriber identification corresponding comprising the terminal user in target blacklist, limit the terminal user and carry out institute Limited repertoire.
In a kind of possible implementation of the application, limit the terminal user and carry out the repertoire that is limited, can be with It is the request for being not responding to the terminal user to restricted function.
Fig. 2 is referred to, a kind of S130 flow chart of the embodiment of the present application is shown, as shown in Fig. 2 step S130 can be wrapped Include:
S131, obtains the corresponding whole restricted functions of the unique subscriber identification from target blacklist.
If the unique subscriber identification of terminal user is included in target blacklist, the end is obtained from target blacklist The corresponding whole restricted functions of end subscriber.Target blacklist includes each limited terminal user, and each terminal is used The corresponding whole restricted functions in family, therefore, after the unique subscriber identification of the terminal user is found from target blacklist, i.e., The corresponding whole restricted functions of the terminal user can be obtained.
S132, the restricted function is included when receiving in the request that the corresponding terminal of the unique subscriber identification is sent When, refuse the request.
After the solicited message of terminal user's transmission is received, judge whether the function that the solicited message is asked is this The restricted function of terminal user, if it is, being not responding to the solicited message of the terminal user.
For example, certain terminal user's restricted function is comment function, if receiving the comment request of terminal user transmission When, refuse comment request.
The terminal authorization control method that the embodiment of the present application is provided, the corresponding limited users mark of all function privileges is write Enter in same blacklist, i.e. target blacklist.After the unique subscriber identification of terminal user is obtained, judge in target blacklist Whether the unique subscriber identification of the terminal user is included;If including the unique subscriber mark of the terminal user in target blacklist Know, then whole restricted functions of the terminal user are limited.It can be realized using this method and difference in functionality authority is carried out It is uniformly controlled, it is not necessary to which each function is individually controlled, after the request of some terminal user is received, only need to inquires about one Individual target blacklist can complete to be controlled whole restricted functions of the terminal user, without inquiring about multiple blacklists, because This, simplifies control process, saves the resource needed for control process.
Fig. 3 is referred to, the schematic flow sheet of another terminal authorization control method of the embodiment of the present application, such as Fig. 3 is shown Shown, this method can also include in basic this method of embodiment illustrated in fig. 1:
S210, limited prompt message is returned to the corresponding terminal of the unique subscriber identification.
After the request of the terminal user is refused, server can be returned to terminal device used in the terminal user Return limited prompt message.As shown in figure 4, the limited prompting can be shown on terminal device used in terminal user 100 Information 200, for example, the limited prompt message can be " you have no right to use this function ".
The terminal authorization control method that the present embodiment is provided, refuses end-user request in server and uses restricted function After request, limited prompt message can also be returned to the terminal user, oneself haves no right to use this function so that terminal user knows.
Fig. 5 is referred to, the flow chart of another terminal authorization control method of the embodiment of the present application, this method application is shown In server, this method is further comprising the steps of on the basis of embodiment illustrated in fig. 1:
S310, obtains the corresponding blacklist of each function privilege.
Performed before the S110 of the S310 and S320 of the present embodiment in the embodiment shown in fig. 1.
The blacklist includes the unique subscriber identification of the corresponding restricted terminal user of the function privilege.For example, black name Single 1 is the terminal user for commenting on function limitation, and blacklist 2 is the terminal user of thumb up function limitation, and blacklist 3 is function of browse Limited terminal user.
S320, whole blacklists is merged, the target blacklist is obtained.
Whole blacklists are merged into a target blacklist.Above-mentioned example is adopted, by blacklist 1, blacklist 2 and black List 3 merges into a blacklist, and the blacklist after merging includes the limited list of repertoire.
As shown in fig. 6, in one embodiment of the application, S320 may comprise steps of:
S321, searches the corresponding whole restricted functions of same unique subscriber identification from whole blacklists.
Above-mentioned example is adopted, the terminal user in blacklist 1, blacklist 2 and blacklist 3 and restricted function are closed And.
S322, the mapping relations set up between unique subscriber identification and whole restricted functions, and delete whole repetitions Unique subscriber identification.
