CN109361936A - The system and method that safety shares smart machine - Google Patents
The system and method that safety shares smart machine Download PDFInfo
- Publication number
- CN109361936A CN109361936A CN201811045359.5A CN201811045359A CN109361936A CN 109361936 A CN109361936 A CN 109361936A CN 201811045359 A CN201811045359 A CN 201811045359A CN 109361936 A CN109361936 A CN 109361936A
- Authority
- CN
- China
- Prior art keywords
- smart machine
- owner
- server
- visitor
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25875—Management of end-user data involving end-user authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25891—Management of end-user data being end-user preferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Graphics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention discloses a kind of method and system of safety sharing smart machine, this method comprises: first terminal adds smart machine, and is encrypted message that its configuration includes owner's password and common passwords of visitors;First terminal provides the smart machine function classification to the available rights that switch goes that common visitor is arranged to owner, and the function privilege table for forming the smart machine is stored in server;Server converts two dimensional code and/or http link for the encrypted message for sharing;Second terminal is linked to server by two dimensional code and/or http and requests access to the smart machine, and server identifies visitor's type, gives the permission that second terminal manages the smart machine according to the function privilege table.The present invention is by sharing smart machine, and overcoming existing smart machine can only directly be shared using ID and password, and former smart machine owner can not define and manage the function restriction of other users;It reduces because password reveals bring security risk.
Description
Technical field
The present invention relates to smart machines to share authority technology field, the in particular to system that a kind of safety shares smart machine
And method.
Background technique
Smart machine includes smart home device or other can be with the terminal device of co- controlling, for example, network monitoring is taken the photograph
As the Real-time Video Captures device such as head, common camera, the video information of acquisition is stored in cloud, needs to allow other at present
When people synchronizes viewing camera picture, it is that device id and password are directly informed into other side, needs clear encrypted message, it is right
Side can directly be added equipment and all camera functions can be used using the two data.Original equipment owner can not manage these its
He is viewer, and encrypted message is also easy leakage, and there are biggish security risks.
Prior art needs adder to provide specific device id and encrypted message, but the master in user cannot be distinguished
People and visitor can not also manage these cameras viewer.And password is provided to other people, brings risk of divulging a secret.In security protection
When monitoring, often owner is high to the security requirement of video, it is undesirable to which video pictures are watched by unrelated person apprentice even agaainst the law.
Summary of the invention
In view of the problems of the existing technology, the present invention provides a kind of system and method for safety sharing smart machine.
Firstly, the present invention provides a kind of method of safety sharing smart machine, comprising steps of
First terminal adds smart machine, and includes the encrypted message of owner's password and common passwords of visitors for its configuration,
The smart machine and its encrypted message are uploaded to server;
The smart machine function classification is provided switch to owner and goes the available power that common visitor is arranged by first terminal
Limit, the function privilege table for forming the smart machine are stored in server;
Server converts two dimensional code and/or http link for the encrypted message for sharing;
Second terminal is linked to server by two dimensional code and/or http and requests access to the smart machine, and server is known
Other visitor's type gives the permission that second terminal manages the smart machine according to the function privilege table.
As a preferred embodiment of the invention, the configuration includes the encrypted message method of owner's password and common passwords of visitors
Are as follows:
Owner's password is set as+8 alphanumerics of master+ timestamp;
Common passwords of visitors is set as+8 alphanumerics of visitor+ timestamp.
As an of the invention preferred embodiment, offers is switched goes the available rights that common visitor is arranged to include: to owner
The recycling of permission, the deletion of permission;The recycling of permission limits certain function that common visitor uses the smart machine for owner
Energy;The deletion of permission deletes the common visitor in certain position for owner from the function privilege table, enables it that can not continue to use the intelligence
It can equipment.
As a preferred embodiment of the invention, second terminal is linked to server by two dimensional code and/or http and is requested access to
The smart machine, the method that server identifies visitor's type are as follows:
Server links corresponding encrypted message by two dimensional code and/or http, and identification second terminal is owner or common
Visitor.
