CN113656770A - Authorization processing method and device, electronic equipment and computer readable storage medium - Google Patents

Authorization processing method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN113656770A
CN113656770A CN202110898765.1A CN202110898765A CN113656770A CN 113656770 A CN113656770 A CN 113656770A CN 202110898765 A CN202110898765 A CN 202110898765A CN 113656770 A CN113656770 A CN 113656770A
Authority
CN
China
Prior art keywords
account
server
authorization
virtual machine
authorizing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110898765.1A
Other languages
Chinese (zh)
Inventor
张文华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202110898765.1A priority Critical patent/CN113656770A/en
Publication of CN113656770A publication Critical patent/CN113656770A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1078Logging; Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Abstract

The invention discloses an authorization processing method, an authorization processing device, electronic equipment and a computer readable storage medium. Wherein, the method comprises the following steps: logging in a first virtual machine on a server through a first account; receiving an authorization request for a second account; and responding to the authorization request, and performing authorization processing on the operation of the second account on the server. The invention solves the technical problem that the use authority of the computer cannot be flexibly managed when the computer is used in the related technology.

Description

Authorization processing method and device, electronic equipment and computer readable storage medium
Technical Field
The present invention relates to the field of computers, and in particular, to an authorization processing method, an authorization processing apparatus, an electronic device, and a computer-readable storage medium.
Background
The current phenomenon that teenagers are addicted to computer games and cannot dial themselves when using computers has already become a difficult problem in the current society. Related departments also clearly put forward the requirements for controlling the network use of the teenagers, and the problem that the indulgence of computer games delays the academic industry is prevented. For the above problems, in the computer login mode in the related art, regardless of a physical machine or a virtual machine, children in each age group have the same authority for using the computer, so that the management and control by parents cannot be well performed, and the problem that the use authority of the computer cannot be flexibly managed can occur.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides an authorization processing method, an authorization processing device, electronic equipment and a computer readable storage medium, which at least solve the technical problem that the use permission of a computer cannot be flexibly managed when the computer is used in the related technology.
According to an aspect of an embodiment of the present invention, there is provided an authorization processing method, including: logging in a first virtual machine on a server through a first account; receiving an authorization request for a second account; and responding to the authorization request, and performing authorization processing on the operation of the second account on the server.
Optionally, the authorizing the operation of the second account on the server includes: authorizing a login operation of the second account on a second virtual machine on the server, and authorizing an operation right of the second account on the second virtual machine.
Optionally, the authorizing the operation right of the second account on the second virtual machine includes: a list of applications that the second account is authorized to allow access on the second virtual machine.
Optionally, the authorizing the second account for a list of applications allowed to be accessed on the second virtual machine includes: and authorizing the second account to allow access to the access duration of the application in the application list.
Optionally, the authorizing the operation of the second account on the server includes: authorizing operation of an application display interface of the first virtual machine on the server for the second account.
Optionally, the operation of authorizing the application display interface of the first virtual machine of the second account on the server includes: and authorizing the operation duration of the second account in the application display interface operation.
Optionally, after the operation of authorizing the second account on the application display interface of the first virtual machine on the server, the method further includes: receiving operation content of the second account on the application display interface, and sending the operation content to the first virtual machine; and receiving response content of the first virtual machine to the operation content, and sending the response content to a display corresponding to the second account.
Optionally, after performing authorization processing on the operation of the second account on the server, the method further includes: receiving an end authorization request; based on the end authorization request, ending authorization of operation of the second account on the server.
According to another aspect of the embodiments of the present invention, there is provided an authorization processing method, including: receiving a login request of a first account; responding to the login request, and controlling the first account to log in a first virtual machine of a server; receiving an authorization request for a second account; sending the authorization request to the first account; and if the first account accepts the authorization request, performing authorization processing on the operation of the second account on the server.
Optionally, the authorizing the operation of the second account on the server includes: authorizing a login operation of the second account on a second virtual machine on the server, and authorizing an operation right of the second account on the second virtual machine; or authorizing operation of an application display interface of the first virtual machine on the server by the second account.
Optionally, after performing authorization processing on the operation of the second account on the server, the method further includes: receiving an end authorization request; based on the end authorization request, ending authorization of operation of the second account on the server.
According to another aspect of the embodiments of the present invention, there is provided an authorization processing apparatus including: the first login module is used for logging in a first virtual machine on the server through a first account; the first receiving module is used for receiving an authorization request of a second account; and the first authorization module is used for responding to the authorization request and carrying out authorization processing on the operation of the second account on the server.
According to another aspect of the embodiments of the present invention, there is provided an authorization processing apparatus including: the second receiving module is used for receiving a login request of the first account; the second login module is used for responding to the login request and controlling the first account to log in a first virtual machine of the server; the receiving module is used for receiving an authorization request of a second account; a sending module, configured to send the authorization request to the first account; and the second authorization module is used for carrying out authorization processing on the operation of the second account on the server under the condition that the first account accepts the authorization request.
According to another aspect of an embodiment of the present invention, there is provided an electronic apparatus including: a processor; a memory for storing the processor-executable instructions; wherein the processor is configured to execute the instructions to implement any of the authorization processing methods.
