WO2018145266A1 - 权限控制方法、权限受控装置、电子设备及系统 - Google Patents
权限控制方法、权限受控装置、电子设备及系统 Download PDFInfo
- Publication number
- WO2018145266A1 WO2018145266A1 PCT/CN2017/073108 CN2017073108W WO2018145266A1 WO 2018145266 A1 WO2018145266 A1 WO 2018145266A1 CN 2017073108 W CN2017073108 W CN 2017073108W WO 2018145266 A1 WO2018145266 A1 WO 2018145266A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- rights
- control information
- authority
- areas
- controlled
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Definitions
- the technical solution disclosed by the present invention relates to the field of communications technologies, and in particular, to a rights control method, a rights controlled device, an electronic device, and a system.
- the privilege control has a high risk and the authority of the privileged controlled end cannot be controlled according to the physical location of the privileged controlled end, which becomes a technical problem to be solved urgently.
- the technical solution disclosed by the present invention can at least solve the following technical problems: the right control has a high risk and the authority of the controlled controlled end cannot be controlled according to the physical location of the controlled controlled end.
- One or more embodiments of the present invention disclose a rights control method, including: when the rights controlled end is in an effective area of the rights control information transmission, acquiring the rights control information;
- the interpretation mode is configured to interpret the authority control information into authority data for authentication; authenticating the authority data; and allowing the corresponding operation to be performed when the authentication is passed.
- the method further includes: determining whether a transmission path of the rights control information is a preset transmission path; and when the transmission path of the rights control information does not meet a preset transmission When the path is prohibited, the corresponding operation is prohibited.
- the method further includes: dividing the effective area of the rights control information transmission into N areas; and when the rights controlled end is in different areas of the N areas The rights control information acquired by the rights controlled end is different; wherein N is an integer of ⁇ 2.
- the method further includes: when the rights controlled end is located in any one of the N areas, the rights controlled end is acquired in different time periods The rights control information is different.
- the rights control information is obtained over a wireless network;
- the wireless network includes: a ZigBee signal network and/or a Bluetooth signal network and/or a WIFI signal network.
- One or more embodiments of the present invention disclose a rights control apparatus, including: a transceiver module, configured to acquire the rights control information when the rights controlled end is in an effective area of the rights control information transmission; a module, configured to interpret the authority control information into authority data for authentication according to a preset interpretation manner; an authentication module, configured to authenticate the authority data; and an application module, configured to When the right is passed, the corresponding operation is allowed.
- the authentication module is further configured to determine whether a transmission path of the rights control information is a preset transmission path; when the transmission path of the rights control information does not meet a preset The application module prohibits the execution of the corresponding operation.
- the effective area of the rights control information transmission is divided into N areas; when the rights controlled device is in different areas of the N areas, the transceiver module The obtained permission control information is different; wherein N is an integer of ⁇ 2.
- the rights control information acquired by the transceiver module in different time periods is different.
- One or more embodiments of the present invention disclose an electronic device including: at least one processor, and at least one memory; the at least one processor is communicatively coupled to the at least one memory; the at least one memory is stored An instruction executable by the at least one processor to cause the electronic device to perform any of the above described rights control methods.
- One or more embodiments of the present invention disclose a rights control system including at least one rights server and at least one rights controlled terminal; the at least one rights server is configured to generate and send rights control information; A permission controlled end is used to execute any of the above permission control methods.
- the at least one rights server includes at least one server and a base station of at least one wireless network; the at least one server is in communication connection with a base station of the at least one wireless network; At least one server is configured to generate the rights control information; and the base station of the at least one wireless network is configured to send the rights control information.
- the effective area for transmitting the rights control information is divided into N areas, and at least one base station of the wireless network is separately disposed in the N areas; the at least one server is the N The area generates different rights control information; the base station of the at least one wireless network sends the rights control information corresponding to the area where it is located; wherein N is an integer of ⁇ 2.
- the at least one server is the N regions Different time control segments generate different permission control information.
- the at least one server determines an area in which the at least one rights controlled terminal is located according to the rights control information received by the at least one rights controlled terminal.
- the at least one rights controlled terminal determines the area in which it is located according to the rights control information it receives.
- One or more embodiments of the present invention also disclose a non-transitory computer storage medium storing computer executable instructions for performing any of the above described rights control methods.
- the authority control information when the authority controlled end is in the effective area of the authority control information transmission, the authority control information is acquired. Therefore, when the rights controlled end moves out of the effective area of the rights control information transmission, the rights control information cannot be obtained, that is, the rights controlled terminal is limited to perform the corresponding operation. Then, the authority control information is interpreted as the authority data for authentication according to a preset interpretation manner. If the permission controlled end does not have a preset interpretation manner or the preset interpretation manner cannot interpret the authority control information as the authority data for authentication, the rights controlled terminal cannot perform the corresponding operation. The rights data is then authenticated; when the authentication is passed, the corresponding operations are allowed to be performed.
- the privilege control method can reduce the risk of privilege control, and control the privilege of the privileged controlled end according to the physical location of the privileged controlled end.
- FIG. 1 is a flowchart of a method for controlling authority in an embodiment of the present invention
- FIG. 2 is a schematic diagram of an electronic device according to another embodiment of the present invention.
- FIG. 3 is a schematic diagram of a rights controlled device according to another embodiment of the present invention.
- FIG. 4 is a schematic diagram of an authority control system in another embodiment of the present invention.
- FIG. 5 is a schematic diagram of an authority control system in another embodiment of the present invention.
- the permission control method is applied to the permission controlled end.
- the rights controlled terminal includes other communication device terminals such as a smart phone, a tablet computer, a notebook computer, and a wearable device.
- the permission control method includes:
- Step 101 Acquire the rights control information when the rights controlled end is in the effective area of the rights control information transmission.
- the effective area refers to a wireless network distribution area in which the rights controlled end can effectively receive the rights control information.
- Step 102 Interpret the authority control information into authority data for authentication according to a preset interpretation manner.