The mapping relations set up between same terminal user and corresponding whole restricted functions, meanwhile, delete all weights Multiple terminal user;For example, blacklist 1 includes terminal user a, b and c, blacklist 2 includes terminal user a, b, c, d and e;It is black List 3 includes terminal user f.Then merge after blacklist include terminal user a, b, c, d, e and f, wherein, terminal user a, b, The corresponding restricted functions of c include comment and thumb up;The corresponding restricted functions of terminal user d and e are thumb ups;F couples of terminal user The restricted function answered is to browse.
The present embodiment provide terminal authorization control method, by the corresponding independent blacklist of each function merge into one it is comprehensive The target blacklist of conjunction, after the unique subscriber identification of terminal user is obtained, judges whether include the terminal in target blacklist The unique subscriber identification of user;If including the unique subscriber identification of the terminal user in target blacklist, the terminal is used Whole restricted functions at family are limited.It can be realized using this method and difference in functionality authority is uniformly controlled, it is not necessary to Each function is individually controlled, after the request of some terminal user is received, only a target blacklist need to be inquired about i.e. It can complete to be controlled whole restricted functions of the terminal user, without inquiring about multiple blacklists, therefore, simplify and controlled Journey, saves the resource needed for control process.
For foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but It is that those skilled in the art should know, the present invention is not limited by described sequence of movement, because according to the present invention, certain A little steps can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art should also know, be retouched in specification The embodiment stated belongs to preferred embodiment, and involved action and the module not necessarily present invention are necessary.
Corresponding to above-mentioned terminal authorization control method embodiment, present invention also provides the implementation of terminal authorization control device Example.
Fig. 7 is referred to, a kind of block diagram of terminal authorization control device of the embodiment of the present application is shown, the device is applied to clothes It is engaged in device, as shown in fig. 7, the device includes:First acquisition unit 110, judging unit 120 and authority limiting unit 130.
First acquisition unit 110, the unique subscriber identification for obtaining terminal user.
After the network application that server described in end user logs is provided, the server can obtain the terminal user Unique subscriber identification.
Unique subscriber identification can be account of the terminal user in the network application application, or, terminal user institute The unique mark of using terminal equipment.
Judging unit 120, for judging whether include the unique subscriber identification, the black name of target in target blacklist Identify corresponding whole comprising the corresponding limited users mark of repertoire authority and each limited users in list and be limited work( Energy.
For example, for some forum's class network application, the function of tonic chord such as it includes browsing, thumb up and comment;If certain terminal User does not have thumb up authority in the network application and comments on authority, only browse right, then the terminal is included in target blacklist The unique subscriber identification of user, and the function that the terminal user that is correspondingly stored with is limited, for example, thumb up and comment.
If in target blacklist do not include the terminal user unique subscriber identification, show the terminal user not by The function of limit;If including the unique subscriber identification of the terminal user in target blacklist, show that the terminal user has limited Function.
Authority limiting unit 130, for when including the unique subscriber identification in the target blacklist, limitation to be described The corresponding terminal of unique subscriber identification performs the corresponding whole restricted functions of the terminal user.
In a kind of possible implementation of the application, limit the terminal user and carry out the repertoire that is limited, can be with It is the request for being not responding to the terminal user to restricted function.
Fig. 8 is referred to, a kind of block diagram of authority limiting unit of the embodiment of the present application is shown, as shown in figure 8, the authority is limited Unit 130 processed can include:First obtains subelement 131 and refusal subelement 132.
First obtains subelement 131, corresponding complete for obtaining the unique subscriber identification from the target blacklist Portion's restricted rights.
If the unique subscriber identification of terminal user is included in target blacklist, the end is obtained from target blacklist The corresponding whole restricted functions of end subscriber.Target blacklist includes each limited terminal user, and each terminal is used The corresponding whole restricted functions in family, therefore, after the unique subscriber identification of the terminal user is found from target blacklist, i.e., The corresponding whole restricted functions of the terminal user can be obtained.
Refuse subelement 132, for being included when in the request for receiving the corresponding terminal transmission of the unique subscriber identification During the restricted function, refuse the request.