According to another aspect of embodiments of the present invention, there is provided a computer-readable storage medium, in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform any one of the authorization processing methods.
According to another aspect of embodiments of the present invention, there is provided a computer program product comprising a computer program which, when executed by a processor, implements any one of the authorization processing methods.
In the embodiment of the invention, the purpose of authorizing the operation of the second account on the server is achieved by receiving and responding to the authorization request of the second account, so that the technical effect of managing and controlling the operation of the second account on the server by the first account is realized, and the technical problem that the use permission of a computer cannot be flexibly managed when the computer is used in the related technology is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow chart of a first authorization processing method according to an embodiment of the invention;
FIG. 2 is a flowchart of a second authorization processing method according to an embodiment of the invention;
fig. 3 is a block diagram of a device in an authorized sub-machine login method according to an alternative embodiment of the present invention;
fig. 4 is an interaction diagram of a terminal and a server in an authorized sub-machine login method according to an alternative embodiment of the present invention;
fig. 5 is an interface interaction diagram of an authorized sub-machine login method according to an alternative embodiment of the present invention;
FIG. 6 is a block diagram of an apparatus in an authorization application method according to an alternative embodiment of the present invention;
FIG. 7 is an interface interaction diagram of an authorization application method provided by an alternative embodiment of the invention;
FIG. 8 is a block diagram of a first authorization processing device according to an embodiment of the invention;
FIG. 9 is a block diagram of a second authorization processing device according to an embodiment of the invention;
FIG. 10 is a block diagram illustrating the structure of a terminal in accordance with one exemplary embodiment;
FIG. 11 is a block diagram illustrating the structure of a server in accordance with an exemplary embodiment.
Detailed Description
In accordance with an embodiment of the present invention, there is provided an embodiment of an authorization processing method, it should be noted that the steps illustrated in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and that while a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be executed in an order different than that herein.
Fig. 1 is a flowchart of a first authorization processing method according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S102, logging in a first virtual machine on a server through a first account;
step S104, receiving an authorization request of a second account;
and step S106, responding to the authorization request, and performing authorization processing on the operation of the second account on the server.
Through the steps, for the client side, the purpose of authorizing the operation of the second account on the server is achieved by receiving and responding to the authorization request of the second account, so that the technical effect that the operation of the second account on the server is controlled by the first account is achieved, and the technical problem that the use permission of a computer cannot be flexibly controlled when the computer is used in the related technology is solved.
As an alternative embodiment, a first virtual machine on the server is logged in through a first account. And logging in a first account on a first virtual machine of the server, and carrying out subsequent management and control operation processing after logging in the first account. The first account may be an account having a capability of managing and controlling a second account, and the second account may be an account having a computer usage requirement, and may be users with different identities based on different application scenarios, for example, in an educational learning scenario, the first account may be a parent or a teacher, and manages and controls the right of the second account, i.e., a child, to use the network; in the scene of online examination, the first account can be an examiner, controls the second account, namely a student, the examination question and the application limit in the examination process; and so on. It should be noted that the first account may control one or more second accounts, and the second accounts may also be controlled by one or more first accounts, for example, in an educational learning scenario, the first account may be multiple parents or teachers, and the second account may be multiple children managed by parents or teachers. The correspondence between the first account and the second account may be stored in a database for retrieval at the time of use.
As an optional embodiment, an authorization request of the second account is received, where the authorization request of the second account may include a request for authorizing to use the virtual machine, or may also be a request for authorizing to use the application, the content of the authorization request may be determined according to the identity of the user using the second account and the requirement of the actual application, the second account may select the authority of the authorization request when requesting, and the first account may also select the authority of the authorization request based on the authorization request of the second account when authorizing. The second account authorization request may be obtained by responding to a keyboard or mouse operation of the second account user, or a touch operation of the display screen, and the like, and recording a position coordinate and an operation of the keyboard, the mouse, or the touch operation of the display screen, so as to generate an authorization request, and ensure that the authorization request is generated based on a behavior operation of the second account user. The second account user can reasonably require the authorization authority according to the requirement of practical application, and the computer resources can be reasonably used after the authority is acquired.
As an alternative embodiment, the operation of the second account on the server is authorized in response to the authorization request. And the client performs authorization processing on the operation of the second account on the server by responding to an authorization request of the second account, wherein the operation of the second account on the server is based on the authorization request, and the authorized operation can be executed. The first account may set the associated content for authorization when the client responds to the authorization request. The setting can be performed in various ways, for example, responding to a keyboard or mouse operation of a first account user or a touch operation on a display screen, recording position coordinates and operations of the keyboard, the mouse or the touch operation on the display screen, selecting authorized content based on an operation that a second user needs to perform on a server, performing authorization processing on an operation of a second account on the server, and giving permission to the operation of the second account so as to use computer resources.
As an alternative embodiment, the authorization process is performed on the second account operating on the server, and the authorization content includes multiple types, for example: authorizing a login operation of the second account on the second virtual machine on the server, and authorizing an operation right of the second account on the second virtual machine. The second account logs in on the second virtual machine, so that the second account can be applied to the whole computer system, and the first account can also set the operation authority of the virtual machine to limit the operation authority of the second account on the computer system. On the premise of giving sufficient computer resources to the second account, certain permission is selected and set to limit related operations on the second account, so that the second account can better focus on the affairs allowed to be operated by the first account, and better learning and application can be performed.