The present invention also provides the systems that a kind of safety shares smart machine, comprising: first terminal, second terminal, server;
The first terminal adds smart machine, and includes the message in cipher of owner's password and common passwords of visitors for its configuration
Breath, is uploaded to server for the smart machine and its encrypted message;
The smart machine function classification is provided switch to owner and goes the available power that common visitor is arranged by first terminal
Limit, the function privilege table for forming the smart machine are stored in server;
Server converts two dimensional code and/or http link for the encrypted message for sharing;
Second terminal is linked to server by two dimensional code and/or http and requests access to the smart machine, and server is known
Other visitor's type gives the permission that second terminal manages the smart machine according to the function privilege table.
Preferably, owner's password is set as+8 alphanumerics of master+ timestamp;Common passwords of visitors is set
It is set to+8 alphanumerics of visitor+ timestamp.
Preferably, it includes: the recycling of permission, permission that the offer switch, which goes the available rights that common visitor is arranged to owner,
Deletion;The recycling of permission limits certain functions that common visitor uses the smart machine for owner;The deletion of permission is used
Owner Yu deletes the common visitor in certain position from the function privilege table, enables it that can not continue to use the smart machine.
Preferably, second terminal is linked to server by two dimensional code and/or http and requests access to the smart machine, clothes
The method for device identification visitor's type of being engaged in are as follows:
Server links corresponding encrypted message by two dimensional code and/or http, and identification second terminal is owner or common
Visitor.
Using technical solution of the present invention, have the advantages that
By sharing smart machine, overcoming existing smart machine can only directly be shared using ID and password the present invention, former
Smart machine owner can not define and manage the function restriction of other users;It reduces because password reveals bring safety wind
Danger.
Detailed description of the invention
Fig. 1 is the method for the present invention flow chart;
Fig. 2 is present system block diagram.
Specific embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is further described.
Referring to Fig.1, the present invention provides a kind of method of safety sharing smart machine, comprising steps of
S1, first terminal add smart machine, and include the message in cipher of owner's password and common passwords of visitors for its configuration
Breath, is uploaded to server for the smart machine and its encrypted message.
Herein, first terminal can be system platform, and after a certain smart machine typing, which is automatically generated
Owner's password, common passwords of visitors, owner's password are set as+8 alphanumerics of master+ timestamp;It is common to visit
Objective password is set as+8 alphanumerics of visitor+ timestamp.Wherein, master is the label of owner, and visitor is
The label of common visitor, it is that the owner of the smart machine or owner give that this password design, which facilitates subsequent difference visitor,
The common visitor of its rights management smart machine.
Above-mentioned typing and encrypted message can be stored in the server on backstage.
The smart machine function classification is provided switch and goes that the available of common visitor is arranged to owner by S2, first terminal
Permission, the function privilege table for forming the smart machine are stored in server.
Smart machine, such as camera are provided switch to owner and are gone setting visitor's by system platform by its function classification
Available rights.After owner modifies to common visitor's available rights, new function privilege table can be stored to clothes by system platform
It is engaged in device.When user enters system platform (for example, can for APP application, webpage etc.), system platform again from server pull not
With the available rights of user, in the case where realizing that owner and common visitor watch camera video simultaneously, owner can also manage visit
Visitor.
It includes: the deletion of the recycling of permission, permission that the offer switch, which goes the available rights that common visitor is arranged to owner,;
The recycling of permission limits certain functions that common visitor uses the smart machine for owner;The deletion of permission for owner from
The common visitor in certain position is deleted in the function privilege table, enables it that can not continue to use the smart machine.
S3, server convert two dimensional code and/or http link for the encrypted message for sharing.
Smart machine information and encrypted message are converted to a http link by server, and system platform again converts link
For a two dimensional code, " authority credentials " for adding equipment as visitor optionally can limit addition quantity.User is needing handle
When camera (smart machine, this is sentenced for camera) picture synchronizes viewing to other people, two dimensional code or link are provided, no
It needs directly to tell counterpart device ID and password again.