After the solicited message of terminal user's transmission is received, judge whether the function that the solicited message is asked is this The restricted function of terminal user, if it is, being not responding to the solicited message of the terminal user.
For example, certain terminal user's restricted function is comment function, if receiving the comment request of terminal user transmission When, refuse comment request.
The terminal authorization control device that the embodiment of the present application is provided, the corresponding limited users mark of all function privileges is write Enter in same blacklist, i.e. target blacklist.After the unique subscriber identification of terminal user is obtained, judge in target blacklist Whether the unique subscriber identification of the terminal user is included;If including the unique subscriber mark of the terminal user in target blacklist Know, then whole restricted functions of the terminal user are limited.It can be realized using the device and difference in functionality authority is carried out It is uniformly controlled, it is not necessary to which each function is individually controlled, after the request of some terminal user is received, only need to inquires about one Individual target blacklist can complete to be controlled whole restricted functions of the terminal user, without inquiring about multiple blacklists, because This, simplifies control process, saves the resource needed for control process.
Fig. 9 is referred to, the block diagram of another terminal authorization control device of the embodiment of the present application is shown, the device is in Fig. 7 Also include Tip element 210 on the basis of illustrated embodiment.
Tip element 210, for returning to limited prompt message to the corresponding terminal of the unique subscriber identification.
After the request of the terminal user is refused, server can be returned to terminal device used in the terminal user Return limited prompt message.
The terminal authorization control device that the present embodiment is provided, refuses end-user request in server and uses restricted function After request, limited prompt message can also be returned to the terminal user, oneself haves no right to use this function so that terminal user knows.
Figure 10 is referred to, the block diagram of another terminal authorization control device of the embodiment of the present application is shown, the device is in Fig. 1 Also include on the basis of illustrated embodiment:Second acquisition unit 310 and combining unit 320.
Second acquisition unit 310, for obtaining the corresponding blacklist of each function privilege, the blacklist includes the work( The unique subscriber identification of the corresponding restricted terminal user of energy authority.
The blacklist includes the unique subscriber identification of the corresponding restricted terminal user of the function privilege.For example, black name Single 1 is the terminal user for commenting on function limitation, and blacklist 2 is the terminal user of thumb up function limitation, and blacklist 3 is function of browse Limited terminal user.
Combining unit 320, for whole blacklists to be merged, obtains the target blacklist.
Whole blacklists are merged into a target blacklist.Above-mentioned example is adopted, by blacklist 1, blacklist 2 and black List 3 merges into a blacklist, and the blacklist after merging includes the limited list of repertoire.
Figure 11 is referred to, a kind of block diagram of combining unit of the embodiment of the present application is shown, it is as shown in figure 11, described to merge single Member 320 can include:Search subelement 321 and mapping relations set up subelement 322;
Subelement 321 is searched, it is corresponding for searching the same unique subscriber identification from whole blacklists Whole restricted functions.
Above-mentioned example is adopted, the terminal user in blacklist 1, blacklist 2 and blacklist 3 and restricted function are closed And.
Mapping relations set up subelement 322, for setting up between the unique subscriber identification and whole restricted functions Mapping relations, and delete all repeat unique subscriber identifications.
The mapping relations set up between same terminal user and corresponding whole restricted functions, meanwhile, delete all weights Multiple terminal user;For example, blacklist 1 includes terminal user a, b and c, blacklist 2 includes terminal user a, b, c, d and e;It is black List 3 includes terminal user f.Then merge after blacklist include terminal user a, b, c, d, e and f, wherein, terminal user a, b, The corresponding restricted functions of c include comment and thumb up;The corresponding restricted functions of terminal user d and e are thumb ups;F couples of terminal user The restricted function answered is to browse.