As an alternative embodiment, the operation right of the second account on the second virtual machine is authorized, and the operation right includes many, for example: a list of applications that the second account is authorized to allow access on the second virtual machine. By setting the application list allowing access, the second account can execute corresponding tasks by using authorized applications after login, and the situations of completion delay or lacked of the login task caused by attraction of other things in the computer system are avoided. The operation authority of the second account can be managed more finely.
As an alternative embodiment, the list of applications that the second account is authorized to allow access on the second virtual machine, and more detailed content may also be authorized, such as: granting the second account access to the application on the application list for the duration of the access. Any application can be used with certain limitation, and different access duration limitations can be performed in different application scenes to achieve different purposes. For example, in the scene of educational learning, the second account user can learn the web lesson, and the access duration of a half day or other time can be set to prevent the phenomenon that the second account user is overworked; in the scene of online examination, the second account user performs online examination, the access duration of the specified time can be set, and the answer time is prevented from being delayed by the second account user when the access duration reaches the first time; in the entertainment scene, the second account user plays games to play entertainment, the access duration of one hour can be set, and the second account user is prevented from indulging the games, and the like. Certain access duration is set for the application based on different scenes, and a better management and control effect can be achieved.
As an alternative embodiment, the authorization processing for the operation of the second account on the server may also be performed in the following manner: authorizing operation of an application display interface of the first virtual machine on the server for the second account. In the authorization method, the second account has no independent computer system and operates by acquiring the application interface of the first virtual machine, so that the application in the first virtual machine can be operated. The phenomenon that the second account user cannot process a complex computer system can be effectively avoided, and only the application needs to be operated. Namely, a plurality of interfaces can be controlled and displayed in one virtual machine, wherein the plurality of interfaces are used for operating and displaying a first account and a second account. And displaying a plurality of interfaces on a plurality of displays so that the first account and the second account execute corresponding operation contents.
As an alternative embodiment, the operation of authorizing the second account on the application display interface of the first virtual machine on the server also includes the authorization content in the above method, for example: and authorizing the operation duration of the second account in the application display interface operation. Certain access duration is set for the application based on different scenes, and a better management and control effect can be achieved.
As an optional embodiment, after the operation of authorizing the application display interface of the first virtual machine of the second account on the server, the method further includes: receiving operation content of the second account on an application display interface, and sending the operation content to the first virtual machine; and receiving response content of the first virtual machine to the operation content, and sending the response content to a display corresponding to the second account. Because the first account and the second account share one virtual machine, the operation content of the second account on the application display interface is sent to the virtual machine, and the virtual machine sends the response content to the display corresponding to the second account after responding, so as to be reflected in the application display interface operated by the second user. The purpose that the same virtual machine can control different displays to display different operation interfaces is achieved.
As an optional embodiment, after performing the authorization process on the operation of the second account on the server, the method further includes: receiving an end authorization request; based on the end authorization request, authorization of operation of the second account on the server is ended. In the above-mentioned multiple authorization methods, after the authorization request, an authorization ending operation may also be performed. When the operation duration is set, automatically triggering an authorization ending request to end the authorization of the operation of the second account on the server when the operation duration is reached; when the operation duration is not set or the set operation duration is not reached, both the first account and the second account can initiate an authorization ending request to end the authorization of the operation of the second account on the server. The method and the system can ensure that the first account can also manage the ending operation of the second account, and realize more effective management and control of the second account.
Fig. 2 is a flowchart of a second authorization processing method according to embodiment 1 of the present invention, as shown in fig. 2, the method includes the following steps:
step S202, receiving a login request of a first account;
step S204, responding to the login request, and controlling the first account to log in a first virtual machine of the server;
step S206, receiving an authorization request of a second account;
step S208, sending the authorization request to the first account;
step S210, if the first account accepts the authorization request, perform authorization processing on the operation of the second account on the server.
Through the steps, for one side of the server, the authorization request of the second account is received and responded by receiving and responding the login request of the first account, and the authorization processing of the second account on the server is carried out under the condition of receiving the authorization, so that the purpose of authorizing the operation of the second account on the server is achieved, the technical effect of controlling the operation of the second account on the server by the first account is realized, and the technical problem that the use permission of the computer cannot be flexibly managed when the computer is used in the related technology is solved.
As an alternative embodiment, a login request for a first account is received. And logging in a first account on a first virtual machine of the server, and carrying out subsequent management and control operation processing after logging in the first account. And controlling the first account to log in the first virtual machine of the server in response to the login request. After the first account logs in the first virtual machine, the first account can subsequently receive an authorization request so as to perform management and control operation processing.
As an optional embodiment, an authorization request of the second account is received, that is, an operation of requesting authorization by the second account is received, the authorization request of the second account may include a request of authorizing to use the virtual machine, or may also be a request of authorizing to use the application, the content of the authorization request may be determined according to the identity of the user using the second account and the requirement of the actual application, the obtaining of the authorization request of the second account may be performed by recording position coordinates and operations of a keyboard, a mouse, or a touch on a display screen, etc. in response to a keyboard or a mouse operation of the user using the second account, or a touch operation on the display screen, etc., so as to generate the authorization request, and it is ensured that the authorization request is generated based on a behavior operation of the user using the second account. The second account user can reasonably require the authorization authority according to the requirement of practical application, and the computer resources can be reasonably used after the authority is acquired.