S4, second terminal, which are linked by two dimensional code and/or http to server, requests access to the smart machine, server
It identifies visitor's type, gives the permission that second terminal manages the smart machine according to the function privilege table.
When visitor's type identification, second terminal is linked to server by two dimensional code and/or http and requests access to the intelligence
Energy equipment, server link corresponding encrypted message (label of master, visitor), identification by two dimensional code and/or http
Second terminal is owner or common visitor.
When visitor is owner, its highest authority is given, while it has the permission for managing common visitor, common visit is set
The usable function of visitor and a certain common visitor of deletion.
When visitor is common visitor, the function privilege table of one basic smart machine of authorization gives the common visitor, intelligence
The owner of energy equipment can modify the function privilege table of the common visitor at any time, and modified function privilege table is updated to server
Afterwards, the common visitor again through server access smart machine when, permission be server update after function privilege table.
With reference to Fig. 2, the present invention also provides the systems that above-mentioned safety shares smart machine comprising: first terminal, second are eventually
End, server;
The first terminal adds smart machine, and includes the message in cipher of owner's password and common passwords of visitors for its configuration
Breath, is uploaded to server for the smart machine and its encrypted message;
The smart machine function classification is provided switch to owner and goes the available power that common visitor is arranged by first terminal
Limit, the function privilege table for forming the smart machine are stored in server;
Server converts two dimensional code and/or http link for the encrypted message for sharing;
Second terminal is linked to server by two dimensional code and/or http and requests access to the smart machine, and server is known
Other visitor's type gives the permission that second terminal manages the smart machine according to the function privilege table.
Wherein, owner's password is set as+8 alphanumerics of master+ timestamp;Common passwords of visitors setting
For+8 alphanumerics of visitor+ timestamp.
It includes: the deletion of the recycling of permission, permission that the offer switch, which goes the available rights that common visitor is arranged to owner,;
The recycling of permission limits certain functions that common visitor uses the smart machine for owner;The deletion of permission for owner from
The common visitor in certain position is deleted in the function privilege table, enables it that can not continue to use the smart machine.
Second terminal is linked to server by two dimensional code and/or http and requests access to the smart machine, and server is known
The method of other visitor's type are as follows:
Server links corresponding encrypted message by two dimensional code and/or http, and identification second terminal is owner or common
Visitor.
In the present invention, smart machine includes smart home device or other can be with the terminal device of co- controlling, for example, day
Various intelligent electric appliances, network monitoring camera head, common camera etc. used in Chang Jiaju.By sharing smart machine, overcome
Existing smart machine can only be shared directly using ID and password, and former smart machine owner can not define and manage other users'
Function restriction;It reduces because password reveals bring security risk.
In the present invention, first terminal can be system platform, or owner visitor records new smart machine
Enter, can be operated for owner visitor, owner obtains owner's password corresponding two by other ports (different handheld terminals)
Code and/or http link are tieed up, can also use the corresponding smart machine of owner's rights management.
In the present invention, second terminal may be multiple common visitors, pass through the corresponding two dimensional code of common passwords of visitors
And/or http link, after accessing server, server authorization its based on function privilege table come using smart machine, when owner repairs
After the function privilege table for changing a certain (a little) common visitors, the corresponding adjustment of subsequent permission updates, until it is general to delete its by owner
Logical visitor's qualification.
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all at this
Under the inventive concept of invention, using equivalent structure transformation made by description of the invention and accompanying drawing content, or directly/use indirectly
It is included in other related technical areas in scope of patent protection of the invention.
Claims (8)
1. a kind of safety shares the method for smart machine, which is characterized in that comprising steps of
First terminal adds smart machine, and includes the encrypted message of owner's password and common passwords of visitors for its configuration, by this
Smart machine and its encrypted message are uploaded to server;
First terminal provides the smart machine function classification to the available rights that switch goes that common visitor is arranged to owner, shape
Server is stored at the function privilege table of the smart machine;
Server converts two dimensional code and/or http link for the encrypted message for sharing;
Second terminal is linked to server by two dimensional code and/or http and requests access to the smart machine, and server identification is visited
Objective type gives the permission that second terminal manages the smart machine according to the function privilege table.