- Interpretation can be understood as the process by which a computer executes program instructions to calculate data.
- Step 103 Authenticate the authority data.
- Step 104 When the authentication is passed, the corresponding operation is allowed to be performed.
- the above method is applied to control the permission of the controlled controlled end to access a specific document.
- the permission controlled end needs to be moved into the effective area of the authority control information transmission.
- the authority controlled end can acquire the authority control information in the effective area of the authority control information transmission. If the privilege controlled end is not in the effective area of the privilege control information transmission, or the privilege controlled end cannot obtain the privilege control information, the user cannot access the specific document through the privileged controlled end.
- the rights control information is interpreted as the authority data for authentication according to a preset interpretation manner.
- the privilege controlled end does not have a preset interpretation manner or the preset interpretation manner cannot interpret the privilege control information as the privilege data for authentication, the user still cannot access the privileged controlled terminal. Describe a specific document. Accordingly, the method enhances the security of the privilege control by predefining the manner in which the privilege control information is interpreted at the privilege controlled end.
- the authority controlled end can interpret the authority control information into the authority data for authentication according to a preset interpretation manner, the authority data is further authenticated, and only when the authentication is passed Allows access to specific documents.
- the authenticating the rights data comprises: determining the Whether the permission data contains preset features. For example, it is determined whether the permission data includes a preset check code.
- the method further includes: determining whether a transmission path of the rights control information is a preset transmission path; and when the transmission path of the rights control information does not conform to a preset transmission path, It is forbidden to perform the corresponding operation. Accordingly, by defining the transmission path of the authority control information, it is advantageous to prevent forgery of the authority control information.
- the method further includes: dividing the effective area of the rights control information transmission into N areas; and when the rights controlled end is in different areas of the N areas, The authority control information acquired by the authority controlled end is different; wherein N is an integer of ⁇ 2. Accordingly, the irregularity of the privilege control information is enhanced, and conditions for positioning the privileged controlled end are also created.
- the effective area of the transmission of the rights control information is divided into two areas, namely an A area and a B area. Then, when the rights controlled end is in different areas of the two areas, the rights control information acquired by the rights controlled end is different. That is, the authority control information acquired by the authority controlled end in the A area is different from the authority control information acquired in the B area.
- the method further includes: when the rights controlled end is located in any one of the N areas, the rights acquired by the rights controlled end in different time periods Control information is different. Because the rights control information acquired by the rights controlled terminal is different in different time segments of the same area, the rights controlled terminal cannot use the same rights control information to perform corresponding authentication through authentication in different time periods. operating.
- the specific step of avoiding the permission controlled end from obtaining the authority control information in the effective area of the authority control information transmission is performed, and the corresponding operation is performed by using the already stored authority control information. Conducive to further enhance the security of access control.
- the method further comprises: obtaining the rights control information over a wireless network; the wireless network comprising: a ZigBee signal network and/or a Bluetooth signal network and/or WIFI Signal network.
- the scenario in which any of the foregoing permission control methods is applied includes: controlling access to a specific document, controlling the right to use a specific software, and controlling other application scenarios such as the right to use a software-specific function.
- the application scenario of the rights control method of the present invention is not limited to the above application scenarios.
- the rights control method disclosed in the embodiment of the present invention can perform rights control according to the physical location where the rights controlled end is located. It is assumed that the effective area for transmitting the rights control information is set as the office area of the company, and the user implements the above various application scenarios through devices such as a notebook computer and a mobile terminal. When the user carries the notebook computer, the mobile terminal, and the like to leave the office area of the company, the notebook computer, the mobile terminal, and the like carried by the user will not obtain the authority control information, and thus have no authority to perform the corresponding operation.
- the "specific document” may be a document containing company confidential information.
- the specific software may be software designed for a company's products or software for performing certain businesses of the company.
- the specific functions of some product design software cannot be used.
- the "specific function” may be a function of importing certain design parameters, or may be a function of automatically optimizing certain design elements.
- the electronic device includes other terminal devices such as a smart phone, a tablet computer, a notebook computer, and a wearable device.
- the electronic device includes: at least one processor 210, and at least one memory 220; the at least one processor 210 is communicatively coupled to the at least one memory 220.
- the connection by the bus 230 is taken as an example.
- the at least one memory 220 stores instructions executable by the at least one processor 210,
- the electronic device is used to perform any one of the above method embodiments.
- the memory 220 is a non-transitory computer readable storage medium that can be used to store non-transitory software programs, non-transitory computer executable programs, and the like.
- the processor 210 causes the electronic device to perform various functional applications and data processing by running non-transitory software programs, instructions stored in the memory 220.
- the memory 220 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data or the like.
- memory 220 can include high speed random access memory, and can also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device.
- memory 220 can optionally include memory remotely located relative to processor 210, which can be connected to the electronic device over a network.
- the electronic device further includes an input device and an output device.
- the input device can receive input digital or character information and generate a signal input.
- the output device may include a display device such as a display screen.
- the electronic device in the foregoing embodiment can implement the authority control on the electronic device by performing any one of the foregoing method embodiments, thereby reducing the risk of the rights control and facilitating the confidentiality of the information.
- FIG. 3 is a schematic diagram of a rights control device according to another embodiment of the present invention, for performing any one of the foregoing method embodiments.
- the rights controlled device includes:
- the transceiver module 310 is configured to acquire the rights control information when the rights controlled end is in the effective area of the rights control information transmission.
- the interpretation module 320 is configured to interpret the permission control information into permission data for authentication according to a preset interpretation manner.
- the authentication module 330 is configured to authenticate the authority data.
- the application module 340 is configured to allow a corresponding operation to be performed when the authentication is passed.
- the authentication module 330 is further configured to determine whether the transmission path of the rights control information is a preset transmission path; when the transmission path of the rights control information does not meet the preset transmission At the time of the path, the application module 340 prohibits execution of the corresponding operation.