As an alternative embodiment, the authorization request is sent to the first account. The method by which the authorization request is sent to the first account is different among different authorization methods. And responding to the authorization request by the first account, and performing authorization processing on the operation of the second account on the server. And the client performs authorization processing on the operation of the second account on the server by responding to an authorization request of the second account, wherein the operation of the second account on the server is based on the authorization request, and the authorized operation can be executed. The first account may set the associated content for authorization when the client responds to the authorization request.
As an alternative embodiment, in the case that the first account accepts the authorization request, the authorization processing is performed on the operation of the second account on the server. For example, the second account is authorized to access the application list allowed on the second virtual machine, and the second account is authorized to access the access duration of the application in the application list. Authorizing operation of the second account on the application display interface of the first virtual machine on the server, authorizing operation of the second account on the application display interface for a long time, and so on.
As an alternative embodiment, the authorizing process for the operation of the second account on the server includes: authorizing a login operation of a second virtual machine of the second account on the server, and authorizing an operation permission of the second account on the second virtual machine; alternatively, operation of the application display interface of the first virtual machine on the server for the second account is authorized. The second account logs in on the second virtual machine, so that the second account can be applied to the whole computer system, and the first account can also set the operation authority of the virtual machine to limit the operation authority of the second account on the computer system. On the premise of giving sufficient computer resources to the second account, certain permission is selected and set to limit related operations on the second account, so that the second account can better focus on the affairs allowed to be operated by the first account, and better learning and application can be performed. In the method for authorizing the operation of the second account on the application display interface of the first virtual machine on the server, the second account has no independent computer system and operates by acquiring the application interface of the first virtual machine, so that the application in the first virtual machine can be operated. The phenomenon that the second account user cannot process a complex computer system can be effectively avoided, and only the application needs to be operated. Namely, a plurality of interfaces can be controlled and displayed in one virtual machine, wherein the plurality of interfaces are used for operating and displaying a first account and a second account. And displaying a plurality of interfaces on a plurality of displays so that the first account and the second account execute corresponding operation contents.
As an optional embodiment, after performing the authorization process on the operation of the second account on the server, the method further includes: receiving an end authorization request; based on the end authorization request, authorization of operation of the second account on the server is ended. When the operation duration is set, automatically triggering an authorization ending request to end the authorization of the operation of the second account on the server when the operation duration is reached; when the operation duration is not set or the set operation duration is not reached, both the first account and the second account can initiate an authorization ending request to end the authorization of the operation of the second account on the server. The method and the system can ensure that the first account can also manage the ending operation of the second account, and realize more effective management and control of the second account.
Based on the above embodiments and alternative embodiments, an alternative implementation is provided, which is described in detail below.
The current phenomenon that teenagers are addicted to computer games and cannot dial by themselves becomes a difficult problem in the current society. The requirement of developing a master-slave machine is provided for controlling the use of computers by teenagers and preventing the study delay due to the fact that the teenagers are indulged in computer games. In the related art, the current computer login mode, whether a physical machine or a virtual machine, cannot well realize a master-slave mode by means of parental control. The login and the use of the sub-machine are completely not controlled by parents, and children in all ages have the same authority for using the computer, so that not only is the resource waste caused, but also the teenagers are easy to contact with bad contents and operation. The physical and mental damage to teenagers is great.
In view of this, an optional embodiment of the present invention provides a scheme for controlling use of a parent machine, where based on a scenario that a parent controls use and application of a child, different control modes can be selected for children of different ages, and the scheme mainly includes: login authorization control and application control.
Login authorization management and control:
users who have more complex operational requirements for computer systems, such as teenagers, older children, for example, may need to switch between multiple software applications, and the operating system needs to have sufficient control over the applications. Under the condition that autonomous operation learning demands exist, login authorization management and control can be adopted. The login needs the authorization of the master machine (the master end), the slave machine can be operated automatically after the login, the logged-in slave machine is an independent operating system, and the parents do not have the right to carry out remote control after the login. The submachine and the master machine belong to the same account, and the master machine has the right of controlling the login authority of the submachine. I.e. when the master logs in, the slave can be authorized. The slave computer needs to log in, and the master computer must log in first and then be authorized to log in. The master machine also has the authority to finish the authorization of the slave machine, namely after the master machine is used for a period of time, the master machine can finish the authorization, and the time and the authority of the child for using the computer are effectively controlled.
Application management and control:
users who do not have more complicated operating requirements for the computer system, for example, children of a low age, are less likely to operate the computer system, but have learning requirements, such as a web lesson, and only need to use web lesson software. In the case where only part of the application needs to be used, the manner of application management and control may be adopted. After the parent logs in, the parent issues the corresponding application software to the sub-machine (child end), and the sub-machine end only displays the issued application program and the operation right of the application program. The method can also effectively control the use of the computer by the children.