2. safety according to claim 1 shares the method for smart machine, which is characterized in that the configuration includes that owner is close
The encrypted message method of code and common passwords of visitors are as follows:
Owner's password is set as+8 alphanumerics of master+ timestamp;
Common passwords of visitors is set as+8 alphanumerics of visitor+ timestamp.
3. safety according to claim 1 shares the method for smart machine, which is characterized in that the offer switch is to owner
Going the available rights that common visitor is arranged includes: the deletion of the recycling of permission, permission;The recycling of permission is common for owner's limitation
Visitor uses certain functions of the smart machine;The deletion of permission for owner deleted from the function privilege table certain it is general
Logical visitor, enables it that can not continue to use the smart machine.
4. safety according to claim 1 shares the method for smart machine, which is characterized in that second terminal passes through two dimensional code
And/or http is linked to server and is requested access to the smart machine, the method that server identifies visitor's type are as follows:
Server links corresponding encrypted message by two dimensional code and/or http, and identification second terminal is owner or common visitor.
5. the system that a kind of safety shares smart machine characterized by comprising first terminal, second terminal, server;
The first terminal adds smart machine, and includes the encrypted message of owner's password and common passwords of visitors for its configuration,
The smart machine and its encrypted message are uploaded to server;
First terminal provides the smart machine function classification to the available rights that switch goes that common visitor is arranged to owner, shape
Server is stored at the function privilege table of the smart machine;
Server converts two dimensional code and/or http link for the encrypted message for sharing;
Second terminal is linked to server by two dimensional code and/or http and requests access to the smart machine, and server identification is visited
Objective type gives the permission that second terminal manages the smart machine according to the function privilege table.
6. the system that safety according to claim 5 shares smart machine, which is characterized in that owner's password is set as
+ 8 alphanumerics of master+ timestamp;Common passwords of visitors is set as+8 alphanumeric groups of visitor+ timestamp
It closes.
7. the system that safety according to claim 5 shares smart machine, which is characterized in that the offer switch is to owner
Going the available rights that common visitor is arranged includes: the deletion of the recycling of permission, permission;The recycling of permission is common for owner's limitation
Visitor uses certain functions of the smart machine;The deletion of permission for owner deleted from the function privilege table certain it is general
Logical visitor, enables it that can not continue to use the smart machine.
8. the system that safety according to claim 5 shares smart machine, which is characterized in that second terminal passes through two dimensional code
And/or http is linked to server and is requested access to the smart machine, the method that server identifies visitor's type are as follows:
Server links corresponding encrypted message by two dimensional code and/or http, and identification second terminal is owner or common visitor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811045359.5A CN109361936A (en) | 2018-09-07 | 2018-09-07 | The system and method that safety shares smart machine |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811045359.5A CN109361936A (en) | 2018-09-07 | 2018-09-07 | The system and method that safety shares smart machine |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109361936A true CN109361936A (en) | 2019-02-19 |
Family
ID=65350683
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811045359.5A Pending CN109361936A (en) | 2018-09-07 | 2018-09-07 | The system and method that safety shares smart machine |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109361936A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070226791A1 (en) * | 2001-10-16 | 2007-09-27 | Activcard Ireland Limited | Method for securely supporting password change |
CN102984139A (en) * | 2012-11-16 | 2013-03-20 | 中兴通讯股份有限公司 | Login method, system and user terminal of multi-user access device |
CN103400067A (en) * | 2013-03-29 | 2013-11-20 | 青岛海信电器股份有限公司 | Access control method, system and server |