The present embodiment provide terminal authorization control device, by the corresponding independent blacklist of each function merge into one it is comprehensive The target blacklist of conjunction, after the unique subscriber identification of terminal user is obtained, judges whether include the terminal in target blacklist The unique subscriber identification of user;If including the unique subscriber identification of the terminal user in target blacklist, the terminal is used Whole restricted functions at family are limited.It can be realized using the device and difference in functionality authority is uniformly controlled, it is not necessary to Each function is individually controlled, after the request of some terminal user is received, only a target blacklist need to be inquired about i.e. It can complete to be controlled whole restricted functions of the terminal user, without inquiring about multiple blacklists, therefore, simplify and controlled Journey, saves the resource needed for control process.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation be all between difference with other embodiment, each embodiment identical similar part mutually referring to. For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of key elements not only include that A little key elements, but also other key elements including being not expressly set out, or also include be this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except also there is other identical element in the process including the key element, method, article or equipment.
The foregoing description of the disclosed embodiments, enables those skilled in the art to realize or using the present invention.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and generic principles defined herein can Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited It is formed on the embodiments shown herein, and is to fit to consistent with features of novelty with principles disclosed herein most wide Scope.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a kind of terminal authorization control method, it is characterised in that including:
Obtain the unique subscriber identification of terminal user;
Judge whether to include in target blacklist and repertoire authority is included in the unique subscriber identification, the target blacklist Corresponding limited users mark and each limited users identify corresponding whole restricted functions;
When including the unique subscriber identification in the target blacklist, limit the corresponding terminal of the unique subscriber identification and hold The corresponding whole restricted functions of the row terminal user.
2. according to the method described in claim 1, it is characterised in that described to work as in the target blacklist comprising unique use When family is identified, limit the terminal user and perform the corresponding whole restricted functions of the terminal user, including:
The corresponding whole restricted rights of the unique subscriber identification are obtained from the target blacklist;
When receiving in the request that the corresponding terminal of the unique subscriber identification is sent comprising the restricted function, refusal is described Request.
3. according to the method described in claim 1, it is characterised in that perform the terminal in the limitation terminal user and use After the corresponding whole restricted functions in family, methods described also includes:
Limited prompt message is returned to the corresponding terminal of the unique subscriber identification.
4. according to the method described in claim 1, it is characterised in that methods described also includes:
The corresponding blacklist of each function privilege is obtained, the blacklist includes the corresponding restricted terminal user of the function privilege Unique subscriber identification;
Whole blacklists is merged, the target blacklist is obtained.
5. method according to claim 4, it is characterised in that whole blacklist is merged, and obtains the mesh Blacklist is marked, including:
The corresponding whole restricted functions of the same unique subscriber identification are searched from whole blacklists;
The mapping relations set up between the unique subscriber identification and whole restricted functions, and delete the unique of all repetitions User identifies.
6. a kind of terminal authorization control device, it is characterised in that including:
First acquisition unit, the unique subscriber identification for obtaining terminal user;
Whether judging unit, wrap for judging to include in the unique subscriber identification, the target blacklist in target blacklist The corresponding limited users mark of authority containing repertoire and each limited users identify corresponding whole restricted functions;
Authority limiting unit, for when including the unique subscriber identification in the target blacklist, limiting unique use Family identifies corresponding terminal and performs the corresponding whole restricted functions of the terminal user.
7. device according to claim 6, it is characterised in that the authority limiting unit includes:
First obtains subelement, for obtaining the limited power of the corresponding whole of the unique subscriber identification from the target blacklist Limit;
Refuse subelement, for being limited when in the request for receiving the corresponding terminal transmission of the unique subscriber identification comprising described During function, refuse the request.
8. device according to claim 6, it is characterised in that described device also includes:
Tip element, for returning to limited prompt message to the corresponding terminal of the unique subscriber identification.
9. device according to claim 6, it is characterised in that described device also includes:
Second acquisition unit, for obtaining the corresponding blacklist of each function privilege, the blacklist includes the function privilege The unique subscriber identification of corresponding restricted terminal user;
Combining unit, for whole blacklists to be merged, obtains the target blacklist.
10. device according to claim 9, it is characterised in that the combining unit, including:
Subelement is searched, is limited for searching the corresponding whole of the same unique subscriber identification from whole blacklists Function;
Mapping relations set up subelement, are closed for setting up the mapping between the unique subscriber identification and whole restricted functions System, and delete the unique subscriber identification all repeated.