The following two control methods are introduced:
fig. 3 is a block diagram of a structure of a device in an authorized handset login method according to an optional embodiment of the present invention, fig. 4 is an interaction diagram of a terminal and a server in the authorized handset login method according to the optional embodiment of the present invention, which shows an interaction flow between the terminal and the server, fig. 5 is an interface interaction diagram of the authorized handset login method according to the optional embodiment of the present invention, and as shown in fig. 3, 4, and 5, the authorized handset login method according to the optional embodiment of the present invention is described below:
s1, registering the homegrown machine (mother machine);
the USER1 (parent USER) logs in to the VM1 of the server through the parent account name USER1 (USER name of parent USER) and R1, and the USER2 (child USER) can log in to the VM2 of the server through the child account name USER2 (USER name of child USER) and R2 after the login is successful.
The display 1 of the parent machine (parent machine) displays a parent machine operation screen as shown at the end R1 in fig. 3 and 4, and the display 2 of the child machine (child machine) displays a child machine operation screen as shown at the end R2 in fig. 3 and 4.
S2, the child machine (sub machine) applies for authorization to the parent machine (main machine)
Specifically, the R2 side sends an authorization request to the VM 2; wherein, the authorization request carries the sub-account name of R2. VM2 parses the authorization request and queries the database for the parent account name corresponding to the child account name, and forwards the authorization request to VM1 corresponding to the parent account name.
S3, the parental machine (mother machine) agrees to authorization;
the VM1 pushes a screen to the host computer whether to accept the authorization request, and the parent user can select to approve the authorization or reject the authorization through a keyboard and mouse operation, a display touch screen operation, or the like. If authorization is granted, the VM2 turns on work and the child user can operate on the child machine. If authorization is denied, VM2 is idle and not running.
S4, logging in the desktop of the system by the child machine (the sub machine) and operating normally;
note that in this process, VM1 and VM2 each operate independently. The host machine may set permissions for the VM2, such as a list of applications that may be opened, a length of time that an application is used, and the like. For example, a white list, that is, a list of accessible applications, english learning software, question searching software, etc. may be set, and each application may also be set to have a corresponding accessible time period.
S5, the parental computer (mother computer) finishes authorization;
s6, the child user clicks the ending authorization by operating on the display 1, generates an ending authorization request and sends the ending authorization request to the VM1, the VM1 inquires whether the bound VM2 is online, and if so, the VM2 is controlled to exit; if not, the process ends. The child machine (slave machine) quits the login.
It should be noted that steps S5 and S6 may be performed simultaneously or in a combined manner.
Fig. 6 is a block diagram of a structure of a device in an authorization application method according to an alternative embodiment of the present invention, fig. 7 is an interface interaction diagram of the authorization application method according to the alternative embodiment of the present invention, and as shown in fig. 6 and 7, the authorization application method according to the alternative embodiment of the present invention is described in detail below:
s1, registering the homegrown machine (mother machine);
USER1 (parent USER) logs in to VM1 of the server at R1 by account name USER1 (parent USER's username). If the sub-machine function is not opened, the VM1 runs the system to push a display screen, which is the display screen of the main machine. If the slave function is turned on, the VM1 runs on two screens, one is a master display screen and the other is a slave display screen.
S2, logging in the child machine (slave machine);
the login process is operated on the parent machine. Before the slave unit is not registered, the VM1 pushes a display screen of the master unit. In this screen, the parent user can select to log in the slave unit. Specifically, the R1 end may respond to a keyboard or mouse message of a child user, record position coordinates and operations of a keyboard and a mouse, generate a request for logging in a slave device, and send the request to the VM1, and if the VM1 detects that the request is for logging in the slave device, the VM1 side generates two frames, which is equivalent to running two virtual systems, one system is used for displaying frames on the master device, and the other system is used for displaying frames on the slave device.
S3, the parent machine (the master machine) sends an application desktop to the child machine;
the R1 terminal on the master machine can send the sub machine interface data of the VM1 to the receiving terminal corresponding to the sub machine, and the sub machine interface data is displayed by the sub machine display after being decoded.
S4, the child machine (sub machine) receives the application desktop, and can operate the application;
the end R2 is also connected with a keyboard or a mouse or a display screen. The keyboard and mouse message at the R2 end may be sent to the soft S in the R1 end and sent by the soft S to VM 1. The keymouse message at the R1 end is sent directly to VM 1. Wherein, the keyboard and mouse message at the end R1 and the keyboard and mouse message at the end R2 can be distinguished by different identifiers. The keyboard and mouse message at the end R1 additionally carries the position message and the operation content operated by the user, and the keyboard and mouse message at the end R2 additionally carries the position message and the operation content operated by the sub-user. Two sets of virtual systems operated by the VM1 can respectively recognize and respond to two sets of keyboard and mouse messages, and then push updated interfaces to the R1 terminal and the R2 terminal.
S5, the parental computer (the master computer) finishes sharing the application desktop;
the parent user can operate through the R1 end to finish the sharing of the desktop application. Specifically, a request is sent to log out of the slave unit.
And S6, the child machine (sub machine) moves back to the static desktop without any sharing application desktop display.
Similar to the previous embodiment, the user can set the operation authority of the sub-user, such as the operation time, the operation duration, the application that can be operated, and the like.