- the effective area of the rights control information transmission is divided into N areas; when the rights controlled device is in different areas of the N areas, the transceiver module 310 acquires The permission control information is different; wherein N is an integer of ⁇ 2.
- the rights control information acquired by the transceiver module 310 in different time periods is different.
- the privilege controlled device in the foregoing embodiment exists in the privilege controlled end, and by performing any one of the foregoing method embodiments, the privilege control risk of the privileged controlled end is reduced, and the privilege controlled device can be The physical location to control the permissions of the rights controlled device.
- the privilege control system includes at least one privilege server and at least one privilege controlled end; the at least one privilege server is configured to generate and send privilege control information; and the at least one privilege controlled end is configured to execute the foregoing method embodiment Any of the permission control methods.
- FIG. 4 there is shown a schematic diagram of an access control system in accordance with another embodiment of the present invention.
- the authority controlled end When the authority controlled end is in the effective area of the authority control information transmission, the authority controlled end can acquire the authority control information.
- the authority controlled end interprets the authority control information into the authority data for authentication according to a preset interpretation manner, and then authenticates the authority data, and when the authentication passes, allows the corresponding operation to be performed.
- the rights controlled terminal When the rights controlled end moves out of the effective area of the rights control information transmission, the rights controlled terminal cannot obtain the rights control information. Therefore, the rights controlled terminal cannot perform the corresponding operation, thereby implementing the authority control on the rights controlled end.
- the at least one rights server includes at least one server and a base station of at least one wireless network; the at least one server is in communication connection with a base station of the at least one wireless network; the at least one server And configured to generate the rights control information; the base station of the at least one wireless network is configured to send the rights control information.
- the effective area for transmitting the rights control information is divided into N areas, and at least one base station of the wireless network is separately set in the N areas; the at least one server generates the N areas. Different rights control information; the base station of the at least one wireless network sends the rights control information corresponding to the area where it is located; wherein N is an integer of ⁇ 2. That is, the N areas form a mapping relationship with different rights control information.
- the at least one server generates different rights control information for different time periods of the N regions.
- the N areas form a mapping relationship with different rights control information, according to which the at least one server receives the rights control information according to the at least one rights controlled terminal. Determining an area in which the at least one authority controlled end is located.
- the at least one rights controlled terminal determines, according to the rights control information it receives, region.
- the authority control system divides the effective area of the authority control information transmission into 8 areas, and divides the data in 8 areas. Do not set up a base station with a wireless network.
- the server generates 8 different rights control information for 8 areas.
- the base station of the wireless network in each area transmits the authority control information corresponding to the area in which it is located.
- the server also generates different rights control information for different time segments of the eight regions as needed.
- the server needs to know the location where the rights controlled terminal is located, the server determines, according to the rights control information received by the rights controlled terminal, which of the eight areas the rights controlled terminal is located. region.
- the rights controlled terminal determines which one of the 8 regions is located according to the rights control information it receives.
- the authority control system in the foregoing embodiment may locate the authority controlled end in the effective area of the authority control information transmission according to the authority control information received by the authority controlled end, and thus may be in the effective area according to the authority controlled end.
- the internal location performs further permission control, that is, diversification of the authority control in the effective area of the authority control information transmission.
- the effective area of the rights control information transmission is divided into several areas, and each area allows the rights controlled end to perform a corresponding operation. It is also possible to divide the effective area of the authority control information transmission into several areas, and the corresponding operation can be performed only when the authority controlled end is located in a specific area.
- the rights server in the above-mentioned authority control system uses the Beacon server [Beacon] server has real-time monitoring, historical data analysis, and various instant alarms (sound, mobile phone, email, etc.) Function] Generate the authority control information, and use the base station having the beam antenna to transmit the authority control information corresponding to the area in which it is located.
- Beacon Beacon
- the base station having the beam antenna to transmit the authority control information corresponding to the area in which it is located.
- the company's office area is divided into a confidential room (for example, area 1 in Figure 5 is divided into a confidential room).
- the confidential information of the company can be retrieved, browsed and copied, and the access of confidential information can be monitored through the controlled terminals such as laptops, tablets, and smart phones.
- the various rights controlled terminals described above are capable of retrieving, browsing, and copying confidential information of the company, as well as monitoring access to confidential information.
- the privilege controlled end receives the privilege control information generated by the Beacon server for the office area outside the machine, the privileged controlled end is located in the office area outside the machine.
- the above-mentioned various rights controlled terminals can only search and browse the confidential information of the company, and cannot copy, and can not monitor the access information of the confidential information.
- the authority control process in the above embodiment further reduces the risk of authority control and enables diversification of authority control.
- Yet another embodiment of the present invention discloses a non-transitory computer storage medium storing computer executable instructions for performing any of the above described rights control methods.
- Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
- a storage medium can be any available media that can be stored by a computer.
- the computer readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, disk storage media or other magnetic storage device, or can be carried or stored in the form of an instruction or data structure.
- any connection can suitably be a computer readable medium.
- coaxial cable For example, if the software is transmitted from a website, server, or other remote source using coaxial cable, optical brazing, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then coaxial Cables, optical braces, twisted pairs, DSL, or wireless technologies such as infrared, wireless, and microwave are included in the definition of the medium to which they belong.