CN201710339887.0A 2017-05-15 2017-05-15 A kind of terminal authorization control method and device Pending CN107172044A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710339887.0A CN107172044A (en) 2017-05-15 2017-05-15 A kind of terminal authorization control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710339887.0A CN107172044A (en) 2017-05-15 2017-05-15 A kind of terminal authorization control method and device

Publications (1)

Publication Number Publication Date
CN107172044A true CN107172044A (en) 2017-09-15

Family

ID=59816192

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710339887.0A Pending CN107172044A (en) 2017-05-15 2017-05-15 A kind of terminal authorization control method and device

Country Status (1)

Country Link
CN (1) CN107172044A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111476579A (en) * 2020-05-14 2020-07-31 支付宝(杭州)信息技术有限公司 Authority control method, device, equipment and medium
CN111984949A (en) * 2020-08-24 2020-11-24 北京达佳互联信息技术有限公司 Authentication method, authentication device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546530A (en) * 2010-12-14 2012-07-04 金蝶软件(中国)有限公司 Method, device and ERP (enterprise resource planning) system for user identity and permission validation
CN103973503A (en) * 2014-05-29 2014-08-06 北京中电普华信息技术有限公司 Method and system for controlling mobile application permission
CN104112085A (en) * 2013-04-19 2014-10-22 阿里巴巴集团控股有限公司 Data permission control method and device for application system clusters
CN104221025A (en) * 2012-03-14 2014-12-17 三星电子株式会社 Apparatus and method of controlling permission to applications in portable terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546530A (en) * 2010-12-14 2012-07-04 金蝶软件(中国)有限公司 Method, device and ERP (enterprise resource planning) system for user identity and permission validation
CN104221025A (en) * 2012-03-14 2014-12-17 三星电子株式会社 Apparatus and method of controlling permission to applications in portable terminal
CN104112085A (en) * 2013-04-19 2014-10-22 阿里巴巴集团控股有限公司 Data permission control method and device for application system clusters
CN103973503A (en) * 2014-05-29 2014-08-06 北京中电普华信息技术有限公司 Method and system for controlling mobile application permission

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111476579A (en) * 2020-05-14 2020-07-31 支付宝(杭州)信息技术有限公司 Authority control method, device, equipment and medium
CN111984949A (en) * 2020-08-24 2020-11-24 北京达佳互联信息技术有限公司 Authentication method, authentication device, electronic equipment and storage medium
CN111984949B (en) * 2020-08-24 2023-11-28 北京达佳互联信息技术有限公司 Authentication method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US8955058B2 (en) Automatically generating challenge questions inferred from user history data for user authentication
CN104797003B (en) A kind of method and device for switching intelligent terminal user
US20080267091A1 (en) System, method, and computer program product for service and application configuration in a network device
WO2017084290A1 (en) Public account two-dimensional code generation method and server, and public account following method, server and terminal
CN103607385A (en) Method and apparatus for security detection based on browser
CN104581727A (en) Equipment connecting method and device and AP (access point) end electronic equipment
CN103078881A (en) Sharing control system and method for network resource downloading information
CN106791229A (en) The identification method and device of number
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
CN101616503B (en) Method and device for sharing telephone number information
CN105049608B (en) Short message verification code processing method, device and mobile terminal
JP6422583B2 (en) Method, apparatus, system, storage medium, program, and computer apparatus for providing authentication information on a web page
CN109510758B (en) Session establishing method, terminal and system
CN104123350A (en) Social relation management method, device and system
CN101216829B (en) Content search system, apparatus and method
CN106803032A (en) Realize method, device and client device that website fingerprint is logged in
CN103927303A (en) Method and device for searching accounts
CN107172044A (en) A kind of terminal authorization control method and device
CN113940037B (en) Resource subscription method, device, computer equipment and storage medium
CN109726545A (en) A kind of information display method, equipment, computer readable storage medium and device
CN103049445B (en) A kind of method, system and picture state server for inquiring about pictorial information
CN104270357A (en) Service information sending method and device
CN109040050A (en) Data interactive method and Related product
KR100372951B1 (en) Method to create Community automatically on Internet Community service
Liu et al. Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170915