Through the above alternative embodiment, at least the following advantages can be achieved:
(1) reasonably controlling the time of the child using the computer;
(2) the application of using the computer by the child is reasonably controlled.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
Example 2
According to an embodiment of the present invention, there is further provided an apparatus for implementing the first authorization processing method, fig. 8 is a block diagram of a first authorization processing apparatus according to an embodiment of the present invention, and as shown in fig. 8, the apparatus includes: a first login module 802, a first receiving module 804 and a first authorization module 806, which are described in detail below.
A first login module 802, configured to log in a first virtual machine on a server through a first account; a first receiving module 804, connected to the first login module 802, for receiving an authorization request of a second account; the first authorization module 806 is connected to the first receiving module 804, and configured to perform authorization processing on the server for the second account in response to the authorization request.
It should be noted that the first login module 802, the first receiving module 804 and the first authorization module 806 correspond to steps S102 to S106 in the first authorization processing method, and the modules are the same as the corresponding steps in the implementation example and application scenario, but are not limited to the disclosure in embodiment 1.
Example 3
According to an embodiment of the present invention, there is further provided an apparatus for implementing the second authorization processing method, fig. 9 is a block diagram of a second authorization processing apparatus according to an embodiment of the present invention, and as shown in fig. 9, the apparatus includes: a second receiving module 902, a second logging module 904, a receiving module 906, a sending module 908, and a second authorizing module 910, which are described in detail below.
A second receiving module 902, configured to receive a login request of a first account; a second login module 904, connected to the second receiving module 902, for responding to the login request and controlling the first account to log in to the first virtual machine of the server; a receiving module 906, connected to the second login module 904, for receiving an authorization request of a second account; a sending module 908, connected to the receiving module 906, for sending the authorization request to the first account; and a second authorization module 910, connected to the sending module 908, for performing authorization processing on the operation of the second account on the server when the first account accepts the authorization request.
It should be noted that the second receiving module 902, the second login module 904, the receiving module 906, the sending module 908, and the second authorization module 910 correspond to steps S202 to S210 in the second authorization processing method, and a plurality of modules are the same as the corresponding steps in the implementation example and the application scenario, but are not limited to the disclosure in the embodiment 1.
Example 4
The embodiment of the disclosure can provide an electronic device, which can be a terminal or a server. In this embodiment, the electronic device may be any one of computer terminal devices in a computer terminal group as a terminal. Optionally, in this embodiment, the terminal may also be a terminal device such as a mobile terminal.
Optionally, in this embodiment, the terminal may be located in at least one network device of a plurality of network devices of a computer network.
Alternatively, fig. 10 is a block diagram illustrating a structure of a terminal according to an exemplary embodiment. As shown in fig. 10, the terminal may include: one or more processors (only one shown) 101, a memory 102 for storing processor-executable instructions; wherein the processor is configured to execute the instructions to implement any of the authorization processing methods described above.
The memory may be configured to store software programs and modules, such as program instructions/modules corresponding to the authorization processing method and apparatus in the embodiments of the disclosure, and the processor executes various functional applications and data processing by running the software programs and modules stored in the memory, so as to implement the authorization processing method. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the computer terminal through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The processor can call the information and application program stored in the memory through the transmission device to execute the following steps: logging in a first virtual machine on a server through a first account; receiving an authorization request for a second account; and responding to the authorization request, and performing authorization processing on the operation of the second account on the server.
Optionally, the processor may further execute the program code of the following steps: authorizing operation of the second account on the server, comprising: authorizing a login operation of the second account on the second virtual machine on the server, and authorizing an operation right of the second account on the second virtual machine.
Optionally, the processor may further execute the program code of the following steps: authorizing operating permissions of the second account on the second virtual machine, including: a list of applications that the second account is authorized to allow access on the second virtual machine.
Optionally, the processor may further execute the program code of the following steps: a list of applications for which the second account is authorized to allow access on the second virtual machine, comprising: granting the second account access to the application on the application list for the duration of the access.
Optionally, the processor may further execute the program code of the following steps: authorizing operation of the second account on the server, comprising: authorizing operation of an application display interface of the first virtual machine on the server for the second account.
Optionally, the processor may further execute the program code of the following steps: authorizing operation of an application display interface of a first virtual machine on a server for a second account, comprising: and authorizing the operation duration of the second account in the application display interface operation.
Optionally, the processor may further execute the program code of the following steps: after the operation of authorizing the second account on the application display interface of the first virtual machine on the server, further comprising: receiving operation content of the second account on an application display interface, and sending the operation content to the first virtual machine; and receiving response content of the first virtual machine to the operation content, and sending the response content to a display corresponding to the second account.
Optionally, the processor may further execute the program code of the following steps: after the authorization processing of the operation of the second account on the server, the method further comprises the following steps: receiving an end authorization request; based on the end authorization request, authorization of operation of the second account on the server is ended.
In the embodiment of the present disclosure, the electronic device serves as a server, and fig. 11 is a block diagram illustrating a structure of a server according to an exemplary embodiment. As shown in fig. 11, the server 110 may include: one or more (only one shown) processing components 111, a memory 112 for storing instructions executable by the processing components 111, a power supply component 113 for supplying power, a network interface 114 for implementing communication with an external network, and an I/O input/output interface 115 for data transmission with the outside; wherein the processing component 111 is configured to execute instructions to implement any of the authorization processing methods described above.