- coaxial Cables, optical braces, twisted pairs, DSL, or wireless technologies such as infrared, wireless, and microwave are included in the definition of the medium to which they belong.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明的实施例公开了权限控制方法、权限受控装置、电子设备及系统,涉及通信技术领域。所述方法包括:当权限受控端处在权限控制信息传输的有效区域内时,获取所述权限控制信息;根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据;对所述权限数据进行鉴权;当所述鉴权通过时,允许执行相应的操作。本发明的实施例够降低权限控制的风险,以及根据权限受控端的物理位置来控制权限受控端的权限。
Description
本发明公开的技术方案涉及通信技术领域,尤其涉及权限控制方法、权限受控装置、电子设备及系统。
随着通信技术、计算机技术的飞速发展,信息的保密问题变得日益严峻。因此,对于信息的获取和使用需要进行权限控制。例如,设置网站、数据库、文件夹等的访问权限,设置应用软件的使用权限。
发明人在研究本发明的过程中发现,现有技术中,控制权限的技术手段主要为验证账号及密码。由于账号与密码存在泄漏和破解的可能性,因此通过验证账号及密码来控制权限仍然会有较高的风险。此外,现有技术中不能根据权限受控端的物理位置来控制权限受控端的权限。
因此,现有技术中权限控制存在较高的风险以及不能根据权限受控端的物理位置来控制权限受控端的权限,其成为了亟待解决的技术问题。
发明内容
本发明公开的技术方案至少能够解决以下技术问题:权限控制存在较高的风险以及不能根据权限受控端的物理位置来控制权限受控端的权限。
本发明的一个或者多个实施例公开了一种权限控制方法,包括:当权限受控端处在权限控制信息传输的有效区域内时,获取所述权限控制信息;根据预
设的解读方式将所述权限控制信息解读成用于鉴权的权限数据;对所述权限数据进行鉴权;当所述鉴权通过时,允许执行相应的操作。
在本发明的一个或者多个实施例中,所述方法还包括:判断所述权限控制信息的传输路径是否为预设的传输路径;当所述权限控制信息的传输路径不符合预设的传输路径时,禁止执行相应的操作。
在本发明的一个或者多个实施例中,所述方法还包括:将所述权限控制信息传输的有效区域划分为N个区域;当权限受控端处在所述N个区域的不同区域内时,所述权限受控端获取到的所述权限控制信息不同;其中,N为≥2的整数。
在本发明的一个或者多个实施例中,所述方法还包括:当权限受控端位于所述N个区域的任意一个区域内时,所述权限受控端在不同的时间段获取到的所述权限控制信息不同。
在本发明的一个或者多个实施例中,通过无线网络获取所述权限控制信息;所述无线网络包括:ZigBee信号网络和/或蓝牙信号网络和/或WIFI信号网络。
本发明的一个或者多个实施例公开了一种权限受控装置,包括:收发模块,用于当权限受控端处在权限控制信息传输的有效区域内时,获取所述权限控制信息;解读模块,用于根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据;鉴权模块,用于对所述权限数据进行鉴权;应用模块,用于当所述鉴权通过时,允许执行相应的操作。
在本发明的一个或者多个实施例中,所述鉴权模块还用于判断所述权限控制信息的传输路径是否为预设的传输路径;当所述权限控制信息的传输路径不符合预设的传输路径时,所述应用模块禁止执行相应的操作。
在本发明的一个或者多个实施例中,将所述权限控制信息传输的有效区域划分为N个区域;当权限受控装置处在所述N个区域的不同区域内时,所述收发模块获取到的所述权限控制信息不同;其中,N为≥2的整数。
在本发明的一个或者多个实施例中,当权限受控装置位于所述N个区域的任意一个区域内时,所述收发模块在不同的时间段获取到的所述权限控制信息不同。
本发明的一个或者多个实施例公开了一种电子设备,包括:至少一个处理器,以及至少一个存储器;所述至少一个处理器与所述至少一个存储器通信连接;所述至少一个存储器存储有可被所述至少一个处理器执行的指令,以使所述电子设备用于执行上述任意一种权限控制方法。
本发明的一个或者多个实施例公开了一种权限控制系统,包括至少一个权限服务端以及至少一个权限受控端;所述至少一个权限服务端用于生成和发送权限控制信息;所述至少一个权限受控端用于执行上述任意一种权限控制方法。
在本发明的一个或者多个实施例中,所述至少一个权限服务端包括至少一个服务器以及至少一个无线网络的基站;所述至少一个服务器与所述至少一个无线网络的基站通信连接;所述至少一个服务器用于生成所述权限控制信息;所述至少一个无线网络的基站用于发送所述权限控制信息。
在本发明的一个或者多个实施例中,将权限控制信息传输的有效区域划分为N个区域,在所述N个区域分别设置至少一个无线网络的基站;所述至少一个服务器为所述N个区域生成不同的权限控制信息;所述至少一个无线网络的基站,发送与其所在区域相对应的权限控制信息;其中,N为≥2的整数。
在本发明的一个或者多个实施例中,所述至少一个服务器为所述N个区域
的不同时间段生成不同的权限控制信息。
在本发明的一个或者多个实施例中,所述至少一个服务器根据所述至少一个权限受控端接收的所述权限控制信息判断所述至少一个权限受控端所处的区域。
在本发明的一个或者多个实施例中,所述至少一个权限受控端根据其接收的所述权限控制信息判断其所处的区域。
本发明的一个或者多个实施例还公开了一种非暂态计算机存储介质,所述计算机存储介质存储有计算机可执行指令,所述计算机可执行指令用于执行上述任意一种权限控制方法。
与现有技术相比,本发明公开的技术方案主要有以下有益效果:
在本发明的实施例中,当权限受控端处在权限控制信息传输的有效区域内时,获取所述权限控制信息。因而,当权限受控端移出权限控制信息传输的有效区域内时,将不能获取所述权限控制信息,也即限定了所述权限受控端执行相应的操作。然后,根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据。如果权限受控端不存在预设的解读方式或者预设的解读方式不能将所述权限控制信息解读成用于鉴权的权限数据,则所述权限受控端不能执行相应的操作。然后对所述权限数据进行鉴权;当所述鉴权通过时,允许执行相应的操作。综上所述,所述权限控制方法能够降低权限控制的风险,并根据权限受控端的物理位置来控制权限受控端的权限。
为了更清楚地说明本发明实施例的技术方案,下面将对实施例中所需要使
用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其它的附图。
图1为本发明的一实施例中权限控制方法的流程图;
图2为本发明的另一实施例中电子设备的示意图;
图3为本发明的另一实施例中权限受控装置的示意图;
图4为本发明的另一实施例中权限控制系统的示意图;
图5为本发明的另一实施例中的权限控制系统的示意图。
为了便于理解本发明,下面将参照相关附图对本发明进行更全面的描述。附图中给出了本发明的较佳实施例。但是,本发明可以以许多不同的形式来实现,并不限于本文所描述的实施例。相反地,提供这些实施例的目的是使对本发明的公开内容的理解更加透彻全面。
除非另有定义,本文所使用的所有的技术和科学术语与属于本发明的技术领域的技术人员通常理解的含义相同。本文中在本发明的说明书中所使用的术语只是为了描述具体的实施例的目的,不是旨在于限制本发明。
参考图1,为本发明的一实施例中权限控制方法的流程图。所述权限控制方法应用于权限受控端。所述权限受控端包括智能手机、平板电脑、笔记本电脑、可穿戴式设备等其他具有通信功能的终端设备。所述权限控制方法包括:
步骤101:当权限受控端处在权限控制信息传输的有效区域内时,获取所述权限控制信息。
所述有效区域指的是所述权限受控端能够有效接收所述权限控制信息的无线网络分布区域。
步骤102:根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据。
解读可以理解为:计算机执行程序指令计算数据的过程。
步骤103:对所述权限数据进行鉴权。
步骤104:当所述鉴权通过时,允许执行相应的操作。
举例而言,应用上述方法控制权限受控端访问特定文档的权限。当用户需要访问所述特定文档时,需要将权限受控端移动到权限控制信息传输的有效区域内。权限受控端在所述权限控制信息传输的有效区域内能够获取到权限控制信息。如果权限受控端不处在权限控制信息传输的有效区域内,或者权限受控端不能获取到权限控制信息,则用户不能通过所述权限受控端访问所述特定文档。
如果权限受控端获取到权限控制信息,则根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据。但是,如果权限受控端不存在预设的解读方式或者预设的解读方式不能将所述权限控制信息解读成用于鉴权的权限数据,则用户仍不能通过所述权限受控端访问所述特定文档。据此,所述方法通过在权限受控端预设解读所述权限控制信息的方式,增强了权限控制的安全性。
如果权限受控端能够根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据,将进一步对所述权限数据进行鉴权,只有当所述鉴权通过时,才会允许执行访问特定文档的操作。
在本发明的一些实施例中,所述对所述权限数据进行鉴权包括:判断所述
权限数据是否包含预设特征。例如,判断所述权限数据是否包含预设的校验码。
在本发明的一些实施例中,所述方法还包括:判断所述权限控制信息的传输路径是否为预设的传输路径;当所述权限控制信息的传输路径不符合预设的传输路径时,禁止执行相应的操作。据此,通过限定所述权限控制信息的传输路径,有利于防范伪造的权限控制信息。
在本发明的一些实施例中,所述方法还包括:将所述权限控制信息传输的有效区域划分为N个区域;当权限受控端处在所述N个区域的不同区域内时,所述权限受控端获取到的所述权限控制信息不同;其中,N为≥2的整数。据此,增强了所述权限控制信息的不规则性,同时也为实现对所述权限受控端进行定位创造了条件。
举例而言,假定将所述权限控制信息传输的有效区域划分为2个区域,分别为A区域和B区域。则当所述权限受控端处在所述2个区域的不同区域内时,所述权限受控端获取到的所述权限控制信息不同。也即,所述权限受控端在A区域获取到的权限控制信息与其在B区域获取到的权限控制信息不同。
在本发明的一些实施例中,所述方法还包括:当权限受控端位于所述N个区域的任意一个区域内时,所述权限受控端在不同的时间段获取到的所述权限控制信息不同。由于在同一区域的不同时间段,所述权限受控端获取到的所述权限控制信息不同,因而所述权限受控端不能使用同样的权限控制信息在不同的时间段通过鉴权执行相应的操作。避免所述权限受控端绕过在权限控制信息传输的有效区域内获取权限控制信息这一特定步骤,利用已经存储的权限控制信息通过鉴权执行相应的操作。有利于进一步增强权限控制的安全性。
在本发明的一些实施例中,所述方法还包括:通过无线网络获取所述权限控制信息;所述无线网络包括:ZigBee信号网络和/或蓝牙信号网络和/或WIFI
信号网络。
上述任意一种权限控制方法应用的场景包括:控制访问特定文档的权限、控制使用特定软件的权限、控制使用软件特定功能的权限等其他应用场景。本发明所述权限控制方法的应用场景并不限于上述应用场景。
在上述权限控制方法的各种应用场景中,本发明实施例公开的权限控制方法能够根据权限受控端所在的物理位置进行权限控制。假定,将权限控制信息传输的有效区域设定为公司的办公区域,用户通过笔记本电脑、移动终端等设备实施上述的各种应用场景。当用户携带所述笔记本电脑、移动终端等设备离开公司的办公区域时,用户携带的所述笔记本电脑、移动终端等设备将获取不到权限控制信息,也就不具备执行相应操作的权限。例如,用户携带所述笔记本电脑、移动终端等设备离开公司的办公区域后,将不能访问特定文档。所述“特定文档”可以是包含公司机密信息的文档。再例如,用户携带所述笔记本电脑、移动终端等设备离开公司的办公区域后,将不能使用特定软件。所述“特定软件”可以是对公司的产品进行设计的软件或者开展公司某些业务的软件。又例如,用户携带所述笔记本电脑、移动终端等设备离开公司的办公区域后,将不能使用某些产品设计软件的特定功能。所述“特定功能”可以是导入某些设计参数的功能,还可以是对某些设计要素进行自动优化的功能。
参考图2,为本发明的另一实施例中电子设备的示意图。所述电子设备包括智能手机、平板电脑、笔记本电脑、可穿戴式设备等其他终端设备。
所述电子设备包括:至少一个处理器210,以及至少一个存储器220;所述至少一个处理器210与所述至少一个存储器220通信连接。图2中以通过总线230连接为例。
所述至少一个存储器220存储有可被所述至少一个处理器210执行的指令,
以使所述电子设备用于执行上述方法实施例中的任意一种权限控制方法。
存储器220作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序、非暂态计算机可执行程序等。处理器210通过运行存储在存储器220中的非暂态软件程序、指令,使得电子设备执行各种功能应用以及数据处理。
存储器220可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储数据等。此外,存储器220可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。在一些实施例中,存储器220可选包括相对于处理器210远程设置的存储器,这些远程存储器可以通过网络连接至所述电子设备。
在本发明的一些实施例中,所述电子设备还包括输入装置和输出装置。输入装置可接收输入的数字或字符信息,以及产生信号输入。输出装置可包括显示屏等显示设备。
上述实施例中的电子设备,可通过执行上述方法实施例中的任意一种权限控制方法,实现对所述电子设备的权限控制,进而降低了权限控制的风险,有利于信息的保密。
参考图3,为本发明的另一实施例中权限受控装置的示意图,用于执行上述方法实施例中的任意一种权限控制方法。
所述权限受控装置包括:
收发模块310,用于当权限受控端处在权限控制信息传输的有效区域内时,获取所述权限控制信息。
解读模块320,用于根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据。
鉴权模块330,用于对所述权限数据进行鉴权。
应用模块340,用于当所述鉴权通过时,允许执行相应的操作。
在本发明的一些实施例中,所述鉴权模块330还用于判断所述权限控制信息的传输路径是否为预设的传输路径;当所述权限控制信息的传输路径不符合预设的传输路径时,所述应用模块340禁止执行相应的操作。
在本发明的一些实施例中,将所述权限控制信息传输的有效区域划分为N个区域;当权限受控装置处在所述N个区域的不同区域内时,所述收发模块310获取到的所述权限控制信息不同;其中,N为≥2的整数。
在本发明的一些实施例中,当权限受控装置位于所述N个区域的任意一个区域内时,所述收发模块310在不同的时间段获取到的所述权限控制信息不同。
上述实施例中的权限受控装置存在于权限受控端内,通过执行上述方法实施例中的任意一种权限控制方法,降低了对权限受控端的权限控制风险,并能够根据权限受控装置的物理位置来控制权限受控装置的权限。
本发明的另一实施例公开一种权限控制系统。所述权限控制系统包括至少一个权限服务端以及至少一个权限受控端;所述至少一个权限服务端用于生成和发送权限控制信息;所述至少一个权限受控端用于执行上述方法实施例中的任意一种权限控制方法。
参考图4,为本发明的另一实施例中权限控制系统的示意图。当权限受控端处在权限控制信息传输的有效区域内时,所述权限受控端能够获取到所述权限控制信息。权限受控端根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据,然后对所述权限数据进行鉴权,当所述鉴权通过时,允许执行相应的操作。
当所述权限受控端移出权限控制信息传输的有效区域内时,所述权限受控端不能够获取到所述权限控制信息。因而,所述权限受控端不能执行相应的操作,进而实现对所述权限受控端的权限控制。
在本发明的一些实施例中,所述至少一个权限服务端包括至少一个服务器以及至少一个无线网络的基站;所述至少一个服务器与所述至少一个无线网络的基站通信连接;所述至少一个服务器用于生成所述权限控制信息;所述至少一个无线网络的基站用于发送所述权限控制信息。
在本发明的一些实施例中,将权限控制信息传输的有效区域划分为N个区域,在所述N个区域分别设置至少一个无线网络的基站;所述至少一个服务器为所述N个区域生成不同的权限控制信息;所述至少一个无线网络的基站,发送与其所在区域相对应的权限控制信息;其中,N为≥2的整数。也即所述N个区域与不同的权限控制信息形成了映射关系。
在本发明的一些实施例中,所述至少一个服务器为所述N个区域的不同时间段生成不同的权限控制信息。
在本发明的一些实施例中,由于所述N个区域与不同的权限控制信息形成了映射关系,据此,所述至少一个服务器根据所述至少一个权限受控端接收的所述权限控制信息判断所述至少一个权限受控端所处的区域。
在本发明的一些实施例中,同样由于所述N个区域与不同的权限控制信息形成了映射关系,因而所述至少一个权限受控端根据其接收的所述权限控制信息判断其所处的区域。
举例而言,图5中所展示的本发明的另一实施例中的权限控制系统。该权限控制系统将权限控制信息传输的有效区域划分为8个区域,在8个区域内分
别设置有无线网络的基站。所述服务器为8个区域生成8种不同的权限控制信息。每个区域内的无线网络的基站发送与其所在区域相对应的权限控制信息。根据需要,所述服务器还为所述8个区域的不同时间段生成不同的权限控制信息。当所述服务器需要获知所述权限受控端所处的位置时,所述服务器根据所述权限受控端接收的权限控制信息判断所述权限受控端位于所述8个区域中的哪一个区域。此外,当所述权限受控端需要获知其自身所处的位置时,所述权限受控端根据其接收的所述权限控制信息判断其位于所述8个区域中的哪一个区域。
上述实施例中的权限控制系统,可以通过根据权限受控端接收的权限控制信息在权限控制信息传输的有效区域内对权限受控端进行定位,因而可以根据权限受控端在所述有效区域内的位置进行进一步的权限控制,也即在权限控制信息传输的有效区域内实现权限控制的多样化。例如,将所述权限控制信息传输的有效区域划分为若干区域,每个区域允许权限受控端执行对应的操作。还可以是,将所述权限控制信息传输的有效区域划分为若干区域,只有当权限受控端位于特定的区域内时才可以执行对应的操作。
在本发明的一个实施例中,上述权限控制系统中的权限服务端使用Beacon服务器【Beacon(毕垦)服务器具有实时监控、历史数据分析以及多样的即时报警(声音、手机短信、电子邮件等方式)功能】生成所述权限控制信息,使用具有波束天线的基站发送与其所在区域相对应的权限控制信息。假定,将公司的办公区域划分出一个机要室(例如将图5中的区域1划分为机要室)。在机要室内可以通过笔记本电脑、平板电脑、智能手机等权限受控端对公司的机密信息进行检索、浏览与拷贝,以及监控机密信息的访问情况。在机要室外的办公区域则仅可以通过笔记本电脑、平板电脑、智能手机等权限受控端对公司
的机密信息进行检索、浏览,但不能进行拷贝,也不能监控机密信息的访问情况。权限服务端使用的Beacon服务器为所述机要室所在的办公区域生成特定的权限控制信息,如果权限受控端能够接收到上述特定的权限控制信息,则认定权限受控端处在机要室内,也即权限受控端定位在机要室内。因而,上述各种权限受控端能够对公司的机密信息进行检索、浏览与拷贝,以及监控机密信息的访问情况。如果权限受控端接收到的是Beacon服务器为机要室外的办公区域生成的权限控制信息,则将权限受控端定位在机要室外的办公区域。此时,上述各种权限受控端仅能对公司的机密信息进行检索、浏览,而不能进行拷贝,也不能对机密信息的访问情况进行监控。上述实施例中的权限控制过程进一步降低了权限控制的风险,并且能够实现权限控制的多样化。
以上对权限控制系统的应用举例,只是为了说明如何应用上述实施例中的权限控制系统,不能因此限定所述权限控制系统应用范围。本领域的普通技术人员根据上述实施例中的权限控制系统,很容易想到对所述权限控制系统进行其他的应用。因此,不能以对所述权限控制系统进行了不同的应用,而认定为不属于本发明所述权限控制系统的保护范围。
本发明的又一实施例公开了一种非暂态计算机存储介质,所述计算机存储介质存储有计算机可执行指令,所述计算机可执行指令用于执行上述任意一种权限控制方法。
本领域普通技术人员应当理解到,上述实施例中的权限控制方法、权限受控装置、权限控制系统、非暂态计算机存储介质和电子设备还可以通过其他方式实现。
当使用到软件实现时,可以将实现上述各个实施例的计算机指令和/或数据存储在计算机可读介质中或作为可读介质上的一个或多个指令或代码进行传
输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是计算机能够存储的任何可用介质。以此为例但不限于次:计算机可读介质可以包括RAM、ROM、EEPROM、CD-ROM或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。此外,任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光钎光缆、双绞线、数字用户线(DSL)或者诸如红外线、无线电和微波之类的无线技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光钎光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定义中。
最后应说明的是,以上实施例仅用以说明本发明的技术方案,而非对其限制。尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解,其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换。而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。
Claims (16)
- 一种权限控制方法,其特征在于,包括:当权限受控端处在权限控制信息传输的有效区域内时,获取所述权限控制信息;根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据;对所述权限数据进行鉴权;当所述鉴权通过时,允许执行相应的操作。
- 根据权利要求1所述的权限控制方法,其特征在于,所述方法还包括:判断所述权限控制信息的传输路径是否为预设的传输路径;当所述权限控制信息的传输路径不符合预设的传输路径时,禁止执行相应的操作。
- 根据权利要求1或2所述的权限控制方法,其特征在于,所述方法还包括:将所述权限控制信息传输的有效区域划分为N个区域;当权限受控端处在所述N个区域的不同区域内时,所述权限受控端获取到的所述权限控制信息不同;其中,N为≥2的整数。
- 根据权利要求3所述的权限控制方法,其特征在于,所述方法还包括:当权限受控端位于所述N个区域的任意一个区域内时,所述权限受控端在不同的时间段获取到的所述权限控制信息不同。
- 根据权利要求4所述的权限控制方法,其特征在于,通过无线网络获取所述权限控制信息;所述无线网络包括:ZigBee信号网络和/或蓝牙信号网络和/或WIFI信号网 络。
- 一种权限受控装置,其特征在于,包括:收发模块,用于当权限受控端处在权限控制信息传输的有效区域内时,获取所述权限控制信息;解读模块,用于根据预设的解读方式将所述权限控制信息解读成用于鉴权的权限数据;鉴权模块,用于对所述权限数据进行鉴权;应用模块,用于当所述鉴权通过时,允许执行相应的操作。
- 根据权利要求6所述的权限受控装置,其特征在于,所述鉴权模块还用于判断所述权限控制信息的传输路径是否为预设的传输路径;当所述权限控制信息的传输路径不符合预设的传输路径时,所述应用模块禁止执行相应的操作。
- 根据权利要求6或7所述的权限受控装置,其特征在于,将所述权限控制信息传输的有效区域划分为N个区域;当权限受控装置处在所述N个区域的不同区域内时,所述收发模块获取到的所述权限控制信息不同;其中,N为≥2的整数。
- 根据权利要求8所述的权限受控装置,其特征在于,当权限受控装置位于所述N个区域的任意一个区域内时,所述收发模块在不同的时间段获取到的所述权限控制信息不同。
- 一种电子设备,其特征在于,包括:至少一个处理器,以及至少一个存储器;所述至少一个处理器与所述至少一个存储器通信连接;所述至少一个存储器存储有可被所述至少一个处理器执行的指令,以使所述电子设备用于执行权利要求1-5任意一项所述的权限控制方法。
- 一种权限控制系统,其特征在于,包括至少一个权限服务端以及至少一个权限受控端;所述至少一个权限服务端用于生成和发送权限控制信息;所述至少一个权限受控端用于执行权利要求1-5任意一项所述的权限控制方法。
- 根据权利要求11所述的权限控制系统,其特征在于,所述至少一个权限服务端包括至少一个服务器以及至少一个无线网络的基站;所述至少一个服务器与所述至少一个无线网络的基站通信连接;所述至少一个服务器用于生成所述权限控制信息;所述至少一个无线网络的基站用于发送所述权限控制信息。
- 根据权利要求12所述的权限控制系统,其特征在于,将权限控制信息传输的有效区域划分为N个区域,在所述N个区域分别设置至少一个无线网络的基站;所述至少一个服务器为所述N个区域生成不同的权限控制信息;所述至少一个无线网络的基站,发送与其所在区域相对应的权限控制信息;其中,N为≥2的整数。
- 根据权利要求13所述的权限控制系统,其特征在于,所述至少一个服务器为所述N个区域的不同时间段生成不同的权限控制信息。
- 根据权利要求13或14所述的权限控制系统,其特征在于,所述至少 一个服务器根据所述至少一个权限受控端接收的所述权限控制信息判断所述至少一个权限受控端所处的区域。
- 根据权利要求15所述的权限控制系统,其特征在于,所述至少一个权限受控端根据其接收的所述权限控制信息判断其所处的区域。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/073108 WO2018145266A1 (zh) | 2017-02-08 | 2017-02-08 | 权限控制方法、权限受控装置、电子设备及系统 |
CN201780000069.6A CN107005578A (zh) | 2017-02-08 | 2017-02-08 | 权限控制方法、权限受控装置、电子设备及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/073108 WO2018145266A1 (zh) | 2017-02-08 | 2017-02-08 | 权限控制方法、权限受控装置、电子设备及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018145266A1 true WO2018145266A1 (zh) | 2018-08-16 |
Family
ID=59435993
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/073108 WO2018145266A1 (zh) | 2017-02-08 | 2017-02-08 | 权限控制方法、权限受控装置、电子设备及系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107005578A (zh) |
WO (1) | WO2018145266A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112260985B (zh) * | 2020-09-03 | 2023-08-01 | 富联智能工坊(郑州)有限公司 | 终端安全管控设备及终端安全管控方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008040546A (ja) * | 2006-08-01 | 2008-02-21 | Canon Inc | 情報処理装置、その制御方法及びプログラム |
CN102769631A (zh) * | 2012-07-31 | 2012-11-07 | 华为技术有限公司 | 访问云服务器的方法、系统和接入设备 |
CN103200155A (zh) * | 2012-01-05 | 2013-07-10 | 国民技术股份有限公司 | 一种基于限定区域的权限控制系统和方法 |
CN103491539A (zh) * | 2013-08-27 | 2014-01-01 | 展讯通信(上海)有限公司 | 控制移动设备访问权限的方法、装置 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100594629B1 (ko) * | 2004-07-06 | 2006-07-07 | 소프트포럼 주식회사 | 사용자 컴퓨터 접속 제어방법 및 이를 실행하기 위한프로그램을 기록한 컴퓨터로 읽을 수 있는 기록매체 |
CN103428655A (zh) * | 2012-05-15 | 2013-12-04 | 上海博路信息技术有限公司 | 一种基于短信的数据交换系统 |
CN103354550A (zh) * | 2013-07-03 | 2013-10-16 | 杭州华三通信技术有限公司 | 一种基于终端信息进行权限控制的方法及装置 |
US10237267B2 (en) * | 2014-04-15 | 2019-03-19 | Huawei Technologies Co., Ltd. | Rights control method, client, and server |
CN105323294A (zh) * | 2014-08-20 | 2016-02-10 | 广东小天才科技有限公司 | 一种智能终端的权限控制方法及装置 |
CN104717204A (zh) * | 2015-02-02 | 2015-06-17 | 深圳市中兴移动通信有限公司 | 控制文件访问权限的方法和终端 |
CN105992206B (zh) * | 2015-02-04 | 2019-06-14 | 中国移动通信集团湖北有限公司 | 一种企业安全管理的方法、设备和系统 |
CN106034104B (zh) * | 2015-03-07 | 2021-02-12 | 华为技术有限公司 | 用于网络应用访问的验证方法、装置和系统 |
-
2017
- 2017-02-08 WO PCT/CN2017/073108 patent/WO2018145266A1/zh active Application Filing
- 2017-02-08 CN CN201780000069.6A patent/CN107005578A/zh active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008040546A (ja) * | 2006-08-01 | 2008-02-21 | Canon Inc | 情報処理装置、その制御方法及びプログラム |
CN103200155A (zh) * | 2012-01-05 | 2013-07-10 | 国民技术股份有限公司 | 一种基于限定区域的权限控制系统和方法 |
CN102769631A (zh) * | 2012-07-31 | 2012-11-07 | 华为技术有限公司 | 访问云服务器的方法、系统和接入设备 |
CN103491539A (zh) * | 2013-08-27 | 2014-01-01 | 展讯通信(上海)有限公司 | 控制移动设备访问权限的方法、装置 |
Also Published As
Publication number | Publication date |
---|---|
CN107005578A (zh) | 2017-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11902281B2 (en) | On-demand security policy activation | |
US11570160B2 (en) | Securely authorizing access to remote resources | |
US9923902B2 (en) | Remote processsing of mobile applications | |
CN108632253B (zh) | 基于移动终端的客户数据安全访问方法及装置 | |
US20190258798A1 (en) | Location-Based Configuration Profile Toggling | |
US9058495B2 (en) | Rights management services integration with mobile device management | |
US10257194B2 (en) | Distribution of variably secure resources in a networked environment | |
US20190089810A1 (en) | Resource access method, apparatus, and system | |
US8914013B2 (en) | Device management macros | |
US20170372311A1 (en) | Secure payment-protecting method and related electronic device | |
CN115915492A (zh) | 分布式设备间的通信方法、系统及相关设备 | |
WO2018145266A1 (zh) | 权限控制方法、权限受控装置、电子设备及系统 | |
CN104346417B (zh) | 一种书签信息的同步方法及装置 | |
US20180075227A1 (en) | Systems and methods for surveillance of user access to a security critical resource | |
WO2024145568A1 (en) | Systems and methods for data storage | |
WO2014179743A1 (en) | Time-based configuration policy toggling | |
JP2015186025A (ja) | 無線通信端末、Webデータ共有システム、Webデータ共有方法、及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17895918 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17895918 Country of ref document: EP Kind code of ref document: A1 |