CN103973448A (en) * | 2014-04-22 | 2014-08-06 | 贵州中科汉天下电子有限公司 | Operating authorization method and system based on dynamic two-dimensional code |
CN104202298A (en) * | 2014-07-30 | 2014-12-10 | 北京乐动卓越信息技术有限公司 | System and method of login with single account and multiple passwords |
CN104753677A (en) * | 2013-12-31 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Password hierarchical control method and system |
CN105205898A (en) * | 2015-10-22 | 2015-12-30 | 深圳优方网络技术有限公司 | Electronic code permission management system for intelligent lock |
CN106357653A (en) * | 2016-09-27 | 2017-01-25 | 深圳市欧瑞博电子有限公司 | Control authority sharing method and system |
CN106355385A (en) * | 2016-09-25 | 2017-01-25 | 上海锐得电子有限公司 | Novel two-dimensional code payment method for electronic scale |
CN106506442A (en) * | 2016-09-14 | 2017-03-15 | 上海百芝龙网络科技有限公司 | A kind of smart home multi-user identification and its Rights Management System |
CN106973060A (en) * | 2017-04-21 | 2017-07-21 | 宁波公众信息产业有限公司 | A kind of video monitoring system |
-
2018
- 2018-09-07 CN CN201811045359.5A patent/CN109361936A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070226791A1 (en) * | 2001-10-16 | 2007-09-27 | Activcard Ireland Limited | Method for securely supporting password change |
CN102984139A (en) * | 2012-11-16 | 2013-03-20 | 中兴通讯股份有限公司 | Login method, system and user terminal of multi-user access device |
CN103400067A (en) * | 2013-03-29 | 2013-11-20 | 青岛海信电器股份有限公司 | Access control method, system and server |
CN104753677A (en) * | 2013-12-31 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Password hierarchical control method and system |
CN103973448A (en) * | 2014-04-22 | 2014-08-06 | 贵州中科汉天下电子有限公司 | Operating authorization method and system based on dynamic two-dimensional code |
CN104202298A (en) * | 2014-07-30 | 2014-12-10 | 北京乐动卓越信息技术有限公司 | System and method of login with single account and multiple passwords |
CN105205898A (en) * | 2015-10-22 | 2015-12-30 | 深圳优方网络技术有限公司 | Electronic code permission management system for intelligent lock |
CN106506442A (en) * | 2016-09-14 | 2017-03-15 | 上海百芝龙网络科技有限公司 | A kind of smart home multi-user identification and its Rights Management System |
CN106355385A (en) * | 2016-09-25 | 2017-01-25 | 上海锐得电子有限公司 | Novel two-dimensional code payment method for electronic scale |
CN106357653A (en) * | 2016-09-27 | 2017-01-25 | 深圳市欧瑞博电子有限公司 | Control authority sharing method and system |
CN106973060A (en) * | 2017-04-21 | 2017-07-21 | 宁波公众信息产业有限公司 | A kind of video monitoring system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11397829B2 (en) | Method for handling privacy data | |
US20200153868A1 (en) | Converged logical and physical security | |
CN103763319B (en) | Method for safely sharing mobile cloud storage light-level data | |
CN105931337A (en) | Electronic lock device and system and authorizing method of electronic lock system | |
KR20110067257A (en) | Secure management server and video data managing method of secure management server | |
CN105261096A (en) | Network smart lock system | |
CN103327084A (en) | Public and private hybrid distributed cloud storage system and cloud storage method | |
CN109347865A (en) | A kind of user data authentication based on block chain technology deposits the method and system of card | |
CN103795539B (en) | ID number generation method, allocation method, control method, device and system | |
CN106101140B (en) | A kind of method and server of authentification of message | |
CN108959906A (en) | Data capture method, mobile terminal, electronic equipment, producing line calibration system, readable storage medium storing program for executing and computer equipment | |
CN113240836A (en) | Bluetooth lock connection method adopting two-dimensional code and related configuration system | |
CN106713224B (en) | Document authority control method | |
CN109361936A (en) | The system and method that safety shares smart machine | |
CN106296926A (en) | A kind of based on the Intelligent entrance guard control system authorized in limited time and method | |
KR20140137084A (en) | System and method for providing video by closed-circuit television | |
CN109286600A (en) | Access control method and device in a kind of video monitoring system | |
CN108681779A (en) | Transmission facility information-reading method and transmission facility information system | |
Park | USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework. | |
CN107172046A (en) | A kind of approaches to IM, equipment and system | |
AU2012216309A1 (en) | Logical and physical security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190219 |