The memory may be configured to store software programs and modules, such as program instructions/modules corresponding to the authorization processing method and apparatus in the embodiments of the disclosure, and the processor executes various functional applications and data processing by running the software programs and modules stored in the memory, so as to implement the authorization processing method. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the computer terminal through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The processing component can call the information and the application program stored in the memory through the transmission device to execute the following steps: receiving a login request of a first account; responding to the login request, and controlling the first account to log in a first virtual machine of the server; receiving an authorization request for a second account; sending an authorization request to the first account; and in the case that the first account accepts the authorization request, performing authorization processing on the operation of the second account on the server.
Optionally, the processing component may further execute program codes of the following steps: authorizing operation of the second account on the server, comprising: authorizing a login operation of a second virtual machine of the second account on the server, and authorizing an operation permission of the second account on the second virtual machine; alternatively, operation of the application display interface of the first virtual machine on the server for the second account is authorized.
Optionally, the processing component may further execute program codes of the following steps: after the authorization processing of the operation of the second account on the server, the method further comprises the following steps: receiving an end authorization request; based on the end authorization request, authorization of operation of the second account on the server is ended.
It can be understood by those skilled in the art that the structures shown in fig. 10 and fig. 11 are only schematic, for example, the terminal may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palmtop computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 10 and 11 do not limit the structure of the electronic device. For example, it may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in fig. 10, 11, or have a different configuration than shown in fig. 10, 11.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Example X
In an exemplary embodiment, there is also provided a computer-readable storage medium including instructions that, when executed by a processor of a terminal, enable the terminal to perform any one of the authorization processing methods described above. Alternatively, the computer readable storage medium may be a non-transitory computer readable storage medium, for example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Optionally, in this embodiment, the computer-readable storage medium may be configured to store program codes executed by the authorization processing method provided in the foregoing embodiment.
Optionally, in this embodiment, the computer-readable storage medium may be located in any one of a group of computer terminals in a computer network, or in any one of a group of mobile terminals.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: logging in a first virtual machine on a server through a first account; receiving an authorization request for a second account; and responding to the authorization request, and performing authorization processing on the operation of the second account on the server.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: authorizing operation of the second account on the server, comprising: authorizing a login operation of the second account on the second virtual machine on the server, and authorizing an operation right of the second account on the second virtual machine.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: authorizing operating permissions of the second account on the second virtual machine, including: a list of applications that the second account is authorized to allow access on the second virtual machine.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: a list of applications for which the second account is authorized to allow access on the second virtual machine, comprising: granting the second account access to the application on the application list for the duration of the access.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: authorizing operation of the second account on the server, comprising: authorizing operation of an application display interface of the first virtual machine on the server for the second account.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: authorizing operation of an application display interface of a first virtual machine on a server for a second account, comprising: and authorizing the operation duration of the second account in the application display interface operation.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: after the operation of authorizing the second account on the application display interface of the first virtual machine on the server, further comprising: receiving operation content of the second account on an application display interface, and sending the operation content to the first virtual machine; and receiving response content of the first virtual machine to the operation content, and sending the response content to a display corresponding to the second account.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: after the authorization processing of the operation of the second account on the server, the method further comprises the following steps: receiving an end authorization request; based on the end authorization request, authorization of operation of the second account on the server is ended.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: receiving a login request of a first account; responding to the login request, and controlling the first account to log in a first virtual machine of the server; receiving an authorization request for a second account; sending an authorization request to the first account; and in the case that the first account accepts the authorization request, performing authorization processing on the operation of the second account on the server.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: authorizing operation of the second account on the server, comprising: authorizing a login operation of a second virtual machine of the second account on the server, and authorizing an operation permission of the second account on the second virtual machine; alternatively, operation of the application display interface of the first virtual machine on the server for the second account is authorized.
Optionally, in this embodiment, the computer readable storage medium is configured to store program code for performing the following steps: after the authorization processing of the operation of the second account on the server, the method further comprises the following steps: receiving an end authorization request; based on the end authorization request, authorization of operation of the second account on the server is ended.
In an exemplary embodiment, a computer program product is also provided, in which the computer program, when executed by a processor of an electronic device, enables the electronic device to perform any of the authorization processing methods described above.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit may be a division of a logic function, and an actual implementation may have another division, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or may not be executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that it is obvious to those skilled in the art that various modifications and improvements can be made without departing from the principle of the present invention, and these modifications and improvements should also be considered as the protection scope of the present invention.

Claims (14)

1. An authorization processing method, comprising:
logging in a first virtual machine on a server through a first account;
receiving an authorization request for a second account;
and responding to the authorization request, and performing authorization processing on the operation of the second account on the server.
2. The method of claim 1, wherein the authorizing the operation of the second account on the server comprises:
authorizing a login operation of the second account on a second virtual machine on the server, and authorizing an operation right of the second account on the second virtual machine.
3. The method of claim 2, wherein the authorizing the second account for operating rights on the second virtual machine comprises:
a list of applications that the second account is authorized to allow access on the second virtual machine.
4. The method of claim 3, wherein authorizing the list of applications that the second account allows access to on the second virtual machine comprises:
and authorizing the second account to allow access to the access duration of the application in the application list.
5. The method of claim 1, wherein the authorizing the operation of the second account on the server comprises:
authorizing operation of an application display interface of the first virtual machine on the server for the second account.
6. The method of claim 5, wherein the operation of authorizing the second account on an application display interface of the first virtual machine on the server comprises:
and authorizing the operation duration of the second account in the application display interface operation.
7. The method of claim 5, further comprising, after the operation of authorizing the second account on an application display interface of the first virtual machine on the server:
receiving operation content of the second account on the application display interface, and sending the operation content to the first virtual machine;
and receiving response content of the first virtual machine to the operation content, and sending the response content to a display corresponding to the second account.
8. The method of any of claims 1 to 7, further comprising, after authorizing the operation of the second account on the server:
receiving an end authorization request;
based on the end authorization request, ending authorization of operation of the second account on the server.
9. An authorization processing method, comprising:
receiving a login request of a first account;
responding to the login request, and controlling the first account to log in a first virtual machine of a server;
receiving an authorization request for a second account;
sending the authorization request to the first account;
and if the first account accepts the authorization request, performing authorization processing on the operation of the second account on the server.
10. The method of claim 9, wherein the authorizing the operation of the second account on the server comprises:
authorizing a login operation of the second account on a second virtual machine on the server, and authorizing an operation right of the second account on the second virtual machine; alternatively, the first and second electrodes may be,
authorizing operation of an application display interface of the first virtual machine on the server for the second account.
11. The method of any of claims 9 to 10, further comprising, after authorizing the operation of the second account on the server:
receiving an end authorization request;
based on the end authorization request, ending authorization of operation of the second account on the server.
12. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the authorization processing method of any of claims 1 to 11.
13. A computer-readable storage medium, wherein instructions in the computer-readable storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the authorization processing method of any of claims 1 to 11.
14. A computer program product comprising a computer program, characterized in that the computer program realizes the authorization processing method of any of claims 1 to 11 when executed by a processor.
CN202110898765.1A 2021-08-05 2021-08-05 Authorization processing method and device, electronic equipment and computer readable storage medium Pending CN113656770A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110898765.1A CN113656770A (en) 2021-08-05 2021-08-05 Authorization processing method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110898765.1A CN113656770A (en) 2021-08-05 2021-08-05 Authorization processing method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113656770A true CN113656770A (en) 2021-11-16

Family

ID=78490416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110898765.1A Pending CN113656770A (en) 2021-08-05 2021-08-05 Authorization processing method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113656770A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115840937A (en) * 2023-02-21 2023-03-24 中科方德软件有限公司 Control method and device and electronic equipment
CN116702100A (en) * 2022-10-21 2023-09-05 荣耀终端有限公司 Authority management method and electronic equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116702100A (en) * 2022-10-21 2023-09-05 荣耀终端有限公司 Authority management method and electronic equipment
CN116702100B (en) * 2022-10-21 2024-04-16 荣耀终端有限公司 Authority management method and electronic equipment
CN115840937A (en) * 2023-02-21 2023-03-24 中科方德软件有限公司 Control method and device and electronic equipment

Similar Documents

Publication Publication Date Title
US11539687B2 (en) Message right management method, device and storage medium
CN106453066B (en) Group session processing method, terminal, server and system
US11159626B2 (en) Session transfer between resources
US11283805B2 (en) Cloud device account configuration method, apparatus and system, and data processing method
RU2438169C2 (en) Subsystem-context architecture for break-out rooms in virtual space
US10255819B2 (en) Systems for classroom media sharing
US10110587B2 (en) Entity to authorize delegation of permissions
CN105830389A (en) Single set of credentials for accessing multiple computing resource services
KR20170049513A (en) Shared session techniques
US11412011B1 (en) Methods, systems, apparatuses, and devices for facilitating interaction between users viewing same webpages and virtual locations
CN113656770A (en) Authorization processing method and device, electronic equipment and computer readable storage medium
CN110636057B (en) Application access method and device and computer readable storage medium
JP6335978B2 (en) System and method for providing a virtual communication session for some participants on a communication session
CN108280020A (en) Monitoring method, device, terminal and the computer storage media of computer equipment
CN112861472B (en) Shared document display method, device and equipment and computer readable storage medium
US20080229112A1 (en) Access controller
CN103841125A (en) Heath data sharing method and system
CN113656769A (en) Control method and device of master-slave unit and master-slave unit system
CN114844663A (en) Desktop sharing method, system, storage medium and equipment
CN111565382B (en) Transmission method and electronic equipment
CN110231965B (en) Cloud device, application processing method and electronic device
KR101170322B1 (en) Method and device for providing cloud computing service using personal computer based on web
US11971947B2 (en) Restricted editing and edit logging in a co-browse session
Abhinand et al. Study on the Development and Implementation of Ubiquitous Bots for the Discord Interface
US20230401277A1 (en) Restricted Editing and Edit Logging In A Co-Browse Session

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination