WO2021120678A1 - Software management method, apparatus and system - Google Patents

Software management method, apparatus and system Download PDF

Info

Publication number
WO2021120678A1
WO2021120678A1 PCT/CN2020/111485 CN2020111485W WO2021120678A1 WO 2021120678 A1 WO2021120678 A1 WO 2021120678A1 CN 2020111485 W CN2020111485 W CN 2020111485W WO 2021120678 A1 WO2021120678 A1 WO 2021120678A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
software
user
management
information
Prior art date
Application number
PCT/CN2020/111485
Other languages
French (fr)
Chinese (zh)
Inventor
朱锦涛
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021120678A1 publication Critical patent/WO2021120678A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Definitions

  • This application relates to the technical field of Internet of Vehicles, and in particular to a software management method, device and system.
  • over-the-air programming (OTA) technology is generally used to perform management operations such as installing, updating, and uninstalling software in a car through a remote wireless manner.
  • OTA over-the-air programming
  • the user needs to be notified of the relevant update operation, and the relevant update execution operation should also be authorized by the user. Therefore, using OTA technology to update the software in the car is a process that requires user participation. In this process, it is necessary to ensure that the entire software update process has been reasonably authorized by legitimate users.
  • the embodiments of the present application provide a software management method, device, and system to solve how to perform authorization management and control in the process of software management, so as to avoid security problems due to software management.
  • an embodiment of the present application provides a software management method.
  • the method includes: a first terminal receives a management notification message; the management notification message is used to notify a management operation of the first software; and the management operation includes updating the software. Any one of the first software, installing the first software, and uninstalling the first software; the first terminal determines according to the management policy corresponding to the first software that the authentication terminal includes the first terminal and the first software
  • the user who confirms the management of the first software is authenticated through the authentication terminal; when it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained ,
  • the first terminal executes the management notification message instruction on the first software according to the first confirmation instruction and the second confirmation instruction The management operation; wherein the first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software through the first terminal.
  • the first terminal and the second terminal before performing the management operation on the first software in the first terminal, the first terminal and the second terminal simultaneously determine whether the user is an authorized user. When both the first terminal and the second terminal determine that the user is When the user is authorized, the first terminal can manage the first software. In this way, it is possible to prevent unauthorized users from unauthorized management of the first software in the first terminal, realize management authorization management and control of the first software, and avoid security problems of the first terminal due to software management.
  • the management policy includes first information, and the first information is used to indicate the authentication terminal; the first terminal determines that the authentication terminal includes all the authentication terminals according to the management policy corresponding to the first software.
  • the first terminal and the second terminal include: the first terminal determines that the authentication terminal includes the first terminal and the first terminal according to the first information in the management policy corresponding to the first software Two terminal.
  • the management policy includes second information, and the second information is used to indicate the authorization mode of the first software; Before certification, it also includes:
  • the first terminal determines the authorization mode of the first software according to the second information in the management policy; the first terminal determines according to the authorization mode that the user needs to be authenticated by the authentication terminal .
  • the authorization mode includes a first mode and a second mode
  • the first mode is that each management operation of the first software requires the authentication terminal to perform the authentication on the user.
  • the second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operation after the first management operation of the first software does not need to pass
  • the authentication terminal authenticates the user; before the first terminal authenticates the user confirming the management of the first software through the authentication terminal, the method further includes: when it is determined that the authorization mode of the first software is all In the first mode, or when it is determined that the authorization mode of the first software is the second mode, and the first software is the first management operation, it is determined that the user needs to be authenticated through the authentication terminal.
  • the method further includes: the first terminal obtains the first authorization information input by the user in the first terminal, and obtains the second authorization information from the second terminal
  • the first authorization information includes the authentication information entered by the user to the first terminal
  • the second authorization information includes the authentication information entered by the user to the second terminal; when the first authorization information When it matches the authorization information pre-configured in the first terminal, and the first authorization information or the pre-configured authorization information matches the second authorization information, the first terminal determines that the user Is the authorized user.
  • the management policy includes third information, and the third information is used to indicate the authorized user; the first terminal confirms the user who manages the first software through the authentication terminal Before performing the authentication, the method further includes: the first terminal determines the authorized user according to the third information in the management policy.
  • the method before the first terminal receives the management notification message, the method further includes: the first terminal obtains the management policy set by the authorized user, and sends the management policy to the network device Or the first terminal receives the management policy from the network device.
  • the first terminal is a vehicle-mounted terminal
  • the second terminal is a mobile terminal
  • the present application also provides a communication device that has any method provided in the first aspect.
  • the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more units or units corresponding to the above-mentioned functions.
  • the communication device may be a vehicle.
  • the communication device includes a processor configured to support the communication device to perform the corresponding function of the first terminal in the above-mentioned method.
  • the communication device may further include a memory, and the storage may be coupled with the processor, which stores program instructions and data necessary for the communication device.
  • the communication device further includes a communication interface, and the communication interface is used to support communication between the communication device and the second terminal, network equipment and other devices.
  • the communication device includes corresponding functional units, which are respectively used to implement the steps in the above method.
  • the function can be realized by hardware, or the corresponding software can be executed by hardware.
  • the hardware or software includes one or more units corresponding to the above-mentioned functions.
  • the structure of the communication device includes a processing unit and a communication unit, and these units can perform corresponding functions in the foregoing method examples.
  • these units can perform corresponding functions in the foregoing method examples.
  • a software management method including: a second terminal receives the management notification message; the management notification message is used to notify a management operation of the first software; the management operation includes updating the first software , Install the first software, uninstall any one of the first software; when the second terminal determines that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, confirm the management office The user of the first software is authenticated;
  • the second terminal When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal, and the second confirmation instruction is used to instruct the user to pass The second terminal confirms that the management operation indicated by the management notification message is performed on the first software.
  • the determining, by the second terminal, that the user is an authorized user who manages the first software includes: the second terminal acquiring the second input by the user in the second terminal Authorization information; the second authorization information includes the authentication information input by the user to the second terminal; when the first authorization information matches the authorization information pre-configured in the second terminal, the first authorization information The second terminal determines that the user is the authorized user who manages the first software.
  • the method further includes: the second terminal obtains the management policy set by the authorized user, and sends the management policy to the network device; or the second terminal receives The management policy from the network device.
  • the second terminal determining that the user is an authorized user to update the first software includes: the second terminal obtains second authorization information; the second authorization information includes the The authentication information entered by the user into the second terminal; when it is determined that the second authorization information matches the authorization information pre-configured in the second terminal, the second terminal determines that the user is the authorized user .
  • the management policy includes first information, and the first information is used to indicate the authentication terminal; and the second terminal determines the The authentication terminal is the second terminal.
  • the management policy includes third information, and the third information is used to indicate the authorized user; the method further includes: the second terminal according to the management policy The third information determines the authorized user.
  • the present application also provides a communication device having any method provided in the third aspect.
  • the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more units or units corresponding to the above-mentioned functions.
  • the communication device includes a processor configured to support the communication device to perform the corresponding function of the second terminal in the method shown above.
  • the communication device may further include a memory, and the storage may be coupled with the processor, which stores program instructions and data necessary for the communication device.
  • the communication device further includes a communication interface, and the communication interface is used to support communication between the communication device and the first terminal, network equipment and other devices.
  • the communication device includes corresponding functional units, which are respectively used to implement the steps in the above method.
  • the function can be realized by hardware, or the corresponding software can be executed by hardware.
  • the hardware or software includes one or more units corresponding to the above-mentioned functions.
  • the structure of the communication device includes a processing unit and a communication unit, and these units can perform corresponding functions in the foregoing method examples.
  • these units can perform corresponding functions in the foregoing method examples.
  • a software management method which includes: when it is determined to perform a management operation on the first software, the network device determines an authentication terminal according to a management policy corresponding to the first software, and the authentication terminal is used to confirm the management office.
  • the user of the first software is authenticated; the authentication terminal includes a first terminal and a second terminal; the management operation includes updating the first software, installing the first software, and uninstalling any of the first software.
  • the network device sends a management notification message to the authentication terminal, where the management notification message is used to notify the first software to perform the management operation.
  • the method before the determining to perform a management operation on the first software, the method further includes:
  • the network device sends the management policy to the first terminal and the second terminal; or the network device receives the management policy from the first terminal or the second terminal.
  • the management policy includes first information, and the first information is used to indicate the authentication terminal; the network device determines the authentication terminal according to the management policy corresponding to the first software, including: The network device determines the authentication terminal according to the first information in the management policy.
  • the first terminal is a vehicle-mounted terminal
  • the second terminal is a mobile terminal
  • the management policy includes first information, and the first information is used to indicate the authentication terminal; the network device determines the authentication according to the first information in the management policy terminal.
  • the present application also provides a communication device that has any method provided in the fifth aspect.
  • the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more units or units corresponding to the above-mentioned functions.
  • the communication device includes a processor configured to support the communication device to perform the corresponding function of the network device in the method shown above.
  • the communication device may further include a memory, and the storage may be coupled with the processor, which stores program instructions and data necessary for the communication device.
  • the communication device further includes a communication interface, and the communication interface is used to support communication between the communication device and the first terminal, the second terminal, and other devices.
  • the communication device includes corresponding functional units, which are respectively used to implement the steps in the above method.
  • the function can be realized by hardware, or the corresponding software can be executed by hardware.
  • the hardware or software includes one or more units corresponding to the above-mentioned functions.
  • the structure of the communication device includes a processing unit and a communication unit, and these units can perform corresponding functions in the foregoing method examples.
  • these units can perform corresponding functions in the foregoing method examples.
  • the present application provides a system that includes: a network device, configured to determine an authentication terminal according to a management policy corresponding to the first software when determining to perform management operations on the first software, and the authentication terminal is used to confirm The user who manages the first software is authenticated; the authentication terminal includes a first terminal and a second terminal; and a management notification message is sent to the authentication terminal, and the management notification message is used to notify the first software to perform the authentication.
  • the management operation; the management operation includes any one of updating the first software, installing the first software, and uninstalling the first software;
  • the second terminal is configured to receive the management notification message; when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software; when it is determined that the user is an authorized user who manages the first software, a second confirmation instruction input by the user is sent to the first terminal, where the second confirmation instruction is used to instruct the user to pass the second
  • the terminal confirms that the management operation indicated by the management notification message is performed on the first software;
  • the first terminal is configured to receive the management notification message; when it is determined that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, the authentication terminal is used to confirm management
  • the user of the first software is authenticated; when it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the first confirmation instruction from the second terminal is received 2.
  • the first confirmation instruction is used to instruct all The user confirms the execution of the management operation on the first software through the first terminal.
  • the first terminal and the second terminal simultaneously determine whether the user is an authorized user.
  • the first terminal can manage the first software. In this way, it is possible to prevent unauthorized users from unauthorized management of the first software in the first terminal, realize management authorization management and control of the first software, and avoid security problems of the first terminal due to software management.
  • the management policy includes first information, and the first information is used to indicate the authentication terminal; the determining the authentication terminal according to the management policy corresponding to the first software includes: The first information in the management policy determines the authentication terminal.
  • the management policy includes second information, and the second information is used to indicate the authorization mode of the first software; the first terminal confirms the user who manages the first software Before performing authentication, the method further includes: determining an authorization mode of the first software according to the second information in the management policy; and determining, according to the authorization mode, that the user needs to be authenticated by the authentication terminal.
  • the authorization mode includes a first mode and a second mode
  • the first mode is that each management operation of the first software requires the authentication terminal to authenticate the user. To be certified;
  • the second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operations after the first management operation of the first software do not need to pass the
  • the authentication terminal authenticates the user; the first terminal is specifically configured to: when determining that the authorization mode of the first software is the first mode, or determining that the authorization mode of the first software is the second mode, And when the first software is the first management operation, it is determined that the user needs to be authenticated through the authentication terminal.
  • the first terminal is specifically configured to:
  • the first authorization information entered by the user in the first terminal and obtain the second authorization information from the second terminal;
  • the first authorization information includes the information entered by the user in the first terminal
  • the second authorization information includes the authentication information input by the user to the second terminal; when the first authorization information matches the authorization information pre-configured in the first terminal, and the first authorization information
  • a piece of authorization information or the pre-configured authorization information matches the second authorization information, it is determined that the user is the authorized user.
  • the management policy includes third information, and the third information is used to indicate the authorized user; before the first terminal authenticates the user confirming to manage the first software, It is also used to determine the authorized user according to the third information in the management policy.
  • the first terminal before the first terminal receives the management notification message, it is further used to: obtain the management policy set by the authorized user, and send the management policy to the network device; or receive The management policy from the network device.
  • the second terminal is specifically configured to: obtain the second authorization information input by the user in the second terminal; the second authorization information includes the user input to the Authentication information of the second terminal;
  • the first authorization information matches the authorization information pre-configured in the second terminal, it is determined that the user is the authorized user.
  • the second terminal is further configured to: obtain the management policy set by the authorized user, and send the management policy to the network device; or receive information from the network device The management strategy.
  • the first terminal is a vehicle-mounted terminal
  • the second terminal is a mobile terminal
  • the present application provides a communication device.
  • the communication device includes a processor and a memory.
  • the memory is used to store computer programs or instructions; the processor is used to execute the computer programs or instructions stored in the memory. So that the communication device executes the corresponding method as described in the first aspect or the third aspect or the fifth aspect.
  • the present application provides a communication device that includes a processor, a memory, and a transceiver.
  • the transceiver is used to receive signals or send signals; and the memory is used to store computer programs or instructions;
  • the processor is configured to call the computer program or instruction from the memory to execute the method according to the first aspect or the third aspect or the fifth aspect.
  • the present application provides a communication device, the communication device includes a processor and an interface circuit, the interface circuit is configured to receive code instructions and transmit them to the processor; the processor runs the code instructions In order to perform the corresponding method as described in the first aspect or the third aspect or the fifth aspect.
  • the present application provides a computer-readable storage medium for storing a computer program or instruction.
  • the computer reads and executes the computer program or instruction, the first aspect or The method described in the third or fifth aspect is implemented.
  • the present application provides a computer program product including instructions.
  • the computer reads and executes the computer program product, the method described in the first aspect or the third aspect or the fifth aspect is realized.
  • the present application provides a chip including a processor, the processor is coupled with a memory, and is configured to execute a computer program or instruction stored in the memory.
  • the processor executes the computer program or instruction At this time, the method described in the first aspect or the third aspect or the fifth aspect is realized.
  • the present application provides a communication device that includes a processor, and when the processor executes a computer program or instruction in a memory, as described in the first or third or fifth aspects The method is executed.
  • FIG. 1 is a schematic diagram of an architecture applicable to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a software management method provided by an embodiment of the application.
  • Fig. 3 is a management policy configuration intention provided by an embodiment of the application
  • FIG. 4 is a schematic flowchart of a software management method provided by an embodiment of the application.
  • FIG. 5 is a schematic diagram of an interface provided by an embodiment of the application.
  • FIG. 6 is a schematic diagram of an interface provided by an embodiment of this application.
  • FIG. 7A is a schematic diagram of a software management interface provided by an embodiment of this application.
  • FIG. 7B is a schematic diagram of another software management interface provided by an embodiment of the application.
  • FIG. 8 is a schematic flowchart of a software management method provided by an embodiment of the application.
  • FIG. 9 is a schematic flowchart of a software management method provided by an embodiment of this application.
  • FIG. 10 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 12 is a schematic diagram of a system structure provided by an embodiment of this application.
  • the ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects.
  • the first terminal and the second terminal are only used to distinguish different terminals, but do not indicate the difference in priority or importance of the two terminals.
  • FIG. 1 takes the mobile terminal located outside the vehicle-mounted terminal as an example for illustration, and the mobile terminal may also be located in the vehicle-mounted terminal.
  • the execution may be performed at the user's instruction according to different situations.
  • the vehicle-mounted terminal and the mobile terminal jointly authenticate the user's identity, thereby ensuring that the management operation of the software is managed and controlled, and improving the safety of the vehicle-mounted terminal.
  • the vehicle-mounted terminal is installed in the vehicle and may be a component of the vehicle, for example, it may be a smart device equipped in the vehicle, which is structurally integrated in the vehicle and belongs to a part of the vehicle.
  • the mobile terminal may be a smart device independent of the vehicle, such as a (mobile phone), a tablet computer (Pad), and so on.
  • a vehicle-mounted terminal is taken as an example for description, but the method applicable to a vehicle-mounted terminal in this application can also be applied to other types of terminals, such as airplanes, drones, ships, trains, and so on.
  • the network device described below may be a network device in the network architecture shown in FIG. 1, and the network device may be an OTA server or a vehicle. Networking (vehicle-to-everything, V2X) server, or other servers.
  • the first terminal described below may refer to the vehicle-mounted terminal in the network architecture shown in FIG. 1.
  • the second terminal described below may refer to the mobile terminal in the network architecture shown in FIG. 1.
  • the second terminal in the embodiment of the present application may be a mobile phone or a tablet computer ( Pad) and other equipment.
  • the communication data between the first terminal and the second terminal may be transmitted through a secure transmission channel.
  • any two terminals cannot establish a secure transmission channel, and only two terminals with an association relationship can establish a secure transmission channel. Therefore, before establishing a secure transmission channel, an association relationship needs to be established between the first terminal and the second terminal.
  • the so-called association relationship specifically refers to the establishment of a secure communication channel between the first terminal and the second terminal.
  • the second terminal sends an association request message to the network device, and the association request message includes information such as the identity of the user to which the first terminal belongs (for example, the certificate number of the user, etc.), and the identity of the first terminal.
  • the network device After receiving the association request message from the second terminal, the network device determines that the user identification and the identification of the first terminal carried in it are both legal and valid, and can send a verification code to the second terminal.
  • the second terminal After the second terminal receives the verification code sent by the network device, the user using the second terminal enters the verification code in the first terminal.
  • the network device determines that the verification code sent by the first terminal is the same as the verification code sent by the network device to the second terminal, and then instructs the first terminal to establish an association relationship with the second terminal , Or instruct the second terminal to establish an association relationship with the first terminal.
  • the second terminal sends an association request message to the network device, where the association request message includes information such as the identity of the user to which the first terminal belongs, and the identity of the first terminal.
  • the network device After receiving the association request message from the second terminal, the network device determines that the user identification and the identification of the first terminal carried in it are legal and valid, and can send a verification code to the first terminal and the second terminal.
  • the second terminal After the second terminal receives the verification code sent by the network device, the user using the second terminal enters the verification code in the first terminal.
  • the first terminal may establish an association relationship with the second terminal.
  • the second terminal sends an association request message to the network device, where the association request message includes information such as the identity of the user to which the first terminal belongs, and the identity of the first terminal.
  • the network device After receiving the association request message from the second terminal, the network device determines that the user identity and the identity of the first terminal carried in it are both legal and valid, and can send a verification code to the first terminal.
  • the first terminal may display the verification code on the display screen and prompt the user to input the verification code into the second terminal.
  • the user using the second terminal inputs the verification code displayed in the first terminal into the second terminal, and sends the verification code to the network device through the second terminal.
  • the network device determines that the verification code sent by the second terminal is the same as the verification code sent by the network device to the first terminal, it instructs the first terminal to establish an association relationship with the second terminal, or instructs the second terminal to establish an association relationship with the first terminal.
  • first terminal and the second terminal may also establish an association relationship in other ways, which will not be illustrated one by one here.
  • a secure transmission channel can be established through wireless or wired communication, and data can be transmitted through the established secure transmission channel. It should be noted that how to specifically establish a secure transmission channel between the first terminal and the second terminal is not limited in the embodiment of the present application, and will not be repeated here.
  • FIG. 2 it is a schematic flowchart of a software management method provided by an embodiment of this application.
  • the method includes:
  • Step 201 When it is determined to perform a management operation on the first software, an authentication terminal is determined according to the management policy corresponding to the first software.
  • the management operation includes but is not limited to any one of updating the first software, installing the first software, and uninstalling the first software.
  • the above are just examples, and there may be other management operations, so I won't repeat them here.
  • the management operation is to update the first software
  • the network device when the network device obtains the update package of the first software in the first terminal, it can determine that the first software needs to be updated.
  • the network device can also determine that the first software needs to be updated in other ways, which will not be repeated here.
  • the first software may be any software installed in the first terminal.
  • the first software may be map navigation software, in-vehicle central control entertainment software, or in-vehicle communication module system software.
  • the specific type of software is not limited.
  • the security of the first terminal is improved.
  • the user who confirms the management operation of the first software may be authenticated through the authentication terminal to ensure that the user who performs the management operation of the first software is an authorized user, which will be described in detail below.
  • the authentication terminal may include at least one of a first terminal and a second terminal, and the second terminal has an association relationship with the first terminal.
  • the second terminal has an association relationship with the first terminal.
  • the management strategy corresponding to the first software may include a variety of information, for example, may include one or more of the following: first information, the first information is used to indicate the authentication terminal; second information, the second information The information is used to indicate the authorization mode of the first software; the third information is used to indicate the authorized user.
  • the authorization mode may include a first mode and a second mode.
  • the first mode is that each management operation of the first software needs to authenticate the user through the authentication terminal;
  • the second mode is that the first management operation of the first software needs to pass all the operations.
  • the authentication terminal authenticates the user, and the management operation after the first management operation of the first software does not need to authenticate the user through the authentication terminal.
  • the first mode may be applicable to software that has a greater impact on the security of the first terminal, such as operating system software in the first terminal.
  • the second mode may be suitable for software that frequently manages operations but has a small impact on the security of the first terminal, such as map navigation software in the first terminal.
  • the authorized user may be the owner of the first terminal, or may be a user designated by the owner of the first terminal.
  • the owner of the first terminal may also have other names, such as the user of the first terminal, the owner of the first terminal, the owner of the first terminal, and so on.
  • the first terminal and the second terminal can determine information such as the authentication terminal, the authorization mode, and the authorized user.
  • management policies corresponding to different software in the first terminal may be different.
  • the management policies of different software in the first terminal may be as shown in Table 1.
  • Table 1 is only an example, and the software in the first terminal may also correspond to other management strategies, which will not be illustrated one by one here.
  • the authentication terminal in the management policy may also include other terminals, such as a third terminal, a fourth terminal, etc., and authorized users can configure according to actual conditions.
  • the authentication terminal includes other terminals, the specific execution content can be referred to The description of the second terminal will not be repeated here in this embodiment of the application.
  • the management policy corresponding to the first software may be configured by the network device, and the network device may send the management policy corresponding to the first software to the first terminal and the second terminal.
  • the management policy corresponding to the first software may also be set by the authorized user in the first terminal, and the first terminal may send the management policy set by the authorized user to the network device and the second terminal.
  • the configuration options of the management policy may be displayed on the display screen of the first terminal, and the first terminal may save the management policy input by the user and send it to the network device and the second terminal.
  • FIG. 3 a schematic diagram of an interface provided by an embodiment of this application.
  • the first software is the map navigation software as an example.
  • the authentication terminal that can be selected in the management strategy, the authorization mode that can be selected, and the authorized user that can be set are displayed.
  • the user can set the management strategy in the first terminal through the interface shown in Fig. 3.
  • the management policy corresponding to the first software may also be set by the authorized user in the second terminal, and the second terminal may send the management policy set by the authorized user to the network device and the first terminal.
  • the configuration options of the management policy may be displayed on the display screen of the second terminal, and the second terminal may save the management policy input by the user and send it to the network device and the first terminal.
  • the configuration options of the management policy displayed by the second terminal reference may be made to the example in FIG. 3, and details are not described here.
  • Step 202 The network device sends a management notification message to the authentication terminal.
  • the management notification message is used to notify the management operation of the first software.
  • management notification message may also include other information, such as the identification of the first software, and the identification of the authentication terminal, which is not limited in the embodiment of the present application.
  • Step 203 The first terminal receives the management notification message.
  • Step 204 The second terminal receives the management notification message.
  • step 203 and step 204 is not limited, and the above description is only performed by taking step 203 first as an example. In practical applications, step 204 can also be performed first, or step 203 and step 204 can be performed at the same time, which will not be repeated here.
  • Step 205 When the second terminal determines that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who is confirmed to manage the first software.
  • the second terminal may obtain second authorization information input by the user in the second terminal; the second authorization information includes authentication information input by the user to the second terminal.
  • the second terminal can determine that the user is the authorized user; when the first authorization information matches the second terminal
  • the pre-configured authorization information in the data does not match, the second terminal may determine that the user is the authorized user.
  • the authentication information input by the user in the second terminal may be a verification password or a fingerprint or a face image, etc., which is specifically determined according to actual conditions, which is not limited in the embodiment of the present application.
  • the second terminal may also authenticate the user in other ways, which will not be repeated here.
  • Step 206 When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal.
  • the second confirmation instruction is used to instruct the user to confirm, through the second terminal, to perform the management operation indicated by the management notification message on the first software.
  • Step 207 When the first terminal determines that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software through the authentication terminal .
  • the authentication terminal may be used to authenticate the user who confirms the management operation of the first software.
  • the authentication terminal is at least one of the first terminal and the second terminal. There is an association relationship between the second terminal and the first terminal. For how to establish an association relationship between the first terminal and the second terminal, reference may be made to the foregoing description, and details are not repeated here.
  • step 205 and step 207 is not limited, and the above description is only performed by taking step 205 first as an example. In practical applications, step 207 can also be performed first, or step 205 and step 207 can be performed at the same time, which will not be repeated here.
  • Step 208 When the first terminal determines that the user is an authorized user who manages the first software, and obtains the first confirmation instruction input by the user, and receives the second confirmation instruction from the second terminal , The first terminal performs the management operation on the first software according to the first confirmation instruction and the second confirmation instruction.
  • the first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software through the first terminal.
  • the first terminal and the second terminal determine whether the user is an authorized user at the same time.
  • the first terminal and the second terminal both determine the user When it is an authorized user, the first terminal can manage the first software. In this way, unauthorized users can be prevented from unauthorized management of the first software in the first terminal, the authorization management and control of the first software can be realized, and the security of the first terminal can be improved.
  • the authentication terminal may include at least one of the first terminal and the second terminal.
  • the management operation process of the first software may be different, which will be described separately below.
  • the authentication terminal includes a first terminal and a second terminal.
  • both the first terminal and the second terminal are required to determine that the user currently managing and operating the first software is an authorized user, and then the first software is managed.
  • the first terminal and the second terminal are required to determine that the user currently managing and operating the first software is an authorized user, and then the first software is managed.
  • Step 401 The network device determines that the authentication terminal is the first terminal and the second terminal according to the management policy corresponding to the first software, and sends a management notification message to the first terminal and the second terminal respectively.
  • the network device can determine the authentication terminal according to the first information in the management policy.
  • the network device sends a management notification message to indicate to the first terminal and the second terminal that the first software in the first terminal needs to be managed and operated, and the management operation needs to be performed.
  • the first terminal and the second terminal obtain the management notification message, they can execute the management operation process of the first software according to the management policy corresponding to the first software. For details, refer to the following process.
  • the first terminal and the second terminal determine that the first software needs to be managed and operated when receiving the management notification message of the network device, and the management notification message is equivalent to a trigger message for the first software to perform the management operation.
  • step 402 and step 403 may be included.
  • Step 402 The first terminal sends a first request message to the network device.
  • the first request message may be used to request an installation package or an update package of the first software.
  • the first request message may include the identification of the first terminal, the identification of the first software, and other information.
  • Step 403 The network device sends a first response message to the first terminal.
  • the first response message includes an installation package or an update package of the first software.
  • the first terminal can directly obtain the installation update package or the update package through the first response message.
  • the first response message includes the installation update package or the download address of the update package of the first software, and the first terminal may obtain the installation update package or the update package through the download address.
  • the download address may be implemented using a uniform resource locator (URL).
  • the first response message may include a uniform resource locator (uniform resource locator, URL), and the URL indicates an installation update package or a download address of the update package.
  • the first terminal can download the installation update package or update package of the first software through the URL.
  • Step 404 The first terminal receives the first response message, and obtains the installation package or the update package of the first software.
  • Step 405 The first terminal determines the authorization mode of the first software according to the second information in the management policy corresponding to the first software.
  • the first terminal may determine whether the user needs to be authenticated by the authentication terminal according to the authorization mode. Specifically, in a possible implementation manner, when it is determined that the authorization mode of the first software is the first mode, the first terminal determines that the user needs to be authenticated through the authentication terminal, and then the first The terminal can perform step 406 to step 411.
  • the first terminal determines that it needs to pass the authentication terminal pair The user is authenticated, and the first terminal can execute step 406 to step 411 at this time.
  • N is an integer greater than 1, and the first terminal It is determined that the user does not need to be authenticated by the authentication terminal. In this case, the first terminal may not perform step 406 and directly perform step 411.
  • a message may be sent to remind the second terminal.
  • the first terminal may also execute step 406 in other situations, which is not limited in the embodiment of the present application. It should be noted that step 406 may not be executed.
  • the second terminal may perform step 408 after receiving the management notification message in step 403.
  • Step 406 When the first terminal determines that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, the first terminal sends an authentication request message to the second terminal for requesting the second terminal to authenticate the user.
  • a secure transmission channel can be established between the first terminal and the second terminal through Near Field Communication (NFC), Bluetooth, Wireless Fidelity (WiFi), or wired mode, and the first terminal The information with the second terminal is transmitted through the secure transmission channel.
  • NFC Near Field Communication
  • WiFi Wireless Fidelity
  • Step 407 The first terminal obtains the first authorization information from the user.
  • the first authorization information includes the authentication information input by the user to the first terminal.
  • the authentication information input by the user in the first terminal may be a verification password or a fingerprint or a face image, etc., which is specifically determined according to actual conditions.
  • the first terminal may display the interface shown in FIG. 5 to prompt the user to input authentication information.
  • the user is prompted to enter the verification password as an example.
  • multiple options can also be displayed for the user to choose.
  • the user can also switch to input fingerprints or face images.
  • Step 408 The second terminal obtains the second authorization information from the user, and obtains the second confirmation instruction input by the user in the second terminal.
  • the second authorization information includes authentication information input by the user to the second terminal.
  • the second confirmation instruction is used to instruct the user to confirm the management operation of the first software.
  • the authentication information input by the user in the second terminal may be a verification password or a fingerprint or a face image, etc., which is specifically determined according to actual conditions.
  • an interface as shown in FIG. 6 can be displayed in the second terminal, and the user can input authentication information according to the prompt information in the interface.
  • the second terminal can display the interface shown in Figure 7A on the display screen.
  • Figure 7A shows the precautions for the software update, the estimated update time and other information for information
  • the user decides whether to update the first software immediately.
  • the second confirmation instruction is triggered, and the second terminal obtains the user's second confirmation instruction.
  • an update cancel instruction is triggered, indicating that the first software is not updated.
  • the second terminal may also obtain the second confirmation instruction in other ways, which will not be repeated here.
  • the second terminal obtains the update cancellation instruction, and at this time, the second terminal sends the update cancellation instruction to the first terminal.
  • the update operation of the first software may no longer be performed.
  • step 407 and step 408 is not limited, and the above description is only performed by taking step 407 first as an example. In practical applications, step 408 can also be performed first, or step 407 and step 408 can be performed at the same time, which will not be repeated here.
  • Step 409 The second terminal sends a second confirmation instruction and second authorization information to the first terminal.
  • the first terminal may verify the second authorization information, thereby determining whether the user is an authorized user according to the second authorization information.
  • the second terminal may also only send a second confirmation instruction to the first terminal.
  • the second terminal may verify the second authorization information to determine whether the user is Is an authorized user.
  • the second terminal sends the second authorization information as an example for description.
  • the first terminal After the first terminal obtains the second authorization information from the second terminal, it can determine whether the user currently performing the software management operation is an authorized user according to the first authorization information and the second authorization information. For details, refer to step 410.
  • Step 410 When the first authorization information matches the authorization information pre-configured in the first terminal, and the first authorization information or the pre-configured authorization information matches the second authorization information, the first authorization information A terminal determines that the user is the authorized user.
  • the first terminal determines that the user is not the authorized user.
  • the software management operation may not be performed.
  • the management operation of the first software may no longer be performed.
  • the pre-configured authorization information includes a pre-configured verification password
  • the first authorization information includes a verification password entered by the user
  • the second authorization information includes a verification password entered by the user.
  • the pre-configured authorization information includes a pre-configured authentication password and pre-configured fingerprint information
  • the first authorization information includes the authentication password entered by the user
  • the second authorization information includes the fingerprint information entered by the user.
  • the first terminal may determine the authorized user according to the third information in the management policy, and the specific process will not be repeated.
  • the first confirmation instruction input by the user in the first terminal may also be obtained. For details, refer to the following step 411.
  • Step 411 The first terminal obtains the user's first confirmation instruction.
  • the first confirmation instruction is used to instruct the user to confirm the management operation of the first software.
  • the first terminal may display an interface as shown in FIG. 7B on the display screen.
  • the user decides whether to update the first software immediately.
  • the user clicks "Confirm” in FIG. 7B the first confirmation instruction is triggered, and the first terminal obtains the user's first confirmation instruction.
  • an update cancel instruction is triggered, which means that the first software is not updated and the first terminal will not install the update package of the first software.
  • the first terminal may also obtain the first confirmation instruction in other ways, which will not be repeated here.
  • step 411 can also be executed between steps 403 and 410, for example, between step 403 and step 404, and step 411 can also be executed simultaneously with step 403.
  • the application embodiment does not limit the specific execution order of step 411.
  • Step 412 The first terminal performs the management operation on the first software according to the first confirmation instruction and the second confirmation instruction of the user.
  • the first terminal When the authentication terminals are the first terminal and the second terminal, and the first terminal obtains the first confirmation instruction input by the user in the first terminal and the second confirmation instruction input by the user in the second terminal, it can be determined to execute The management operation of the first software. For example, the first terminal may install the installation package or update package of the first software obtained in step 404, and the specific installation process will not be repeated.
  • the first terminal and the second terminal are required to determine whether the user who operates the first software is an authorized user.
  • the first terminal can manage and operate the first software. In this way, double authentication of the user is realized, it can be ensured that the management operation of the first software is authorized by the authorized user, the authorization control of the management operation of the first software is realized, and the security of the first terminal is improved.
  • steps 409 to 410 can also be replaced by the following steps.
  • the second terminal does not forward the second authorization information, but determines whether the user is an authorized user based on the second authorization information.
  • Step 409a The second terminal sends a second confirmation instruction to the first terminal.
  • step 409a the second terminal sends a second confirmation instruction to the first terminal when it is determined that it matches the authorization information pre-configured in the second terminal according to the second authorization information.
  • the second terminal determines that the user is not an authorized user, and may send a suspension management operation message to the first terminal; the suspension The management operation message is used to indicate that the user is not the authorized user.
  • the second terminal when it obtains the management cancellation instruction input by the user, it may determine not to perform management operations on the first software, so that a management cancellation message can be sent to the first terminal, where the management cancellation message is used to instruct the The user cancels the execution of the management operation.
  • step 410 can be replaced by the following steps:
  • Step 410a When the first authorization information matches the authorization information pre-configured in the first terminal, and a second confirmation instruction from the second terminal is received, the first terminal determines that the user is the authorized user.
  • the first terminal determines that the first authorization information does not match the authorization information pre-configured in the first terminal, or the first terminal receives a suspension management operation message from the first terminal, the first terminal determines that the user is not The authorized user can no longer perform the management operation.
  • the authentication terminal includes a first terminal and a second terminal.
  • the authentication terminal may also be the first terminal or the second terminal. The following will describe the authentication terminal as the first terminal.
  • Embodiment 2 The authentication terminal is the first terminal.
  • the first terminal When the authentication terminal is the first terminal, the first terminal is required to determine whether the user currently operating, managing, and operating the first software is an authorized user. For details, refer to the flow shown in FIG. 8.
  • Step 801 The network device determines that the authentication terminal is the first terminal according to the management policy corresponding to the first software, and sends a management notification message to the first terminal.
  • Step 802 The first terminal sends a first request message to the network device for requesting an installation package or an update package of the first software.
  • the first request message may include the identification of the first terminal, the identification of the first software, and other information.
  • step 802 and step 803 may be included.
  • Step 803 The network device sends a first response message to the first terminal.
  • Step 804 The first terminal receives the first response message, and obtains the installation package or the update package of the first software.
  • step 801 to step 804 reference may be made to the description in step 401 to step 404, which will not be repeated here.
  • Step 805 The first terminal determines the authorization mode of the first software according to the second information in the management policy corresponding to the first software.
  • the first terminal may determine whether the user needs to be authenticated by the authentication terminal according to the authorization mode. Specifically, in a possible implementation manner, when it is determined that the authorization mode of the first software is the first mode, the first terminal determines that the user needs to be authenticated through the authentication terminal, and then the first The terminal may perform step 806.
  • the first terminal determines that it needs to pass the authentication terminal pair The user is authenticated, and the first terminal may execute step 806 at this time.
  • N is an integer greater than 1, and the first terminal It is determined that the user does not need to be authenticated by the authentication terminal.
  • the first terminal may not perform step 806 and directly perform step 809.
  • Step 806 When the first terminal determines that the authentication terminal is the first terminal according to the management policy corresponding to the first software, the first terminal obtains the first authorization information from the user.
  • Step 807 When the first authorization information matches the authorization information pre-configured in the first terminal, the first terminal determines that the user is the authorized user.
  • the pre-configured authorization information includes a pre-configured verification password
  • the first authorization information includes a verification password entered by the user.
  • the first terminal determines that the user is not the authorized user.
  • the management operation may not be performed.
  • the first terminal Before the first terminal performs the management operation on the first software, it may also obtain the user's first confirmation instruction. For details, refer to the following step 808.
  • Step 808 The first terminal obtains the user's first confirmation instruction.
  • step 411 For specifically how the first terminal obtains the first confirmation instruction, reference may be made to the description in step 411, which will not be repeated here.
  • Step 809 The first terminal performs the management operation on the first software according to the first confirmation instruction of the user.
  • the first software may be installed according to the installation package obtained in step 804, or the first software may be updated according to the update package obtained in step 804.
  • steps 808 to 809 reference may be made to the descriptions of the corresponding steps in the flow shown in FIG. 4, which will not be repeated here.
  • step 808 can also be executed between step 803 and step 807, for example, between step 803 and step 804.
  • the specific execution order of step 808 in the embodiment of this application is Not limited.
  • the first terminal is required to determine whether the user performing the management operation of the first software is an authorized user. In this way, the authorization control of the management operation of the first software is realized, and the security of the first terminal is improved.
  • the following will describe the authentication terminal as the second terminal.
  • Embodiment 3 The authentication terminal is the second terminal.
  • the second terminal is required to determine whether the user currently executing the management operation of the first software is an authorized user. For details, refer to the flow shown in FIG. 9.
  • Step 901 The network device determines that the authentication terminal is the second terminal according to the management policy corresponding to the first software, and sends a management notification message to the first terminal and the second terminal respectively.
  • the network device can determine the authentication terminal according to the first information in the management policy.
  • step 902 and step 903 may be included.
  • Step 902 The first terminal sends a first request message to the network device for requesting an installation package or an update package of the first software.
  • Step 903 The network device sends a first response message to the first terminal.
  • Step 904 The first terminal receives the first response message, and obtains the installation package or the update package of the first software.
  • steps 901 to 904 reference may be made to the descriptions in the corresponding steps in the flow shown in FIG. 4, which will not be repeated here.
  • Step 905 The first terminal determines the authorization mode of the first software according to the second information in the management policy corresponding to the first software.
  • the first terminal may determine whether the user needs to be authenticated by the authentication terminal according to the authorization mode. Specifically, in a possible implementation manner, when it is determined that the authorization mode of the first software is the first mode, the first terminal determines that the user needs to be authenticated by the authentication terminal, and then the first The terminal may perform step 906.
  • the first terminal determines that it needs to pass the authentication terminal pair The user is authenticated, and the first terminal can execute step 906 at this time.
  • N is an integer greater than 1, and the first terminal It is determined that the user does not need to be authenticated by the authentication terminal. In this case, the first terminal may not perform step 906 and directly perform step 910.
  • a message may be sent to remind the second terminal.
  • the first terminal may also perform step 906 in other situations, which is not limited in the embodiment of the present application.
  • the second terminal may perform step 907 after receiving the management notification message in step 903.
  • step 906 when the first terminal determines that the authentication terminal is the second terminal according to the management policy corresponding to the first software, the first terminal sends an authentication request message to the second terminal for requesting the second terminal to authenticate the user.
  • Step 907 The second terminal obtains the second authorization information from the user.
  • the second authorization information may include a verification password or fingerprint or face image input by the user.
  • the second terminal determines that the user is an authorized user; correspondingly, when the second authorization information is determined When it does not match the authorization information pre-configured in the second terminal, the second terminal determines that the user is not an authorized user.
  • the pre-configured authorization information includes a pre-configured authentication password
  • the second authorization information includes the authentication password input by the user to the second terminal.
  • Step 908 The second terminal obtains the user's second confirmation instruction.
  • step 408 For specifically how the second terminal obtains the second confirmation instruction of the user, reference may be made to the description in step 408, which will not be repeated here.
  • step 908 may also be executed before step 907, and the specific execution order of step 907 and step 908 is not limited in the embodiment of the present application.
  • step 909 is executed.
  • Step 909 The second terminal sends a second confirmation instruction to the first terminal.
  • Step 910 The first terminal receives a second confirmation instruction, and executes the management operation on the first software according to the second confirmation instruction.
  • the second terminal may send a suspension management operation message to the first terminal; the suspension management The operation message is used to indicate that the user is not the authorized user.
  • the second terminal may send a management cancellation message to the first terminal; the management cancellation message is used to instruct to cancel the management operation of the first software.
  • the first terminal when the first terminal receives the message of suspending the management operation or the message of canceling the management operation, the first terminal may not perform the software management operation on the first software.
  • the second terminal before the first terminal performs the management operation, the second terminal is required to determine whether the user of the first software performing the management operation is an authorized user. In this way, it is possible to remotely authorize the management operation of the first software through the first terminal, and improve the flexibility of the management operation of the first software.
  • step 909 can also be replaced by the following step 909a.
  • the second terminal does not determine whether the user is an authorized user according to the second authorization information, but forwards the first 2. Authorization information.
  • Step 909a The second terminal sends the second confirmation instruction and second authorization information to the first terminal.
  • step 910 is replaced with step 910a.
  • Step 910a When the second authorization information matches the authorization information pre-configured in the first terminal, the first terminal determines that the user is the authorized user, and executes the first software according to the second confirmation instruction Management operations.
  • the first terminal determines that the user is not the authorized user.
  • the management operation may not be performed.
  • the pre-configured authorization information includes a pre-configured verification password
  • the second authorization information includes a verification password entered by the user.
  • the pre-configured authorization information includes pre-configured fingerprint information
  • the second authorization information includes fingerprint information input by the user.
  • the first terminal determines that the fingerprint information input by the user is the same as the pre-configured fingerprint information
  • the first terminal may determine that the user is an authorized user, otherwise, it may determine that the user is not an authorized user.
  • Figs. 4 to 9 describe the process of how to perform software management operations in the case of different authentication terminals. In the specific application process, the required process can be selected according to the actual situation.
  • the methods and operations implemented by the first terminal can also be implemented by components (such as chips or circuits) that can be used in the first terminal, and the methods and operations implemented by the second terminal can also be implemented by the second terminal. It can also be implemented by a component (such as a chip or circuit) that can be used in the second terminal, and the method and operation implemented by a network device can also be implemented by a component (such as a chip or circuit) that can be used in the network device.
  • the methods provided in the embodiments of the present application are respectively introduced from the perspective of interaction between various devices.
  • the first terminal, the second terminal, and the network device may include a hardware structure and/or a software module, in the form of a hardware structure, a software module, or a hardware structure plus a software module To achieve the above functions. Whether a certain function among the above-mentioned functions is executed by a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraint conditions of the technical solution.
  • the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • the functional modules in the various embodiments of the present application may be integrated in one processor, or may exist alone physically, or two or more modules may be integrated in one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules.
  • an embodiment of the present application further provides an apparatus 1000 for implementing the functions of the first terminal or the second terminal or the network device in the foregoing method.
  • the device may be a software module or a chip system.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the apparatus 1000 may include: a processing unit 1001 and a communication unit 1002.
  • the communication unit may also be referred to as a transceiver unit, and may include a sending unit and/or a receiving unit, which are respectively used to perform the sending and receiving steps of the first terminal or the second terminal or the network device in the above method embodiment. .
  • the apparatus 1000 can implement the steps or processes corresponding to the terminal device or the network device in the above method embodiment, which will be described separately below.
  • the communication unit 1002 is configured to receive management notification messages; the management notification messages are used to notify management operations of the first software; the management operations include updating the first software, installing the first software, and uninstalling the first software. Any item in a piece of software;
  • the processing unit 1001 is configured to, when it is determined that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software through the authentication terminal; When it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the second confirmation instruction from the second terminal is received, according to the first confirmation An instruction and the second confirmation instruction to perform the management operation indicated by the management notification message on the first software;
  • the first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software.
  • the management policy includes first information, and the first information is used to indicate the authentication terminal;
  • the processing unit 1001 is specifically configured to:
  • the first terminal determines, according to the first information in the management policy corresponding to the first software, that the authentication terminal includes the first terminal and the second terminal.
  • the management policy includes second information, and the second information is used to indicate an authorization mode of the first software
  • the processing unit 1001 is further configured to:
  • the authorization mode includes a first mode and a second mode
  • the first mode is that each management operation of the first software requires the authentication terminal to authenticate the user To be certified
  • the second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operations after the first management operation of the first software do not need to pass the The authentication terminal authenticates the user;
  • the processing unit 1001 is further configured to:
  • the authorization mode of the first software is the first mode, or the authorization mode of the first software is determined to be the second mode, and the first software is the first management operation, it is determined that the authorization mode needs to be passed
  • the authentication terminal authenticates the user.
  • processing unit 1001 is specifically configured to:
  • the first authorization information includes the information entered by the user in the first terminal
  • the second authorization information includes authentication information input by the user to the second terminal
  • the user is the authorized user.
  • the management policy includes third information, and the third information is used to indicate the authorized user;
  • the processing unit 1001 is further configured to:
  • the authorized user is determined according to the third information in the management policy.
  • the communication unit 1002 before the receiving the management notification message, is further configured to:
  • the communication device is a vehicle-mounted terminal
  • the second terminal is a mobile terminal
  • the communication unit 1002 is configured to receive the management notification message; the management notification message is used to notify the management operation of the first software; the management operation includes updating the first software, installing the first software, and uninstalling the first software. Any item of the first software;
  • the processing unit 1001 is configured to authenticate the user confirming to manage the first software when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software;
  • the second terminal When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal, and the second confirmation instruction is used to instruct the user to confirm Performing the management operation indicated by the management notification message on the first software.
  • processing unit 1001 is specifically configured to:
  • the second authorization information includes authentication information entered by the user in the second terminal;
  • the first authorization information matches the authorization information pre-configured in the second terminal, it is determined that the user is the authorized user who manages the first software.
  • the communication unit 1002 is further configured to:
  • the management policy includes first information, and the first information is used to indicate the authentication terminal; the processing unit 1001 determines the The authentication terminal is the second terminal.
  • the management policy includes third information, and the third information is used to indicate the authorized user; the processing unit 1001 is further used to:
  • the authorized user is determined according to the third information in the management policy.
  • the first terminal is a vehicle-mounted terminal
  • the second terminal is a mobile terminal
  • the processing unit 1001 is configured to determine an authentication terminal according to a management policy corresponding to the first software when it is determined to perform a management operation on the first software, and the authentication terminal is used to authenticate a user who confirms the management of the first software;
  • the authentication terminal includes a first terminal and a second terminal;
  • the management operation includes any one of updating the first software, installing the first software, and uninstalling the first software;
  • the communication unit 1002 is configured to send a management notification message to the authentication terminal, where the management notification message is used to notify the first software to perform the management operation.
  • the communication unit 1002 before the determining to perform a management operation on the first software, the communication unit 1002 is further configured to:
  • the management policy includes first information, and the first information is used to indicate the authentication terminal;
  • the processing unit 1001 is specifically configured to:
  • the authentication terminal is determined according to the first information in the management policy.
  • the first terminal is a vehicle-mounted terminal
  • the second terminal is a mobile terminal
  • the management policy includes first information, and the first information is used to indicate the authentication terminal; the processing unit 1001 determines the Authentication terminal.
  • FIG. 11 shows an apparatus 1100 provided by an embodiment of the application, and the apparatus shown in FIG. 11 may be a hardware circuit implementation of the apparatus shown in FIG. 10.
  • the communication device can be applied to the flowchart shown in FIG. 2 to perform the functions of the terminal device or the network device in the foregoing method embodiment.
  • FIG. 11 only shows the main components of the communication device.
  • the apparatus 1100 shown in FIG. 11 includes at least one processor 1120, configured to implement any method in FIG. 2 provided in an embodiment of the present application.
  • the device 1100 may further include at least one memory 1130 for storing program instructions and/or data.
  • the memory 1130 and the processor 1120 are coupled.
  • the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, and may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
  • the processor 1120 may operate in cooperation with the memory 1130.
  • the processor 1120 may execute program instructions stored in the memory 1130. At least one of the at least one memory may be included in the processor.
  • each step of the above method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the steps of the method disclosed in combination with the embodiments of the present application may be embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processing circuit (digital signal processor, DSP), a dedicated integrated circuit (application specific integrated circuit, ASIC), a field programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processing circuit
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • Programming logic devices discrete gates or transistor logic devices, discrete hardware components.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM
  • the apparatus 1100 may further include a communication interface 1110 for communicating with other devices through a transmission medium, so that the apparatus used in the apparatus 1100 can communicate with other devices.
  • the communication interface may be a transceiver, circuit, bus, module, or other type of communication interface.
  • the transceiver when the communication interface is a transceiver, the transceiver may include an independent receiver and an independent transmitter; it may also be a transceiver with integrated transceiver functions, or an interface circuit.
  • the device 1100 may also include a communication line 1140.
  • the communication interface 1110, the processor 1120, and the memory 1130 may be connected to each other through a communication line 1140;
  • the communication line 1140 may be a peripheral component interconnection standard (peripheral component interconnect, PCI for short) bus or an extended industry standard architecture (extended industry standard architecture) , Referred to as EISA) bus and so on.
  • the communication line 1140 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is used to represent in FIG. 11, but it does not mean that there is only one bus or one type of bus.
  • the communication interface 1110 is used to receive management notification messages; the management notification messages are used to notify management operations of the first software; the management operations include updating the first software, installing the first software, and uninstalling the first software. Any item in a piece of software;
  • the processor 1120 is configured to, according to the management policy corresponding to the first software, determine that the authentication terminal includes the first terminal and the second terminal, authenticate the user who confirms the management of the first software through the authentication terminal; When it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the second confirmation instruction from the second terminal is received, according to the first confirmation An instruction and the second confirmation instruction to perform the management operation indicated by the management notification message on the first software;
  • the first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software.
  • the management policy includes first information, and the first information is used to indicate the authentication terminal;
  • the processor 1120 is specifically configured to:
  • the first terminal determines, according to the first information in the management policy corresponding to the first software, that the authentication terminal includes the first terminal and the second terminal.
  • the management policy includes second information, and the second information is used to indicate an authorization mode of the first software
  • the processor 1120 is further configured to:
  • the authorization mode includes a first mode and a second mode
  • the first mode is that each management operation of the first software requires the authentication terminal to authenticate the user To be certified
  • the second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operations after the first management operation of the first software do not need to pass the The authentication terminal authenticates the user;
  • the processor 1120 is further configured to:
  • the authorization mode of the first software is the first mode, or the authorization mode of the first software is determined to be the second mode, and the first software is the first management operation, it is determined that it needs to pass
  • the authentication terminal authenticates the user.
  • the processor 1120 is specifically configured to:
  • the first authorization information includes the information entered by the user in the first terminal
  • the second authorization information includes authentication information input by the user to the second terminal
  • the user is the authorized user.
  • the management policy includes third information, and the third information is used to indicate the authorized user;
  • the processor 1120 is further configured to:
  • the authorized user is determined according to the third information in the management policy.
  • the communication interface 1110 before the receiving the management notification message, is further configured to:
  • the communication device is a vehicle-mounted terminal
  • the second terminal is a mobile terminal
  • the communication interface 1110 is used to receive the management notification message; the management notification message is used to notify the management operation of the first software; the management operation includes updating the first software, installing the first software, and uninstalling the first software. Any item of the first software;
  • the processor 1120 is configured to, when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who is confirmed to manage the first software;
  • the second terminal When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal, and the second confirmation instruction is used to instruct the user to confirm Performing the management operation indicated by the management notification message on the first software.
  • the processor 1120 is specifically configured to:
  • the second authorization information includes authentication information entered by the user in the second terminal;
  • the first authorization information matches the authorization information pre-configured in the second terminal, it is determined that the user is the authorized user who manages the first software.
  • the communication interface 1110 is further used for:
  • the management policy includes first information, and the first information is used to indicate the authentication terminal; the processor 1120 determines the The authentication terminal is the second terminal.
  • the management policy includes third information, and the third information is used to indicate the authorized user; the processor 1120 is further configured to:
  • the authorized user is determined according to the third information in the management policy.
  • the first terminal is a vehicle-mounted terminal
  • the second terminal is a mobile terminal
  • the processor 1120 is configured to determine an authentication terminal according to a management policy corresponding to the first software when it is determined to perform a management operation on the first software, where the authentication terminal is used to authenticate a user who has confirmed the management of the first software;
  • the authentication terminal includes a first terminal and a second terminal; the management operation includes any one of updating the first software, installing the first software, and uninstalling the first software;
  • the communication interface 1110 is configured to send a management notification message to the authentication terminal, where the management notification message is used to notify the first software to perform the management operation.
  • the communication interface 1110 is further used for:
  • the management policy includes first information, and the first information is used to indicate the authentication terminal;
  • the processor 1120 is specifically configured to:
  • the authentication terminal is determined according to the first information in the management policy.
  • the first terminal is a vehicle-mounted terminal
  • the second terminal is a mobile terminal
  • the management policy includes first information, and the first information is used to indicate the authentication terminal; the processor 1120 determines the Authentication terminal.
  • the embodiment of the present application also provides a system.
  • the system 1200 includes a network device 1201, a first terminal 1202, and a second terminal 1203.
  • the network device 1201 is configured to determine an authentication terminal according to a management policy corresponding to the first software when determining to perform a management operation on the first software, and the authentication terminal is used to authenticate a user who has confirmed the management of the first software;
  • the authentication terminal includes a first terminal and a second terminal; a management notification message is sent to the authentication terminal, and the management notification message is used to notify the management operation of the first software;
  • the management operation includes updating the Any one of the first software, installing the first software, and uninstalling the first software;
  • the second terminal 1203 is configured to receive the management notification message; when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software; when it is determined When the user is an authorized user who manages the first software, a second confirmation instruction input by the user is sent to the first terminal, where the second confirmation instruction is used to instruct the user to use the second terminal Confirming that the management operation indicated by the management notification message is performed on the first software;
  • the first terminal 1202 is configured to receive the management notification message; when it is determined that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, the authentication terminal is used to confirm the management office
  • the user of the first software is authenticated; when it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the second terminal is received from the second terminal.
  • the first confirmation instruction is used to instruct the The user confirms to perform the management operation on the first software through the first terminal.
  • the network device 1201, the first terminal 1202, and the second terminal 1203 may also execute other content. For details, reference may be made to the foregoing description, which will not be repeated here.
  • this application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, optical storage, etc.) containing computer-usable program codes.
  • a computer-usable storage media including but not limited to disk storage, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.

Abstract

Provided are a software management method, apparatus and system, wherein same can be applied to fields such as the Internet of Vehicles, intelligent driving and intelligent connected vehicles. The method comprises: after a first terminal receives a management notification message, the first terminal being able to determine an authentication terminal according to a management policy corresponding to first software, and authenticating, by means of the authentication terminal, a user who confirms the management of the first software; and when it is determined that the user is a user authorized to manage the first software, and a first confirmation instruction input by the user is acquired and a second conformation instruction from a second terminal is received, executing a management operation, which is indicated by the management notification message, on the first software. According to the method, a first terminal and a second terminal simultaneously authenticate a user, such that an illegitimate user can be prevented from unauthorized management of first software in the first terminal, thereby realizing management and control over the authorization of the updating of the first software and improving the security of the first terminal.

Description

一种软件管理方法、装置及系统Software management method, device and system
相关申请的交叉引用Cross-references to related applications
本申请要求在2019年12月19日提交中国专利局、申请号为201911318704.2、申请名称为“一种软件管理方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office, the application number is 201911318704.2, and the application name is "a software management method, device and system" on December 19, 2019. The entire content is incorporated herein by reference. Applying.
技术领域Technical field
本申请涉及车联网技术领域,尤其涉及一种软件管理方法、装置及系统。This application relates to the technical field of Internet of Vehicles, and in particular to a software management method, device and system.
背景技术Background technique
随着汽车产业的不断发展,汽车的电动化、智能化、网联化以及共享化的不断深入,汽车本身的软件功能日趋复杂。和汽车的硬件相比,汽车的软件的更新速度更快,因此,由于软件更新而导致的错误会与日俱增,对汽车的安全驾驶带来了极大的风险。With the continuous development of the automobile industry and the deepening of the electrification, intelligence, networking and sharing of automobiles, the software functions of automobiles themselves are becoming more and more complex. Compared with the car's hardware, the car's software is updated faster. Therefore, the errors caused by the software update will increase day by day, which brings great risks to the safe driving of the car.
目前,一般采用空中编程(over-the-air programming,OTA)技术通过远程无线方式对汽车中的软件进行安装、更新以及卸载等管理操作。以更新软件为例,由于汽车安全性的要求非常高,因此对汽车中的软件进行更新相对于普通的软件更新来说有很大的不同。具体来说,根据目前的行业标准以及相关的法律框架规定,汽车中的软件进行更新操作前,需要通知用户相关的更新操作,而相关更新执行操作也应该由用户进行授权。因此,采用OTA技术对汽车中的软件进行更新是一个需要用户参与的过程。在这个过程中,要保证整个软件更新流程都得到了合法用户的合理授权。At present, over-the-air programming (OTA) technology is generally used to perform management operations such as installing, updating, and uninstalling software in a car through a remote wireless manner. Take updating software as an example. Due to the very high requirements of automobile safety, updating the software in the automobile is quite different from ordinary software updating. Specifically, according to current industry standards and relevant legal frameworks, before the software in the car is updated, the user needs to be notified of the relevant update operation, and the relevant update execution operation should also be authorized by the user. Therefore, using OTA technology to update the software in the car is a process that requires user participation. In this process, it is necessary to ensure that the entire software update process has been reasonably authorized by legitimate users.
然而,目前在对车辆中的软件进行安装、更新以及卸载等管理操作流程中,容易出现未经授权的用户对软件执行管理操作,导致汽车中的软件出现越权安装、更新以及卸载等问题,从而导致汽车无法正常行驶,这些问题对于正在行驶中的汽车是极其危险的。However, in the current management operation process of installing, updating and uninstalling the software in the vehicle, it is easy for unauthorized users to perform management operations on the software, which leads to problems such as unauthorized installation, update and uninstallation of the software in the vehicle. As a result, the car cannot run normally. These problems are extremely dangerous to the car in motion.
综上所述,现有技术中,由于采用OTA技术对汽车中的软件进行管理过程中,存在软件管理的授权管控不足,导致不当升级或升级事故,严重的将会影响汽车安全行驶或正常行驶。To sum up, in the prior art, due to the lack of authorization control of software management in the process of using OTA technology to manage the software in the car, it leads to improper upgrade or upgrade accidents, which will seriously affect the safe driving or normal driving of the car. .
发明内容Summary of the invention
本申请实施例提供一种软件管理方法、装置及系统,用以解决在对软件进行管理过程中,如何进行授权管控,避免由于软件管理出现安全问题。The embodiments of the present application provide a software management method, device, and system to solve how to perform authorization management and control in the process of software management, so as to avoid security problems due to software management.
第一方面,本申请实施例提供一种软件管理方法,该方法包括:第一终端接收管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;所述第一终端根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和第二终端时,通过所述认证终端对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户,且获取到所述用户输入的第一确认指示,以及接收到来自所述第二终端的第二确认指示时,所述第一终端根据所述第一确认指示以及所述第二确认指示对所述第一软件执行 所述管理通知消息指示的所述管理操作;其中,所述第一确认指示用于指示所述用户通过所述第一终端确认对所述第一软件执行所述管理操作。In a first aspect, an embodiment of the present application provides a software management method. The method includes: a first terminal receives a management notification message; the management notification message is used to notify a management operation of the first software; and the management operation includes updating the software. Any one of the first software, installing the first software, and uninstalling the first software; the first terminal determines according to the management policy corresponding to the first software that the authentication terminal includes the first terminal and the first software In the case of the second terminal, the user who confirms the management of the first software is authenticated through the authentication terminal; when it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained , And when receiving a second confirmation instruction from the second terminal, the first terminal executes the management notification message instruction on the first software according to the first confirmation instruction and the second confirmation instruction The management operation; wherein the first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software through the first terminal.
通过上面的方法,在对第一终端中的第一软件进行管理操作之前,通过第一终端和第二终端同时确定用户是否为授权用户,当第一终端和第二终端均确定所述用户是授权用户时,第一终端可以管理第一软件。通过这种方式,可以避免非法用户越权管理第一终端中的第一软件,实现对第一软件的管理授权管控,避免第一终端由于软件管理出现的安全问题。Through the above method, before performing the management operation on the first software in the first terminal, the first terminal and the second terminal simultaneously determine whether the user is an authorized user. When both the first terminal and the second terminal determine that the user is When the user is authorized, the first terminal can manage the first software. In this way, it is possible to prevent unauthorized users from unauthorized management of the first software in the first terminal, realize management authorization management and control of the first software, and avoid security problems of the first terminal due to software management.
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;所述第一终端根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和第二终端,包括:所述第一终端根据所述第一软件对应的所述管理策略中的所述第一信息确定所述认证终端包括所述第一终端和所述第二终端。In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal; the first terminal determines that the authentication terminal includes all the authentication terminals according to the management policy corresponding to the first software. The first terminal and the second terminal include: the first terminal determines that the authentication terminal includes the first terminal and the first terminal according to the first information in the management policy corresponding to the first software Two terminal.
一种可能的实现方式中,所述管理策略包括第二信息,所述第二信息用于指示所述第一软件的授权模式;所述第一终端对确认管理所述第一软件的用户进行认证之前,还包括:In a possible implementation manner, the management policy includes second information, and the second information is used to indicate the authorization mode of the first software; Before certification, it also includes:
所述第一终端根据所述管理策略中的所述第二信息确定所述第一软件的授权模式;所述第一终端根据所述授权模式确定需要通过所述认证终端对所述用户进行认证。The first terminal determines the authorization mode of the first software according to the second information in the management policy; the first terminal determines according to the authorization mode that the user needs to be authenticated by the authentication terminal .
一种可能的实现方式中,所述授权模式包括第一模式和第二模式,所述第一模式为所述第一软件的每一次的管理操作都需要通过所述认证终端对所述用户进行认证;所述第二模式为所述第一软件的第一次管理操作需要通过所述认证终端对所述用户进行认证,所述第一软件的第一次管理操作之后的管理操作不需要通过所述认证终端对所述用户进行认证;所述第一终端通过所述认证终端对确认管理所述第一软件的用户进行认证之前,还包括:当确定所述第一软件的授权模式为所述第一模式,或者确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,确定需要通过所述认证终端对所述用户进行认证。In a possible implementation manner, the authorization mode includes a first mode and a second mode, and the first mode is that each management operation of the first software requires the authentication terminal to perform the authentication on the user. Authentication; the second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operation after the first management operation of the first software does not need to pass The authentication terminal authenticates the user; before the first terminal authenticates the user confirming the management of the first software through the authentication terminal, the method further includes: when it is determined that the authorization mode of the first software is all In the first mode, or when it is determined that the authorization mode of the first software is the second mode, and the first software is the first management operation, it is determined that the user needs to be authenticated through the authentication terminal.
一种可能的实现方式中,所述方法还包括:所述第一终端获取所述用户在所述第一终端中输入的第一授权信息,并获取来自所述第二终端的第二授权信息;所述第一授权信息包括所述用户输入至所述第一终端的认证信息,所述第二授权信息包括所述用户输入至所述第二终端的认证信息;当所述第一授权信息与所述第一终端中预配置的授权信息相匹配,且所述第一授权信息或者所述预配置的授权信息与所述第二授权信息相匹配时,所述第一终端确定所述用户是所述授权用户。In a possible implementation manner, the method further includes: the first terminal obtains the first authorization information input by the user in the first terminal, and obtains the second authorization information from the second terminal The first authorization information includes the authentication information entered by the user to the first terminal, and the second authorization information includes the authentication information entered by the user to the second terminal; when the first authorization information When it matches the authorization information pre-configured in the first terminal, and the first authorization information or the pre-configured authorization information matches the second authorization information, the first terminal determines that the user Is the authorized user.
一种可能的实现方式中,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;所述第一终端通过所述认证终端对确认管理所述第一软件的用户进行认证之前,还包括:所述第一终端根据所述管理策略中的所述第三信息确定所述授权用户。In a possible implementation manner, the management policy includes third information, and the third information is used to indicate the authorized user; the first terminal confirms the user who manages the first software through the authentication terminal Before performing the authentication, the method further includes: the first terminal determines the authorized user according to the third information in the management policy.
一种可能的实现方式中,所述第一终端接收管理通知消息之前,还包括:所述第一终端获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;或者所述第一终端接收来自所述网络设备的所述管理策略。In a possible implementation manner, before the first terminal receives the management notification message, the method further includes: the first terminal obtains the management policy set by the authorized user, and sends the management policy to the network device Or the first terminal receives the management policy from the network device.
一种可能的实现方式中,所述第一终端为车载终端,所述第二终端为移动终端。In a possible implementation manner, the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
第二方面,本申请还提供一种通信装置,该通信装置具有实现上述第一方面提供的任一方法。该通信装置可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或单元。该通信装置可以是车辆。In the second aspect, the present application also provides a communication device that has any method provided in the first aspect. The communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software. The hardware or software includes one or more units or units corresponding to the above-mentioned functions. The communication device may be a vehicle.
在一种可能的实现方式中,该通信装置包括:处理器,该处理器被配置为支持该通信 装置执行以上所示方法中第一终端的相应功能。该通信装置还可以包括存储器,该存储可以与处理器耦合,其保存该通信装置必要的程序指令和数据。可选地,该通信装置还包括通信接口,该通信接口用于支持该通信装置与第二终端、网络设备等设备之间的通信。In a possible implementation manner, the communication device includes a processor configured to support the communication device to perform the corresponding function of the first terminal in the above-mentioned method. The communication device may further include a memory, and the storage may be coupled with the processor, which stores program instructions and data necessary for the communication device. Optionally, the communication device further includes a communication interface, and the communication interface is used to support communication between the communication device and the second terminal, network equipment and other devices.
在一种可能的实现方式中,该通信装置包括相应的功能单元,分别用于实现以上方法中的步骤。功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的单元。In a possible implementation manner, the communication device includes corresponding functional units, which are respectively used to implement the steps in the above method. The function can be realized by hardware, or the corresponding software can be executed by hardware. The hardware or software includes one or more units corresponding to the above-mentioned functions.
在一种可能的实施方式中,通信装置的结构中包括处理单元和通信单元,这些单元可以执行上述方法示例中相应功能,具体参见第三方面提供的方法中的描述,此处不做赘述。In a possible implementation manner, the structure of the communication device includes a processing unit and a communication unit, and these units can perform corresponding functions in the foregoing method examples. For details, refer to the description of the method provided in the third aspect, which is not repeated here.
第三方面,提供一种软件管理方法,包括:第二终端接收所述管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;所述第二终端根据所述第一软件对应的管理策略确定认证终端包括所述第二终端时,对确认管理所述第一软件的用户进行认证;In a third aspect, a software management method is provided, including: a second terminal receives the management notification message; the management notification message is used to notify a management operation of the first software; the management operation includes updating the first software , Install the first software, uninstall any one of the first software; when the second terminal determines that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, confirm the management office The user of the first software is authenticated;
当确定所述用户为管理所述第一软件的授权用户时,所述第二终端向第一终端发送所述用户输入的第二确认指示,所述第二确认指示用于指示所述用户通过所述第二终端确认对所述第一软件执行所述管理通知消息指示的所述管理操作。When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal, and the second confirmation instruction is used to instruct the user to pass The second terminal confirms that the management operation indicated by the management notification message is performed on the first software.
一种可能的实现方式中,所述第二终端确定所述用户为管理所述第一软件的授权用户,包括:所述第二终端获取所述用户在所述第二终端中输入的第二授权信息;所述第二授权信息包括所述用户输入至所述第二终端的认证信息;当所述第一授权信息与所述第二终端中预配置的授权信息相匹配时,所述第二终端确定所述用户是管理所述第一软件的所述授权用户。In a possible implementation manner, the determining, by the second terminal, that the user is an authorized user who manages the first software includes: the second terminal acquiring the second input by the user in the second terminal Authorization information; the second authorization information includes the authentication information input by the user to the second terminal; when the first authorization information matches the authorization information pre-configured in the second terminal, the first authorization information The second terminal determines that the user is the authorized user who manages the first software.
一种可能的实现方式中,所述方法还包括:所述第二终端获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;或者所述第二终端接收来自所述网络设备的所述管理策略。In a possible implementation manner, the method further includes: the second terminal obtains the management policy set by the authorized user, and sends the management policy to the network device; or the second terminal receives The management policy from the network device.
一种可能的实现方式中,所述第二终端确定所述用户为更新所述第一软件的授权用户,包括:所述第二终端获取第二授权信息;所述第二授权信息包括所述用户输入至所述第二终端的认证信息;当确定所述第二授权信息与所述第二终端中预配置的授权信息相匹配时,所述第二终端确定所述用户是所述授权用户。In a possible implementation manner, the second terminal determining that the user is an authorized user to update the first software includes: the second terminal obtains second authorization information; the second authorization information includes the The authentication information entered by the user into the second terminal; when it is determined that the second authorization information matches the authorization information pre-configured in the second terminal, the second terminal determines that the user is the authorized user .
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;所述第二终端根据所述管理策略中的所述第一信息确定所述认证终端为所述第二终端。In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal; and the second terminal determines the The authentication terminal is the second terminal.
一种可能的实现方式中,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;所述方法还包括:所述第二终端根据所述管理策略中的所述第三信息确定所述授权用户。In a possible implementation manner, the management policy includes third information, and the third information is used to indicate the authorized user; the method further includes: the second terminal according to the management policy The third information determines the authorized user.
第四方面,本申请还提供一种通信装置,该通信装置具有实现上述第三方面提供的任一方法。该通信装置可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或单元。In a fourth aspect, the present application also provides a communication device having any method provided in the third aspect. The communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software. The hardware or software includes one or more units or units corresponding to the above-mentioned functions.
在一种可能的实现方式中,该通信装置包括:处理器,该处理器被配置为支持该通信装置执行以上所示方法中第二终端的相应功能。该通信装置还可以包括存储器,该存储可以与处理器耦合,其保存该通信装置必要的程序指令和数据。可选地,该通信装置还包括通信接口,该通信接口用于支持该通信装置与第一终端、网络设备等设备之间的通信。In a possible implementation manner, the communication device includes a processor configured to support the communication device to perform the corresponding function of the second terminal in the method shown above. The communication device may further include a memory, and the storage may be coupled with the processor, which stores program instructions and data necessary for the communication device. Optionally, the communication device further includes a communication interface, and the communication interface is used to support communication between the communication device and the first terminal, network equipment and other devices.
在一种可能的实现方式中,该通信装置包括相应的功能单元,分别用于实现以上方法中的步骤。功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的单元。In a possible implementation manner, the communication device includes corresponding functional units, which are respectively used to implement the steps in the above method. The function can be realized by hardware, or the corresponding software can be executed by hardware. The hardware or software includes one or more units corresponding to the above-mentioned functions.
在一种可能的实施方式中,通信装置的结构中包括处理单元和通信单元,这些单元可以执行上述方法示例中相应功能,具体参见第三方面提供的方法中的描述,此处不做赘述。In a possible implementation manner, the structure of the communication device includes a processing unit and a communication unit, and these units can perform corresponding functions in the foregoing method examples. For details, refer to the description of the method provided in the third aspect, which is not repeated here.
第五方面,提供一种软件管理方法,包括:当确定对第一软件进行管理操作时,网络设备根据所述第一软件对应的管理策略确定认证终端,所述认证终端用于对确认管理所述第一软件的用户进行认证;所述认证终端包括第一终端和第二终端;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;In a fifth aspect, a software management method is provided, which includes: when it is determined to perform a management operation on the first software, the network device determines an authentication terminal according to a management policy corresponding to the first software, and the authentication terminal is used to confirm the management office. The user of the first software is authenticated; the authentication terminal includes a first terminal and a second terminal; the management operation includes updating the first software, installing the first software, and uninstalling any of the first software. One item
所述网络设备向所述认证终端发送管理通知消息,所述管理通知消息用于通知对所述第一软件进行所述管理操作。The network device sends a management notification message to the authentication terminal, where the management notification message is used to notify the first software to perform the management operation.
一种可能的实现方式中,所述确定对第一软件进行管理操作之前,所述方法还包括:In a possible implementation manner, before the determining to perform a management operation on the first software, the method further includes:
所述网络设备向所述第一终端以及所述第二终端发送所述管理策略;或者所述网络设备接收来自所述第一终端或所述第二终端的所述管理策略。The network device sends the management policy to the first terminal and the second terminal; or the network device receives the management policy from the first terminal or the second terminal.
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;所述网络设备根据所述第一软件对应的管理策略确定认证终端,包括:所述网络设备根据所述管理策略中的所述第一信息确定所述认证终端。In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal; the network device determines the authentication terminal according to the management policy corresponding to the first software, including: The network device determines the authentication terminal according to the first information in the management policy.
一种可能的实现方式中,所述第一终端为车载终端,所述第二终端为移动终端。In a possible implementation manner, the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;所述网络设备根据所述管理策略中的所述第一信息确定所述认证终端。In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal; the network device determines the authentication according to the first information in the management policy terminal.
第六方面,本申请还提供一种通信装置,该通信装置具有实现上述第五方面提供的任一方法。该通信装置可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或单元。In a sixth aspect, the present application also provides a communication device that has any method provided in the fifth aspect. The communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software. The hardware or software includes one or more units or units corresponding to the above-mentioned functions.
在一种可能的实现方式中,该通信装置包括:处理器,该处理器被配置为支持该通信装置执行以上所示方法中网络设备的相应功能。该通信装置还可以包括存储器,该存储可以与处理器耦合,其保存该通信装置必要的程序指令和数据。可选地,该通信装置还包括通信接口,该通信接口用于支持该通信装置与第一终端、第二终端等设备之间的通信。In a possible implementation manner, the communication device includes a processor configured to support the communication device to perform the corresponding function of the network device in the method shown above. The communication device may further include a memory, and the storage may be coupled with the processor, which stores program instructions and data necessary for the communication device. Optionally, the communication device further includes a communication interface, and the communication interface is used to support communication between the communication device and the first terminal, the second terminal, and other devices.
在一种可能的实现方式中,该通信装置包括相应的功能单元,分别用于实现以上方法中的步骤。功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的单元。In a possible implementation manner, the communication device includes corresponding functional units, which are respectively used to implement the steps in the above method. The function can be realized by hardware, or the corresponding software can be executed by hardware. The hardware or software includes one or more units corresponding to the above-mentioned functions.
在一种可能的实施方式中,通信装置的结构中包括处理单元和通信单元,这些单元可以执行上述方法示例中相应功能,具体参见第三方面提供的方法中的描述,此处不做赘述。In a possible implementation manner, the structure of the communication device includes a processing unit and a communication unit, and these units can perform corresponding functions in the foregoing method examples. For details, refer to the description of the method provided in the third aspect, which is not repeated here.
第七方面,本申请提供一种系统,包括:网络设备,用于确定对第一软件进行管理操作时,根据所述第一软件对应的管理策略确定认证终端,所述认证终端用于对确认管理所述第一软件的用户进行认证;所述认证终端包括第一终端和第二终端;向所述认证终端发送管理通知消息,所述管理通知消息用于通知对所述第一软件进行所述管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;In a seventh aspect, the present application provides a system that includes: a network device, configured to determine an authentication terminal according to a management policy corresponding to the first software when determining to perform management operations on the first software, and the authentication terminal is used to confirm The user who manages the first software is authenticated; the authentication terminal includes a first terminal and a second terminal; and a management notification message is sent to the authentication terminal, and the management notification message is used to notify the first software to perform the authentication. The management operation; the management operation includes any one of updating the first software, installing the first software, and uninstalling the first software;
所述第二终端,用于接收所述管理通知消息;根据所述第一软件对应的管理策略确定认证终端包括所述第二终端时,对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户时,向所述第一终端发送所述用户输入的第二确认指示, 所述第二确认指示用于指示所述用户通过所述第二终端确认对所述第一软件执行所述管理通知消息指示的所述管理操作;The second terminal is configured to receive the management notification message; when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software; when When it is determined that the user is an authorized user who manages the first software, a second confirmation instruction input by the user is sent to the first terminal, where the second confirmation instruction is used to instruct the user to pass the second The terminal confirms that the management operation indicated by the management notification message is performed on the first software;
所述第一终端,用于接收所述管理通知消息;根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和所述第二终端时,通过所述认证终端对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户,且获取到所述用户输入的第一确认指示,以及接收到来自所述第二终端的第二确认指示时,根据所述第一确认指示以及所述第二确认指示对所述第一软件执行所述管理通知消息指示的所述管理操作;其中,所述第一确认指示用于指示所述用户通过所述第一终端确认对所述第一软件执行所述管理操作。The first terminal is configured to receive the management notification message; when it is determined that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, the authentication terminal is used to confirm management The user of the first software is authenticated; when it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the first confirmation instruction from the second terminal is received 2. When confirming the instruction, perform the management operation indicated by the management notification message on the first software according to the first confirmation instruction and the second confirmation instruction; wherein, the first confirmation instruction is used to instruct all The user confirms the execution of the management operation on the first software through the first terminal.
通过上面的系统,第一终端中的第一软件在更新之前,通过第一终端和第二终端同时确定用户是否为授权用户,当第一终端和第二终端均确定所述用户是授权用户时,第一终端可以管理第一软件。通过这种方式,可以避免非法用户越权管理第一终端中的第一软件,实现对第一软件的管理授权管控,避免第一终端由于软件管理出现的安全问题。Through the above system, before the first software in the first terminal is updated, the first terminal and the second terminal simultaneously determine whether the user is an authorized user. When both the first terminal and the second terminal determine that the user is an authorized user , The first terminal can manage the first software. In this way, it is possible to prevent unauthorized users from unauthorized management of the first software in the first terminal, realize management authorization management and control of the first software, and avoid security problems of the first terminal due to software management.
在一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;所述根据所述第一软件对应的管理策略确定认证终端,包括:根据所述管理策略中的所述第一信息确定所述认证终端。In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal; the determining the authentication terminal according to the management policy corresponding to the first software includes: The first information in the management policy determines the authentication terminal.
在一种可能的实现方式中,所述管理策略包括第二信息,所述第二信息用于指示所述第一软件的授权模式;所述第一终端对确认管理所述第一软件的用户进行认证之前,还包括:根据所述管理策略中的所述第二信息确定所述第一软件的授权模式;根据所述授权模式确定需要通过所述认证终端对所述用户进行认证。In a possible implementation manner, the management policy includes second information, and the second information is used to indicate the authorization mode of the first software; the first terminal confirms the user who manages the first software Before performing authentication, the method further includes: determining an authorization mode of the first software according to the second information in the management policy; and determining, according to the authorization mode, that the user needs to be authenticated by the authentication terminal.
在一种可能的实现方式中,所述授权模式包括第一模式和第二模式,所述第一模式为所述第一软件的每一次的管理操作都需要通过所述认证终端对所述用户进行认证;In a possible implementation manner, the authorization mode includes a first mode and a second mode, and the first mode is that each management operation of the first software requires the authentication terminal to authenticate the user. To be certified;
所述第二模式为所述第一软件的第一次管理操作需要通过所述认证终端对所述用户进行认证,所述第一软件的第一次管理操作之后的管理操作不需要通过所述认证终端对所述用户进行认证;所述第一终端具体用于:当确定所述第一软件的授权模式为所述第一模式,或者确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,确定需要通过所述认证终端对所述用户进行认证。The second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operations after the first management operation of the first software do not need to pass the The authentication terminal authenticates the user; the first terminal is specifically configured to: when determining that the authorization mode of the first software is the first mode, or determining that the authorization mode of the first software is the second mode, And when the first software is the first management operation, it is determined that the user needs to be authenticated through the authentication terminal.
在一种可能的实现方式中,所述第一终端具体用于:In a possible implementation manner, the first terminal is specifically configured to:
获取所述用户在所述第一终端中输入的第一授权信息,并获取来自所述第二终端的第二授权信息;所述第一授权信息包括所述用户输入至所述第一终端的认证信息,所述第二授权信息包括所述用户输入至所述第二终端的认证信息;当所述第一授权信息与所述第一终端中预配置的授权信息相匹配,且所述第一授权信息或者所述预配置的授权信息与所述第二授权信息相匹配时,确定所述用户是所述授权用户。Obtain the first authorization information entered by the user in the first terminal, and obtain the second authorization information from the second terminal; the first authorization information includes the information entered by the user in the first terminal Authentication information, the second authorization information includes the authentication information input by the user to the second terminal; when the first authorization information matches the authorization information pre-configured in the first terminal, and the first authorization information When a piece of authorization information or the pre-configured authorization information matches the second authorization information, it is determined that the user is the authorized user.
在一种可能的实现方式中,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;所述第一终端对确认管理所述第一软件的用户进行认证之前,还用于:根据所述管理策略中的所述第三信息确定所述授权用户。In a possible implementation manner, the management policy includes third information, and the third information is used to indicate the authorized user; before the first terminal authenticates the user confirming to manage the first software, It is also used to determine the authorized user according to the third information in the management policy.
在一种可能的实现方式中,所述第一终端接收管理通知消息之前,还用于:获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;或者接收来自所述网络设备的所述管理策略。In a possible implementation, before the first terminal receives the management notification message, it is further used to: obtain the management policy set by the authorized user, and send the management policy to the network device; or receive The management policy from the network device.
在一种可能的实现方式中,所述第二终端具体用于:获取所述用户在所述第二终端中 输入的第二授权信息;所述第二授权信息包括所述用户输入至所述第二终端的认证信息;In a possible implementation manner, the second terminal is specifically configured to: obtain the second authorization information input by the user in the second terminal; the second authorization information includes the user input to the Authentication information of the second terminal;
当所述第一授权信息与所述第二终端中预配置的授权信息相匹配时,确定所述用户是所述授权用户。When the first authorization information matches the authorization information pre-configured in the second terminal, it is determined that the user is the authorized user.
在一种可能的实现方式中,所述第二终端还用于:获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;或者接收来自所述网络设备的所述管理策略。In a possible implementation manner, the second terminal is further configured to: obtain the management policy set by the authorized user, and send the management policy to the network device; or receive information from the network device The management strategy.
在一种可能的实现方式中,所述第一终端为车载终端,所述第二终端为移动终端。In a possible implementation manner, the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
第八方面,本申请提供一种通信装置,所述通信装置包括处理器和存储器,所述存储器用于存储计算机程序或指令;所述处理器用于执行所述存储器所存储的计算机程序或指令,以使所述通信装置执行如第一方面或第三方面或第五方面中所述的相应的方法。In an eighth aspect, the present application provides a communication device. The communication device includes a processor and a memory. The memory is used to store computer programs or instructions; the processor is used to execute the computer programs or instructions stored in the memory. So that the communication device executes the corresponding method as described in the first aspect or the third aspect or the fifth aspect.
第九方面,本申请提供一种通信装置,所述通信装置包括处理器、存储器和收发器,所述收发器,用于接收信号或者发送信号;所述存储器,用于存储计算机程序或指令;所述处理器,用于从所述存储器调用所述计算机程序或指令执行如第一方面或第三方面或第五方面所述的方法。In a ninth aspect, the present application provides a communication device that includes a processor, a memory, and a transceiver. The transceiver is used to receive signals or send signals; and the memory is used to store computer programs or instructions; The processor is configured to call the computer program or instruction from the memory to execute the method according to the first aspect or the third aspect or the fifth aspect.
第十方面,本申请提供一种通信装置,所述通信装置包括处理器和接口电路,所述接口电路,用于接收代码指令并传输至所述处理器;所述处理器运行所述代码指令以执行如第一方面或第三方面或第五方面所述的相应的方法。In a tenth aspect, the present application provides a communication device, the communication device includes a processor and an interface circuit, the interface circuit is configured to receive code instructions and transmit them to the processor; the processor runs the code instructions In order to perform the corresponding method as described in the first aspect or the third aspect or the fifth aspect.
第十一方面,本申请提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序或指令,当计算机读取并执行所述计算机程序或指令时,使得第一方面或第三方面或第五方面所述的方法被实现。In an eleventh aspect, the present application provides a computer-readable storage medium for storing a computer program or instruction. When the computer reads and executes the computer program or instruction, the first aspect or The method described in the third or fifth aspect is implemented.
第十二方面,本申请提供一种包括指令的计算机程序产品,当计算机读取并执行所述计算机程序产品时,使得第一方面或第三方面或第五方面所述的方法被实现。In a twelfth aspect, the present application provides a computer program product including instructions. When the computer reads and executes the computer program product, the method described in the first aspect or the third aspect or the fifth aspect is realized.
第十三方面,本申请提供一种芯片,包括处理器,所述处理器与存储器耦合,用于执行所述存储器中存储的计算机程序或指令,当所述处理器执行所述计算机程序或指令时,使得第一方面或第三方面或第五方面所述的方法被实现。In a thirteenth aspect, the present application provides a chip including a processor, the processor is coupled with a memory, and is configured to execute a computer program or instruction stored in the memory. When the processor executes the computer program or instruction At this time, the method described in the first aspect or the third aspect or the fifth aspect is realized.
第十四方面,本申请提供一种通信装置,所述通信装置包括处理器,当所述处理器执行存储器中的计算机程序或指令时,如第一方面或第三方面或第五方面所述的方法被执行。In a fourteenth aspect, the present application provides a communication device that includes a processor, and when the processor executes a computer program or instruction in a memory, as described in the first or third or fifth aspects The method is executed.
附图说明Description of the drawings
图1为适用于本申请实施例的一种架构示意图;FIG. 1 is a schematic diagram of an architecture applicable to an embodiment of the present application;
图2为本申请实施例提供的一种软件管理方法流程示意图;2 is a schematic flowchart of a software management method provided by an embodiment of the application;
图3为本申请实施例提供的一种管理策略配置意图;Fig. 3 is a management policy configuration intention provided by an embodiment of the application;
图4为本申请实施例提供的一种软件管理方法流程示意图;FIG. 4 is a schematic flowchart of a software management method provided by an embodiment of the application;
图5为本申请实施例提供的一种界面示意图;FIG. 5 is a schematic diagram of an interface provided by an embodiment of the application;
图6为本申请实施例提供的一种界面示意图;FIG. 6 is a schematic diagram of an interface provided by an embodiment of this application;
图7A为本申请实施例提供的一种软件管理界面示意图;FIG. 7A is a schematic diagram of a software management interface provided by an embodiment of this application;
图7B为本申请实施例提供的另一种软件管理界面示意图;FIG. 7B is a schematic diagram of another software management interface provided by an embodiment of the application;
图8为本申请实施例提供的一种软件管理方法流程示意图;FIG. 8 is a schematic flowchart of a software management method provided by an embodiment of the application;
图9为本申请实施例提供的一种软件管理方法流程示意图;FIG. 9 is a schematic flowchart of a software management method provided by an embodiment of this application;
图10为本申请实施例提供的一种通信装置结构示意图;FIG. 10 is a schematic structural diagram of a communication device provided by an embodiment of this application;
图11为本申请实施例提供的一种通信装置结构示意图;FIG. 11 is a schematic structural diagram of a communication device provided by an embodiment of this application;
图12为本申请实施例提供的一种系统结构示意图。FIG. 12 is a schematic diagram of a system structure provided by an embodiment of this application.
具体实施方式Detailed ways
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地描述。In order to make the objectives, technical solutions, and advantages of the embodiments of the present application clearer, the embodiments of the present application will be further described below with reference to the accompanying drawings.
本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度。例如,第一终端和第二终端,只是为了区分不同的终端,而并不是表示这两种终端的优先级或者重要程度等的不同。The ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects. For example, the first terminal and the second terminal are only used to distinguish different terminals, but do not indicate the difference in priority or importance of the two terminals.
目前,车辆中所安装的软件越来越多,因此需要一种方法管理车辆中的软件,保证软件的安装、更新以及卸载等流程都得到了合法用户的合理授权。如图1所示,本申请实施例涉及网络设备、车载终端以及移动终端。其中,移动终端的位置可以并不限定,图1以移动终端位于车载终端外为例进行说明,移动终端也可以位于车载终端内。At present, more and more software are installed in vehicles. Therefore, a method is needed to manage the software in vehicles to ensure that software installation, update, and uninstallation processes are reasonably authorized by legitimate users. As shown in Figure 1, the embodiments of the present application relate to network equipment, vehicle-mounted terminals, and mobile terminals. Wherein, the location of the mobile terminal may not be limited. FIG. 1 takes the mobile terminal located outside the vehicle-mounted terminal as an example for illustration, and the mobile terminal may also be located in the vehicle-mounted terminal.
当需要对车载终端中的软件进行管理操作时,例如安装软件、更新软件或卸载软件,为了确保合法用户对软件的管理操作进行授权,本申请实施例中,可以根据不同情况,在用户指示执行管理操作之前,由车载终端和移动终端联合对用户的身份进行认证,从而保证软件的管理操作得到管控,提高车载终端的安全性。When it is necessary to perform management operations on the software in the vehicle-mounted terminal, such as installing software, updating software, or uninstalling software, in order to ensure that legitimate users authorize software management operations, in the embodiments of the present application, the execution may be performed at the user's instruction according to different situations. Before the management operation, the vehicle-mounted terminal and the mobile terminal jointly authenticate the user's identity, thereby ensuring that the management operation of the software is managed and controlled, and improving the safety of the vehicle-mounted terminal.
需要说明的是,本申请实施例中,车载终端设置于车辆中,可以是车辆的组成部分,例如可以为车辆中所配备的智能设备,在结构上集成于车辆中,属于车辆的一部分。It should be noted that, in the embodiments of the present application, the vehicle-mounted terminal is installed in the vehicle and may be a component of the vehicle, for example, it may be a smart device equipped in the vehicle, which is structurally integrated in the vehicle and belongs to a part of the vehicle.
移动终端,可以是独立于车辆的智能设备,例如是(mobile phone)、平板电脑(Pad)等。The mobile terminal may be a smart device independent of the vehicle, such as a (mobile phone), a tablet computer (Pad), and so on.
本申请实施例中以车载终端为例进行描述,但本申请中适用于车载终端的方法同样可以适用于其它类型的终端,如飞机、无人机、船舶、火车等。In the embodiments of this application, a vehicle-mounted terminal is taken as an example for description, but the method applicable to a vehicle-mounted terminal in this application can also be applied to other types of terminals, such as airplanes, drones, ships, trains, and so on.
另外,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。In addition, the network architecture and business scenarios described in the embodiments of this application are intended to illustrate the technical solutions of the embodiments of this application more clearly, and do not constitute a limitation on the technical solutions provided in the embodiments of this application. Those of ordinary skill in the art will know that With the evolution of the network architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are equally applicable to similar technical problems.
为了便于介绍,在下文中,以该方法由第一终端、第二终端和网络设备之间的交互为例进行描述。因为本实施例是以应用在图1所示的系统架构为例,因此,下文中所描述的网络设备可以是图1所示的网络架构中的网络设备,该网络设备可以为OTA服务器或者车联网(vehicle-to-everything,V2X)服务器,或者也可以是其他的服务器。下文中所描述的第一终端,可以是指图1所示的网络架构中的车载终端。下文中所描述的第二终端,可以是指图1所示的网络架构中的移动终端,在实际应用中,本申请的实施例中的第二终端可以是手机(mobile phone)、平板电脑(Pad)等设备。For ease of introduction, in the following, the method is described by the interaction between the first terminal, the second terminal, and the network device as an example. Because this embodiment is applied to the system architecture shown in FIG. 1 as an example, the network device described below may be a network device in the network architecture shown in FIG. 1, and the network device may be an OTA server or a vehicle. Networking (vehicle-to-everything, V2X) server, or other servers. The first terminal described below may refer to the vehicle-mounted terminal in the network architecture shown in FIG. 1. The second terminal described below may refer to the mobile terminal in the network architecture shown in FIG. 1. In practical applications, the second terminal in the embodiment of the present application may be a mobile phone or a tablet computer ( Pad) and other equipment.
本申请实施例中,第一终端与第二终端之间的通信数据可以通过安全传输通道进行传输。目前任意两个终端不可以建立安全传输通道,只有存在关联关系的两个终端可以建立安全传输通道。为此在建立安全传输通道之前,第一终端与第二终端之间需要建立关联关系,所谓关联关系具体指第一终端和第二终端之间建立安全通信通道。具体如何建立关联关系,可以存在多种实现方式,下面分别进行描述。In the embodiment of the present application, the communication data between the first terminal and the second terminal may be transmitted through a secure transmission channel. At present, any two terminals cannot establish a secure transmission channel, and only two terminals with an association relationship can establish a secure transmission channel. Therefore, before establishing a secure transmission channel, an association relationship needs to be established between the first terminal and the second terminal. The so-called association relationship specifically refers to the establishment of a secure communication channel between the first terminal and the second terminal. There can be multiple implementation methods for how to establish an association relationship, which will be described separately below.
关联方式一:Association method 1:
第二终端向网络设备发送关联请求消息,所述关联请求消息中包括第一终端所属用户 的标识(例如可以为该用户的证件号码等)、第一终端的标识等信息。The second terminal sends an association request message to the network device, and the association request message includes information such as the identity of the user to which the first terminal belongs (for example, the certificate number of the user, etc.), and the identity of the first terminal.
网络设备接收到来自第二终端的关联请求消息,确定其中携带的用户的标识以及第一终端的标识都是合法有效的之后,可以向第二终端发送验证码。After receiving the association request message from the second terminal, the network device determines that the user identification and the identification of the first terminal carried in it are both legal and valid, and can send a verification code to the second terminal.
第二终端接收到网络设备发送的验证码之后,使用第二终端的用户在第一终端中输入验证码。After the second terminal receives the verification code sent by the network device, the user using the second terminal enters the verification code in the first terminal.
当第一终端将用户输入的验证码发送至网络设备,网络设备确定第一终端发送的验证码与网络设备发送至第二终端的验证码相同,则指示第一终端与第二终端建立关联关系,或者指示第二终端与第一终端建立关联关系。When the first terminal sends the verification code entered by the user to the network device, the network device determines that the verification code sent by the first terminal is the same as the verification code sent by the network device to the second terminal, and then instructs the first terminal to establish an association relationship with the second terminal , Or instruct the second terminal to establish an association relationship with the first terminal.
关联方式二:Association method two:
第二终端向网络设备发送关联请求消息,所述关联请求消息中包括第一终端所属用户的标识、第一终端的标识等信息。The second terminal sends an association request message to the network device, where the association request message includes information such as the identity of the user to which the first terminal belongs, and the identity of the first terminal.
网络设备接收到来自第二终端的关联请求消息,确定其中携带的用户的标识以及第一终端的标识都是合法有效的之后,可以向第一终端以及第二终端发送验证码。After receiving the association request message from the second terminal, the network device determines that the user identification and the identification of the first terminal carried in it are legal and valid, and can send a verification code to the first terminal and the second terminal.
第二终端接收到网络设备发送的验证码之后,使用第二终端的用户在第一终端中输入验证码。After the second terminal receives the verification code sent by the network device, the user using the second terminal enters the verification code in the first terminal.
当第一终端确定用户输入的验证码与网络设备发送至第一终端的验证码相同时,第一终端可以与第二终端建立关联关系。When the first terminal determines that the verification code input by the user is the same as the verification code sent by the network device to the first terminal, the first terminal may establish an association relationship with the second terminal.
关联方式三:Association three:
第二终端向网络设备发送关联请求消息,所述关联请求消息中包括第一终端所属用户的标识、第一终端的标识等信息。The second terminal sends an association request message to the network device, where the association request message includes information such as the identity of the user to which the first terminal belongs, and the identity of the first terminal.
网络设备接收到来自第二终端的关联请求消息,确定其中携带的用户的标识以及第一终端的标识都是合法有效的之后,可以向第一终端发送验证码。After receiving the association request message from the second terminal, the network device determines that the user identity and the identity of the first terminal carried in it are both legal and valid, and can send a verification code to the first terminal.
第一终端接收到网络设备发送的验证码之后,可以在显示屏中显示该验证码,并提示用户将该验证码输入至第二终端。After receiving the verification code sent by the network device, the first terminal may display the verification code on the display screen and prompt the user to input the verification code into the second terminal.
使用第二终端的用户将第一终端中显示的验证码输入至第二终端,并通过第二终端将该验证码发送至网络设备。The user using the second terminal inputs the verification code displayed in the first terminal into the second terminal, and sends the verification code to the network device through the second terminal.
网络设备确定第二终端发送的验证码,与网络设备发送至第一终端的验证码相同时,指示第一终端与第二终端建立关联关系,或者指示第二终端与第一终端建立关联关系。When the network device determines that the verification code sent by the second terminal is the same as the verification code sent by the network device to the first terminal, it instructs the first terminal to establish an association relationship with the second terminal, or instructs the second terminal to establish an association relationship with the first terminal.
以上只是示例,第一终端与第二终端之间还可以通过其他方式建立关联关系,在此不再逐一举例说明。The above is just an example, the first terminal and the second terminal may also establish an association relationship in other ways, which will not be illustrated one by one here.
第一终端与第二终端建立关联关系后,可以通过无线或有线等通信方式建立安全传输通道,并通过建立的安全传输通道传输数据。需要说明的是,第一终端与第二终端之间具体如何建立安全传输通道,本申请实施例对此并不限定,在此不再赘述。After the first terminal and the second terminal establish an association relationship, a secure transmission channel can be established through wireless or wired communication, and data can be transmitted through the established secure transmission channel. It should be noted that how to specifically establish a secure transmission channel between the first terminal and the second terminal is not limited in the embodiment of the present application, and will not be repeated here.
结合前面的描述,如图2所示,为本申请实施例提供的一种软件管理方法流程示意图。该方法包括:In combination with the foregoing description, as shown in FIG. 2, it is a schematic flowchart of a software management method provided by an embodiment of this application. The method includes:
步骤201:当确定对第一软件进行管理操作时,根据所述第一软件对应的管理策略确定认证终端。Step 201: When it is determined to perform a management operation on the first software, an authentication terminal is determined according to the management policy corresponding to the first software.
本申请实施例中,所述管理操作包括但不限于更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项。以上只是举例,还可能存在其他管理操作,在此不再赘述。In the embodiment of the present application, the management operation includes but is not limited to any one of updating the first software, installing the first software, and uninstalling the first software. The above are just examples, and there may be other management operations, so I won't repeat them here.
举例来说,当管理操作为更新第一软件时,网络设备获取第一终端中的第一软件的更 新包时,可以确定第一软件需要更新。当然,网络设备还可以通过其他方式确定第一软件需要更新,在此不再赘述。For example, when the management operation is to update the first software, when the network device obtains the update package of the first software in the first terminal, it can determine that the first software needs to be updated. Of course, the network device can also determine that the first software needs to be updated in other ways, which will not be repeated here.
第一软件可以为第一终端中安装的任一软件,例如第一软件可以为地图导航软件,可以为车载中控娱乐软件,还可以为车载通讯模块系统软件等,本申请实施例对第一软件的具体类型并不限定。The first software may be any software installed in the first terminal. For example, the first software may be map navigation software, in-vehicle central control entertainment software, or in-vehicle communication module system software. The specific type of software is not limited.
为避免非法用户对第一终端中的软件越权管理操作,提高第一终端的安全性。为此,本申请实施例中,可以通过认证终端对确认管理操作所述第一软件的用户进行认证,以保证对第一软件进行管理操作的用户为授权用户,下面将详细描述。In order to prevent unauthorized users from unauthorized management operations on the software in the first terminal, the security of the first terminal is improved. For this reason, in the embodiment of the present application, the user who confirms the management operation of the first software may be authenticated through the authentication terminal to ensure that the user who performs the management operation of the first software is an authorized user, which will be described in detail below.
示例性的,认证终端可以包括第一终端和第二终端中的至少一个,所述第二终端与所述第一终端存在关联关系。第二终端与第一终端具体如何建立关联关系,可以参考前面的描述。Exemplarily, the authentication terminal may include at least one of a first terminal and a second terminal, and the second terminal has an association relationship with the first terminal. For details on how to establish an association relationship between the second terminal and the first terminal, reference may be made to the foregoing description.
示例性的,第一软件对应的管理策略可以包括多种信息,例如可以包括以下一项或多项:第一信息,所述第一信息用于指示认证终端;第二信息,所述第二信息用于指示第一软件的授权模式;第三信息,所述第三信息用于指示授权用户。Exemplarily, the management strategy corresponding to the first software may include a variety of information, for example, may include one or more of the following: first information, the first information is used to indicate the authentication terminal; second information, the second information The information is used to indicate the authorization mode of the first software; the third information is used to indicate the authorized user.
其中,授权模式可以包括第一模式和第二模式。所述第一模式为所述第一软件的每一次管理操作都需要通过所述认证终端对所述用户进行认证;所述第二模式为所述第一软件的第一次管理操作需要通过所述认证终端对所述用户进行认证,所述第一软件的第一次管理操作之后的管理操作不需要通过所述认证终端对所述用户进行认证。Among them, the authorization mode may include a first mode and a second mode. The first mode is that each management operation of the first software needs to authenticate the user through the authentication terminal; the second mode is that the first management operation of the first software needs to pass all the operations. The authentication terminal authenticates the user, and the management operation after the first management operation of the first software does not need to authenticate the user through the authentication terminal.
举例来说,第一模式可以适用于对第一终端的安全影响较大的软件,例如第一终端中的操作系统软件等。第二模式可以适用于经常管理操作,但对第一终端的安全影响较小的软件,例如第一终端中的地图导航软件等。For example, the first mode may be applicable to software that has a greater impact on the security of the first terminal, such as operating system software in the first terminal. The second mode may be suitable for software that frequently manages operations but has a small impact on the security of the first terminal, such as map navigation software in the first terminal.
授权用户可以为第一终端的拥有者(owner),也可以为第一终端的拥有者指定的用户。第一终端的拥有者也可以存在其他名称,例如第一终端的所属用户,第一终端的所有者,第一终端的物主等。The authorized user may be the owner of the first terminal, or may be a user designated by the owner of the first terminal. The owner of the first terminal may also have other names, such as the user of the first terminal, the owner of the first terminal, the owner of the first terminal, and so on.
通过管理策略中的第一信息至第三信息,第一终端以及第二终端可以确定认证终端、授权模式以及授权用户等信息。Through the first information to the third information in the management policy, the first terminal and the second terminal can determine information such as the authentication terminal, the authorization mode, and the authorized user.
需要说明的是,第一终端中的不同软件对应的管理策略可以不同,举例来说,第一终端中不同软件的管理策略可以如表1所示。It should be noted that the management policies corresponding to different software in the first terminal may be different. For example, the management policies of different software in the first terminal may be as shown in Table 1.
表1Table 1
Figure PCTCN2020111485-appb-000001
Figure PCTCN2020111485-appb-000001
Figure PCTCN2020111485-appb-000002
Figure PCTCN2020111485-appb-000002
当然,表1只是示例,第一终端中的软件还可能对应其他管理策略,在此不再逐一举例说明。Of course, Table 1 is only an example, and the software in the first terminal may also correspond to other management strategies, which will not be illustrated one by one here.
需要说明的是,管理策略中的认证终端还可以包括其他终端,例如第三终端、第四终端等,授权用户可以根据实际情况配置,当认证终端包括其他终端时,具体执行的内容可以参考第二终端的描述,本申请实施例在此不再赘述。It should be noted that the authentication terminal in the management policy may also include other terminals, such as a third terminal, a fourth terminal, etc., and authorized users can configure according to actual conditions. When the authentication terminal includes other terminals, the specific execution content can be referred to The description of the second terminal will not be repeated here in this embodiment of the application.
需要说明的是,本申请实施例中,第一软件对应的管理策略具体如何配置,可能存在多种实现方式。第一种可能的实现方式中,第一软件对应的管理策略可以为网络设备配置的,网络设备可以将第一软件对应的管理策略发送至第一终端以及第二终端。It should be noted that, in the embodiment of the present application, there may be multiple implementation manners for the specific configuration of the management strategy corresponding to the first software. In the first possible implementation manner, the management policy corresponding to the first software may be configured by the network device, and the network device may send the management policy corresponding to the first software to the first terminal and the second terminal.
第二种可能的实现方式中,第一软件对应的管理策略也可以为授权用户在第一终端中设置的,第一终端可以将授权用户设置的管理策略发送至网络设备以及第二终端。In the second possible implementation manner, the management policy corresponding to the first software may also be set by the authorized user in the first terminal, and the first terminal may send the management policy set by the authorized user to the network device and the second terminal.
举例来说,在该实现方式中,第一终端的显示屏中可以显示管理策略的配置选项,第一终端可以将用户输入的管理策略保存,并发送至网络设备以及第二终端。For example, in this implementation manner, the configuration options of the management policy may be displayed on the display screen of the first terminal, and the first terminal may save the management policy input by the user and send it to the network device and the second terminal.
举例来说,如图3所示,为本申请实施例提供的一种界面示意图。图3中,以第一软件为地图导航软件为例。图3中,显示了管理策略中可以选择的认证终端、可以选择的授权模式,以及可以设置的授权用户等信息,用户可以通过图3所示的界面在第一终端中设置管理策略。For example, as shown in FIG. 3, a schematic diagram of an interface provided by an embodiment of this application. In Figure 3, the first software is the map navigation software as an example. In Fig. 3, the authentication terminal that can be selected in the management strategy, the authorization mode that can be selected, and the authorized user that can be set are displayed. The user can set the management strategy in the first terminal through the interface shown in Fig. 3.
第三种可能的实现方式中,第一软件对应的管理策略也可以为授权用户在第二终端中设置的,第二终端可以将授权用户设置的管理策略发送至网络设备以及第一终端。In a third possible implementation manner, the management policy corresponding to the first software may also be set by the authorized user in the second terminal, and the second terminal may send the management policy set by the authorized user to the network device and the first terminal.
举例来说,在该实现方式中,第二终端的显示屏中可以显示管理策略的配置选项,第二终端可以将用户输入的管理策略保存,并发送至网络设备以及第一终端。第二终端显示的管理策略的配置选项,可以参考图3的示例,在此不再赘述。For example, in this implementation manner, the configuration options of the management policy may be displayed on the display screen of the second terminal, and the second terminal may save the management policy input by the user and send it to the network device and the first terminal. For the configuration options of the management policy displayed by the second terminal, reference may be made to the example in FIG. 3, and details are not described here.
步骤202:网络设备向认证终端发送管理通知消息。Step 202: The network device sends a management notification message to the authentication terminal.
其中,所述管理通知消息用于通知对所述第一软件进行所述管理操作。Wherein, the management notification message is used to notify the management operation of the first software.
需要说明的是,管理通知消息中还可以包括其他信息,例如第一软件的标识,还可以包括认证终端的标识,本申请实施例对此并不限定。It should be noted that the management notification message may also include other information, such as the identification of the first software, and the identification of the authentication terminal, which is not limited in the embodiment of the present application.
步骤203:第一终端接收管理通知消息。Step 203: The first terminal receives the management notification message.
步骤204:第二终端接收管理通知消息。Step 204: The second terminal receives the management notification message.
需要说明的是,步骤203和步骤204的顺序并不限定,以上只是以步骤203先执行为例进行描述。在实际应用中,步骤204也可以先执行,也可以同时执行步骤203和步骤204,在此不再赘述。It should be noted that the order of step 203 and step 204 is not limited, and the above description is only performed by taking step 203 first as an example. In practical applications, step 204 can also be performed first, or step 203 and step 204 can be performed at the same time, which will not be repeated here.
步骤205:第二终端根据所述第一软件对应的管理策略确定认证终端包括所述第二终端时,对确认管理所述第一软件的用户进行认证。Step 205: When the second terminal determines that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who is confirmed to manage the first software.
举例来说,第二终端可以获取所述用户在所述第二终端中输入的第二授权信息;所述第二授权信息包括所述用户输入至所述第二终端的认证信息。当所述第一授权信息与所述第二终端中预配置的授权信息相匹配时,第二终端可以确定所述用户是所述授权用户;当所述第一授权信息与所述第二终端中预配置的授权信息不相匹配时,第二终端可以确定所述用户是所述授权用户。其中,用户在第二终端中输入的认证信息可以是验证密码或者指纹或者人脸图像等,具体根据实际情况确定,本申请实施例对此并不限定。For example, the second terminal may obtain second authorization information input by the user in the second terminal; the second authorization information includes authentication information input by the user to the second terminal. When the first authorization information matches the authorization information pre-configured in the second terminal, the second terminal can determine that the user is the authorized user; when the first authorization information matches the second terminal When the pre-configured authorization information in the data does not match, the second terminal may determine that the user is the authorized user. Wherein, the authentication information input by the user in the second terminal may be a verification password or a fingerprint or a face image, etc., which is specifically determined according to actual conditions, which is not limited in the embodiment of the present application.
当然,以上只是示例,第二终端还可以通过其他方式对用户进行认证,在此不再赘述。Of course, the above is only an example, and the second terminal may also authenticate the user in other ways, which will not be repeated here.
步骤206:当确定所述用户为管理所述第一软件的授权用户时,第二终端向所述第一终端发送所述用户输入的第二确认指示。Step 206: When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal.
其中,所述第二确认指示用于指示所述用户通过所述第二终端确认对所述第一软件执行所述管理通知消息指示的所述管理操作。The second confirmation instruction is used to instruct the user to confirm, through the second terminal, to perform the management operation indicated by the management notification message on the first software.
步骤207:第一终端根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和所述第二终端时,通过所述认证终端对确认管理所述第一软件的用户进行认证。Step 207: When the first terminal determines that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software through the authentication terminal .
本申请实施例中,所述认证终端可以用于对确认管理操作所述第一软件的用户进行认证。所述认证终端为所述第一终端和第二终端中的至少一个。所述第二终端与所述第一终端存在关联关系。第一终端和第二终端具体如何建立关联关系,可以参考前面的描述,在此不再赘述。In the embodiment of the present application, the authentication terminal may be used to authenticate the user who confirms the management operation of the first software. The authentication terminal is at least one of the first terminal and the second terminal. There is an association relationship between the second terminal and the first terminal. For how to establish an association relationship between the first terminal and the second terminal, reference may be made to the foregoing description, and details are not repeated here.
需要说明的是,步骤205和步骤207的顺序并不限定,以上只是以步骤205先执行为例进行描述。在实际应用中,步骤207也可以先执行,也可以同时执行步骤205和步骤207,在此不再赘述。It should be noted that the order of step 205 and step 207 is not limited, and the above description is only performed by taking step 205 first as an example. In practical applications, step 207 can also be performed first, or step 205 and step 207 can be performed at the same time, which will not be repeated here.
步骤208:当第一终端确定所述用户为管理所述第一软件的授权用户,且获取到所述用户输入的第一确认指示,以及接收到来自所述第二终端的第二确认指示时,第一终端根据所述第一确认指示以及所述第二确认指示对所述第一软件执行所述管理操作。Step 208: When the first terminal determines that the user is an authorized user who manages the first software, and obtains the first confirmation instruction input by the user, and receives the second confirmation instruction from the second terminal , The first terminal performs the management operation on the first software according to the first confirmation instruction and the second confirmation instruction.
其中,所述第一确认指示用于指示所述用户通过所述第一终端确认对所述第一软件执行所述管理操作。The first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software through the first terminal.
通过上面的过程可知,在对第一终端中的第一软件进行管理操作之前,通过第一终端和第二终端同时确定用户是否为授权用户,当第一终端和第二终端均确定所述用户是授权用户时,第一终端可以管理第一软件。通过这种方式,可以避免非法用户的越权管理第一终端中的第一软件,实现对第一软件的授权管控,提高第一终端的安全性。From the above process, it can be seen that before the management operation of the first software in the first terminal, the first terminal and the second terminal determine whether the user is an authorized user at the same time. When the first terminal and the second terminal both determine the user When it is an authorized user, the first terminal can manage the first software. In this way, unauthorized users can be prevented from unauthorized management of the first software in the first terminal, the authorization management and control of the first software can be realized, and the security of the first terminal can be improved.
图2所示的流程中,认证终端可以包括第一终端和第二终端中的至少一个,当认证终端不同时,对第一软件的管理操作的流程可能不同,下面分别进行描述。In the process shown in FIG. 2, the authentication terminal may include at least one of the first terminal and the second terminal. When the authentication terminal is different, the management operation process of the first software may be different, which will be described separately below.
实施例一:认证终端包括第一终端和第二终端。Embodiment 1: The authentication terminal includes a first terminal and a second terminal.
当认证终端为第一终端和第二终端时,需要第一终端和第二终端均确定当前管理操作第一软件的用户为授权用户时,对第一软件进行管理操作,具体可以参考图4所示的流程。When the authentication terminals are the first terminal and the second terminal, both the first terminal and the second terminal are required to determine that the user currently managing and operating the first software is an authorized user, and then the first software is managed. For details, refer to Figure 4 The process shown.
步骤401:网络设备根据第一软件对应的管理策略确定认证终端为第一终端和第二终端,并分别向第一终端和第二终端发送管理通知消息。Step 401: The network device determines that the authentication terminal is the first terminal and the second terminal according to the management policy corresponding to the first software, and sends a management notification message to the first terminal and the second terminal respectively.
如前所述,网络设备可以根据管理策略中的第一信息确定认证终端。As mentioned above, the network device can determine the authentication terminal according to the first information in the management policy.
网络设备通过发送管理通知消息,向第一终端和第二终端指示出需要管理操作第一终端中的第一软件,以及需要执行的管理操作。第一终端和第二终端获取到管理通知消息之后,可以根据第一软件对应的管理策略,执行第一软件的管理操作流程,具体可以参考后面的流程。The network device sends a management notification message to indicate to the first terminal and the second terminal that the first software in the first terminal needs to be managed and operated, and the management operation needs to be performed. After the first terminal and the second terminal obtain the management notification message, they can execute the management operation process of the first software according to the management policy corresponding to the first software. For details, refer to the following process.
需要说明的是,第一终端和第二终端是在接收到网络设备的管理通知消息时,确定需要管理操作第一软件的,管理通知消息相当于第一软件进行管理操作的触发消息。It should be noted that the first terminal and the second terminal determine that the first software needs to be managed and operated when receiving the management notification message of the network device, and the management notification message is equivalent to a trigger message for the first software to perform the management operation.
以下以管理操作为更新第一软件或者安装第一软件为例进行描述。当管理操作为更新第一软件或者安装第一软件时,可以包括步骤402以及步骤403。The following describes the management operation as an example of updating the first software or installing the first software. When the management operation is to update the first software or install the first software, step 402 and step 403 may be included.
步骤402:第一终端向网络设备发送第一请求消息。Step 402: The first terminal sends a first request message to the network device.
第一请求消息可以用于请求第一软件的安装包或更新包。The first request message may be used to request an installation package or an update package of the first software.
所述第一请求消息中可以包括第一终端的标识,第一软件的标识等信息。The first request message may include the identification of the first terminal, the identification of the first software, and other information.
步骤403:网络设备向第一终端发送第一响应消息。Step 403: The network device sends a first response message to the first terminal.
一种可能的实现方式中,所述第一响应消息包括第一软件的安装包或更新包。在该方式中,第一终端可以通过第一响应消息直接获取安装更新包或更新包。In a possible implementation manner, the first response message includes an installation package or an update package of the first software. In this manner, the first terminal can directly obtain the installation update package or the update package through the first response message.
另一种可能的实现方式中,所述第一响应消息包括第一软件的安装更新包或更新包的下载地址,第一终端可以通过所述下载地址获取安装更新包或更新包。In another possible implementation manner, the first response message includes the installation update package or the download address of the update package of the first software, and the first terminal may obtain the installation update package or the update package through the download address.
下载地址的具体实现方式并不限定,例如下载地址可以采用统一资源定位系统(uniform resource locator,URL)实现。举例来说,第一响应消息中可以包括统一资源定位系统(uniform resource locator,URL),所述URL指示出安装更新包或更新包的下载地址。第一终端可以通过所述URL下载第一软件的安装更新包或更新包。The specific implementation manner of the download address is not limited. For example, the download address may be implemented using a uniform resource locator (URL). For example, the first response message may include a uniform resource locator (uniform resource locator, URL), and the URL indicates an installation update package or a download address of the update package. The first terminal can download the installation update package or update package of the first software through the URL.
步骤404:第一终端接收第一响应消息,并获取第一软件的安装包或更新包。Step 404: The first terminal receives the first response message, and obtains the installation package or the update package of the first software.
步骤405:第一终端根据第一软件对应的管理策略中的第二信息确定第一软件的授权模式。Step 405: The first terminal determines the authorization mode of the first software according to the second information in the management policy corresponding to the first software.
第一终端可以根据所述授权模式确定是否需要通过所述认证终端对所述用户进行认证。具体的,一种可能的实现方式中,当确定所述第一软件的授权模式为第一模式时,所述第一终端确定需要通过所述认证终端对所述用户进行认证,此时第一终端可以执行步骤406至步骤411。The first terminal may determine whether the user needs to be authenticated by the authentication terminal according to the authorization mode. Specifically, in a possible implementation manner, when it is determined that the authorization mode of the first software is the first mode, the first terminal determines that the user needs to be authenticated through the authentication terminal, and then the first The terminal can perform step 406 to step 411.
一种可能的实现方式中,当确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,所述第一终端确定需要通过所述认证终端对所述用户进行认证,此时第一终端可以执行步骤406至步骤411。In a possible implementation, when it is determined that the authorization mode of the first software is the second mode, and the first software is the first management operation, the first terminal determines that it needs to pass the authentication terminal pair The user is authenticated, and the first terminal can execute step 406 to step 411 at this time.
一种可能的实现方式中,当确定所述第一软件的授权模式为第二模式时,且所述第一软件为第N次管理操作时,N为大于1的整数,所述第一终端确定不需要通过所述认证终端对所述用户进行认证,此时第一终端可以不执行步骤406,直接执行步骤411。In a possible implementation, when it is determined that the authorization mode of the first software is the second mode and the first software is the Nth management operation, N is an integer greater than 1, and the first terminal It is determined that the user does not need to be authenticated by the authentication terminal. In this case, the first terminal may not perform step 406 and directly perform step 411.
可选的,当第一终端获取到第一软件的安装更新包或更新包之后,如果长时间没有接收到第二终端的第二授权信息,则可以发送消息提醒第二终端,具体可以参考步骤406。当然,第一终端也可以在其它情况下执行步骤406,本申请实施例对此并不限定。需要说明的是,步骤406也可以不执行。步骤406不执行时,第二终端可以在步骤403中接收到管理通知消息之后执行步骤408。Optionally, after the first terminal obtains the installation update package or update package of the first software, if it has not received the second authorization information of the second terminal for a long time, a message may be sent to remind the second terminal. For details, please refer to the steps 406. Of course, the first terminal may also execute step 406 in other situations, which is not limited in the embodiment of the present application. It should be noted that step 406 may not be executed. When step 406 is not performed, the second terminal may perform step 408 after receiving the management notification message in step 403.
步骤406:第一终端根据第一软件对应的管理策略确定认证终端包括第一终端和第二终端时,第一终端向第二终端发送认证请求消息,用于请求第二终端对用户进行认证。Step 406: When the first terminal determines that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, the first terminal sends an authentication request message to the second terminal for requesting the second terminal to authenticate the user.
需要说明的是,第一终端可以与第二终端之间可以通过近场通信(Near Field Communication,NFC)或蓝牙或无线保真(Wireless Fidelity,WiFi)或有线方式建立安全传输通道,第一终端与第二终端之间的信息通过该安全传输通道传输。It should be noted that a secure transmission channel can be established between the first terminal and the second terminal through Near Field Communication (NFC), Bluetooth, Wireless Fidelity (WiFi), or wired mode, and the first terminal The information with the second terminal is transmitted through the secure transmission channel.
步骤407:第一终端获取来自用户的第一授权信息。Step 407: The first terminal obtains the first authorization information from the user.
其中,第一授权信息包括所述用户输入至所述第一终端的认证信息,例如用户在第一终端中输入的认证信息可以是验证密码或者指纹或者人脸图像等,具体根据实际情况确定。The first authorization information includes the authentication information input by the user to the first terminal. For example, the authentication information input by the user in the first terminal may be a verification password or a fingerprint or a face image, etc., which is specifically determined according to actual conditions.
举例来说,第一终端可以显示图5所示的界面,以提示用户输入认证信息。图5中以提示用户输入验证密码为例。在实际应用中,还可以显示多个选项让用户选择,例如,图5中,在输入验证密码的下方,用户还可以切换至输入指纹或者人脸图像。For example, the first terminal may display the interface shown in FIG. 5 to prompt the user to input authentication information. In Figure 5, the user is prompted to enter the verification password as an example. In practical applications, multiple options can also be displayed for the user to choose. For example, in Figure 5, under the input verification password, the user can also switch to input fingerprints or face images.
步骤408:第二终端获取来自用户的第二授权信息,以及获取用户在所述第二终端中 输入的第二确认指示。Step 408: The second terminal obtains the second authorization information from the user, and obtains the second confirmation instruction input by the user in the second terminal.
其中,第二授权信息包括用户输入至所述第二终端的认证信息。所述第二确认指示用于指示所述用户确认对所述第一软件进行管理操作。Wherein, the second authorization information includes authentication information input by the user to the second terminal. The second confirmation instruction is used to instruct the user to confirm the management operation of the first software.
用户在第二终端中输入的认证信息可以是验证密码或者指纹或者人脸图像等,具体根据实际情况确定。和步骤407类似,第二终端中可以显示如图6所示的界面,用户可以根据界面中的提示信息输入认证信息。The authentication information input by the user in the second terminal may be a verification password or a fingerprint or a face image, etc., which is specifically determined according to actual conditions. Similar to step 407, an interface as shown in FIG. 6 can be displayed in the second terminal, and the user can input authentication information according to the prompt information in the interface.
举例来说,假设管理操作为更新第一软件,第二终端可以在显示屏中显示如图7A所示的界面,图7A中显示了软件更新的注意事项、预计更新耗时等信息,以供用户决定是否马上更新第一软件。当用户点击图7A中的“确认”时,触发第二确认指示,第二终端从而获取到用户的第二确认指示。当用户点击图7A中的“取消”时,触发取消更新指示,表示不更新第一软件。For example, assuming that the management operation is to update the first software, the second terminal can display the interface shown in Figure 7A on the display screen. Figure 7A shows the precautions for the software update, the estimated update time and other information for information The user decides whether to update the first software immediately. When the user clicks "Confirm" in FIG. 7A, the second confirmation instruction is triggered, and the second terminal obtains the user's second confirmation instruction. When the user clicks "Cancel" in FIG. 7A, an update cancel instruction is triggered, indicating that the first software is not updated.
当然,以上只是示例,第二终端还可以通过其他方式获取第二确认指示,在此不再赘述。Of course, the above is only an example, and the second terminal may also obtain the second confirmation instruction in other ways, which will not be repeated here.
需要说明的是,当用户点击图7A中的“取消”时,第二终端获取到取消更新指示,此时第二终端向第一终端发送取消更新指示。当第一终端确定接收到取消更新指示时,可以不再执行第一软件的更新操作。It should be noted that when the user clicks "Cancel" in FIG. 7A, the second terminal obtains the update cancellation instruction, and at this time, the second terminal sends the update cancellation instruction to the first terminal. When the first terminal determines that the update cancellation instruction is received, the update operation of the first software may no longer be performed.
需要说明的是,步骤407和步骤408的顺序并不限定,以上只是以步骤407先执行为例进行描述。在实际应用中,步骤408也可以先执行,也可以同时执行步骤407和步骤408,在此不再赘述。It should be noted that the order of step 407 and step 408 is not limited, and the above description is only performed by taking step 407 first as an example. In practical applications, step 408 can also be performed first, or step 407 and step 408 can be performed at the same time, which will not be repeated here.
步骤409:第二终端向第一终端发送第二确认指示以及第二授权信息。Step 409: The second terminal sends a second confirmation instruction and second authorization information to the first terminal.
当第二终端向第一终端发送第二授权信息时,第一终端可以对第二授权信息进行验证,从而根据第二授权信息确定所述用户是否为授权用户。When the second terminal sends the second authorization information to the first terminal, the first terminal may verify the second authorization information, thereby determining whether the user is an authorized user according to the second authorization information.
当然,步骤409中,第二终端也可以只向第一终端发送第二确认指示,在该情况下,第二终端可以对第二授权信息进行验证,从而根据第二授权信息确定所述用户是否为授权用户。在图4的流程中,以第二终端发送第二授权信息为例进行描述。Of course, in step 409, the second terminal may also only send a second confirmation instruction to the first terminal. In this case, the second terminal may verify the second authorization information to determine whether the user is Is an authorized user. In the process of FIG. 4, the second terminal sends the second authorization information as an example for description.
第一终端获取来自第二终端的第二授权信息之后,可以根据第一授权信息以及第二授权信息确定当前执行软件管理操作的用户是否为授权用户,具体可以参考步骤410。After the first terminal obtains the second authorization information from the second terminal, it can determine whether the user currently performing the software management operation is an authorized user according to the first authorization information and the second authorization information. For details, refer to step 410.
步骤410:当第一授权信息与第一终端中预配置的授权信息相匹配,且所述第一授权信息或者所述预配置的授权信息与所述第二授权信息相匹配时,所述第一终端确定所述用户是所述授权用户。Step 410: When the first authorization information matches the authorization information pre-configured in the first terminal, and the first authorization information or the pre-configured authorization information matches the second authorization information, the first authorization information A terminal determines that the user is the authorized user.
本申请实施例中,当所述第一授权信息与所述第一终端中预配置的授权信息不匹配,或者所述第一授权信息与所述第二授权信息不匹配,或者所述预配置的授权信息与所述第二授权信息不匹配时,所述第一终端确定所述用户不是所述授权用户。第一终端确定所述用户不是所述授权用户时,可以不进行软件管理操作。In the embodiment of the present application, when the first authorization information does not match the authorization information pre-configured in the first terminal, or the first authorization information does not match the second authorization information, or the pre-configured When the authorization information of does not match the second authorization information, the first terminal determines that the user is not the authorized user. When the first terminal determines that the user is not the authorized user, the software management operation may not be performed.
或者,当第一终端确定第二授权信息中包括取消管理操作指示时,可以不再执行第一软件的管理操作。Alternatively, when the first terminal determines that the second authorization information includes an instruction to cancel the management operation, the management operation of the first software may no longer be performed.
举例来说,预配置的授权信息包括预配置的验证密码,第一授权信息包括用户输入的验证密码,第二授权信息包括用户输入的验证密码。当第一终端确定用户在第一终端中输入的验证密码与预配置的验证密码相同,且在第二终端中输入的验证密码与预配置的验证密码相同时,第一终端可以确定所述用户为授权用户,否则可以确定所述用户不是授权用 户。For example, the pre-configured authorization information includes a pre-configured verification password, the first authorization information includes a verification password entered by the user, and the second authorization information includes a verification password entered by the user. When the first terminal determines that the verification password entered by the user in the first terminal is the same as the pre-configured verification password, and the verification password entered in the second terminal is the same as the pre-configured verification password, the first terminal can determine the user Is an authorized user, otherwise it can be determined that the user is not an authorized user.
举例来说,预配置的授权信息包括预配置的验证密码和预配置的指纹信息,第一授权信息包括用户输入的验证密码,第二授权信息包括用户输入的指纹信息。当第一终端确定用户输入的验证密码与预配置的验证密码相同,且用户输入的指纹信息与预配置的指纹信息相同时,第一终端可以确定所述用户为授权用户,否则可以确定所述用户不是授权用户。For example, the pre-configured authorization information includes a pre-configured authentication password and pre-configured fingerprint information, the first authorization information includes the authentication password entered by the user, and the second authorization information includes the fingerprint information entered by the user. When the first terminal determines that the verification password entered by the user is the same as the pre-configured verification password, and the fingerprint information entered by the user is the same as the pre-configured fingerprint information, the first terminal may determine that the user is an authorized user, otherwise it may determine that the user is an authorized user. The user is not an authorized user.
需要说明的是,第一终端可以根据管理策略中的第三信息确定所述授权用户,具体过程不再赘述。It should be noted that the first terminal may determine the authorized user according to the third information in the management policy, and the specific process will not be repeated.
第一终端对第一软件进行管理操作之前,还可以获取用户在第一终端中输入的第一确认指示,具体参考以下步骤411。Before the first terminal performs the management operation on the first software, the first confirmation instruction input by the user in the first terminal may also be obtained. For details, refer to the following step 411.
步骤411:第一终端获取用户的第一确认指示。Step 411: The first terminal obtains the user's first confirmation instruction.
所述第一确认指示用于指示所述用户确认对所述第一软件进行管理操作。The first confirmation instruction is used to instruct the user to confirm the management operation of the first software.
举例来说,假设管理操作为更新第一软件,第一终端可以在显示屏中显示如图7B所示的界面,图7B中显示了软件更新的注意事项、预计更新耗时等信息,以供用户决定是否马上更新第一软件。当用户点击图7B中的“确认”时,触发第一确认指示,第一终端从而获取到用户的第一确认指示。当用户点击图7B中的“取消”时,触发取消更新指示,表示不更新第一软件,第一终端不会安装第一软件的更新包。For example, assuming that the management operation is to update the first software, the first terminal may display an interface as shown in FIG. 7B on the display screen. The user decides whether to update the first software immediately. When the user clicks "Confirm" in FIG. 7B, the first confirmation instruction is triggered, and the first terminal obtains the user's first confirmation instruction. When the user clicks "Cancel" in FIG. 7B, an update cancel instruction is triggered, which means that the first software is not updated and the first terminal will not install the update package of the first software.
当然,以上只是示例,第一终端还可以通过其他方式获取第一确认指示,在此不再赘述。Of course, the above is only an example, and the first terminal may also obtain the first confirmation instruction in other ways, which will not be repeated here.
需要说明的是,上面的过程中,步骤411也可以位于步骤403与步骤410之间的任一步骤执行,例如位于步骤403与步骤404之间执行,步骤411也可以与步骤403同时执行,本申请实施例对步骤411的具体执行顺序并不限定。It should be noted that in the above process, step 411 can also be executed between steps 403 and 410, for example, between step 403 and step 404, and step 411 can also be executed simultaneously with step 403. The application embodiment does not limit the specific execution order of step 411.
步骤412:第一终端根据所述用户的第一确认指示和第二确认指示对所述第一软件执行所述管理操作。Step 412: The first terminal performs the management operation on the first software according to the first confirmation instruction and the second confirmation instruction of the user.
当认证终端为第一终端和第二终端时,第一终端获取到用户在第一终端中输入的第一确认指示和用户在第二终端中输入的第二确认指示的情况下,可以确定执行第一软件的管理操作。举例来说,第一终端可以安装步骤404获取到的第一软件的安装包或更新包,具体安装过程不再赘述。When the authentication terminals are the first terminal and the second terminal, and the first terminal obtains the first confirmation instruction input by the user in the first terminal and the second confirmation instruction input by the user in the second terminal, it can be determined to execute The management operation of the first software. For example, the first terminal may install the installation package or update package of the first software obtained in step 404, and the specific installation process will not be repeated.
通过上面的过程可知,第一终端中的第一软件在管理操作之前,需要第一终端和第二终端确定操作管理操作第一软件的用户是否为授权用户。当第一终端和第二终端均确定所述用户是授权用户时,第一终端可以管理操作第一软件。通过这种方式,实现对用户的双重认证,可以保证第一软件的管理操作是由授权用户进行授权的,实现对第一软件的管理操作授权管控,提高第一终端的安全性。From the above process, it can be known that before the first software in the first terminal is managed and operated, the first terminal and the second terminal are required to determine whether the user who operates the first software is an authorized user. When both the first terminal and the second terminal determine that the user is an authorized user, the first terminal can manage and operate the first software. In this way, double authentication of the user is realized, it can be ensured that the management operation of the first software is authorized by the authorized user, the authorization control of the management operation of the first software is realized, and the security of the first terminal is improved.
图4所示的流程中,步骤409至步骤410还可以采用以下步骤替换,在以下步骤中,第二终端并不是转发第二授权信息,而是根据第二授权信息确定用户是否为授权用户。In the process shown in FIG. 4, steps 409 to 410 can also be replaced by the following steps. In the following steps, the second terminal does not forward the second authorization information, but determines whether the user is an authorized user based on the second authorization information.
步骤409a:第二终端向第一终端发送第二确认指示。Step 409a: The second terminal sends a second confirmation instruction to the first terminal.
步骤409a中,第二终端是在根据第二授权信息确定与所述第二终端中预配置的授权信息相匹配的情况下,向第一终端发送第二确认指示。In step 409a, the second terminal sends a second confirmation instruction to the first terminal when it is determined that it matches the authorization information pre-configured in the second terminal according to the second authorization information.
相应的,当确定所述第二授权信息与所述第二终端中预配置的授权信息不匹配时,第二终端确定用户不是授权用户,可以向第一终端发送暂停管理操作消息;所述暂停管理操作消息用于指示所述用户不是所述授权用户。Correspondingly, when it is determined that the second authorization information does not match the authorization information pre-configured in the second terminal, the second terminal determines that the user is not an authorized user, and may send a suspension management operation message to the first terminal; the suspension The management operation message is used to indicate that the user is not the authorized user.
或者,当第二终端获取到用户输入的取消管理操作指示时,可以确定不对第一软件进行管理操作,从而可以向第一终端发送取消管理操作消息,所述取消管理操作消息用于指示所述用户取消执行所述管理操作。Alternatively, when the second terminal obtains the management cancellation instruction input by the user, it may determine not to perform management operations on the first software, so that a management cancellation message can be sent to the first terminal, where the management cancellation message is used to instruct the The user cancels the execution of the management operation.
相应的,步骤410可以采用以下步骤替换:Correspondingly, step 410 can be replaced by the following steps:
步骤410a:当第一授权信息与第一终端中预配置的授权信息相匹配,且接收到来自所述第二终端的第二确认指示时,所述第一终端确定所述用户是所述授权用户。Step 410a: When the first authorization information matches the authorization information pre-configured in the first terminal, and a second confirmation instruction from the second terminal is received, the first terminal determines that the user is the authorized user.
相应的,当第一终端确定第一授权信息与第一终端中预配置的授权信息不匹配,或者第一终端接收到来自第一终端的暂停管理操作消息时,第一终端确定所述用户不是所述授权用户,从而可以不再执行所述管理操作。Correspondingly, when the first terminal determines that the first authorization information does not match the authorization information pre-configured in the first terminal, or the first terminal receives a suspension management operation message from the first terminal, the first terminal determines that the user is not The authorized user can no longer perform the management operation.
图4所示的流程中,认证终端包括第一终端和第二终端,在实际应用过程中,认证终端也可以为第一终端或第二终端,下面将以认证终端为第一终端进行描述。In the process shown in FIG. 4, the authentication terminal includes a first terminal and a second terminal. In an actual application process, the authentication terminal may also be the first terminal or the second terminal. The following will describe the authentication terminal as the first terminal.
实施例二:认证终端为第一终端。Embodiment 2: The authentication terminal is the first terminal.
当认证终端为第一终端时,需要第一终端确定当前操作管理操作第一软件的用户是否为授权用户,具体可以参考图8所示的流程。When the authentication terminal is the first terminal, the first terminal is required to determine whether the user currently operating, managing, and operating the first software is an authorized user. For details, refer to the flow shown in FIG. 8.
步骤801:网络设备根据第一软件对应的管理策略确定认证终端为第一终端,向第一终端发送管理通知消息。Step 801: The network device determines that the authentication terminal is the first terminal according to the management policy corresponding to the first software, and sends a management notification message to the first terminal.
步骤802:第一终端向网络设备发送第一请求消息,用于请求第一软件的安装包或更新包。Step 802: The first terminal sends a first request message to the network device for requesting an installation package or an update package of the first software.
所述第一请求消息中可以包括第一终端的标识,第一软件的标识等信息。The first request message may include the identification of the first terminal, the identification of the first software, and other information.
以下以管理操作为更新第一软件或者安装第一软件为例进行描述。当管理操作为更新第一软件或者安装第一软件时,可以包括步骤802以及步骤803。The following describes the management operation as an example of updating the first software or installing the first software. When the management operation is to update the first software or install the first software, step 802 and step 803 may be included.
步骤803:网络设备向第一终端发送第一响应消息。Step 803: The network device sends a first response message to the first terminal.
步骤804:第一终端接收第一响应消息,并获取第一软件的安装包或更新包。Step 804: The first terminal receives the first response message, and obtains the installation package or the update package of the first software.
步骤801至步骤804可以参考步骤401至步骤404中的描述,在此不再赘述。For step 801 to step 804, reference may be made to the description in step 401 to step 404, which will not be repeated here.
步骤805:第一终端根据第一软件对应的管理策略中的第二信息确定第一软件的授权模式。Step 805: The first terminal determines the authorization mode of the first software according to the second information in the management policy corresponding to the first software.
第一终端可以根据所述授权模式确定是否需要通过所述认证终端对所述用户进行认证。具体的,一种可能的实现方式中,当确定所述第一软件的授权模式为第一模式时,所述第一终端确定需要通过所述认证终端对所述用户进行认证,此时第一终端可以执行步骤806。The first terminal may determine whether the user needs to be authenticated by the authentication terminal according to the authorization mode. Specifically, in a possible implementation manner, when it is determined that the authorization mode of the first software is the first mode, the first terminal determines that the user needs to be authenticated through the authentication terminal, and then the first The terminal may perform step 806.
一种可能的实现方式中,当确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,所述第一终端确定需要通过所述认证终端对所述用户进行认证,此时第一终端可以执行步骤806。In a possible implementation, when it is determined that the authorization mode of the first software is the second mode, and the first software is the first management operation, the first terminal determines that it needs to pass the authentication terminal pair The user is authenticated, and the first terminal may execute step 806 at this time.
一种可能的实现方式中,当确定所述第一软件的授权模式为第二模式时,且所述第一软件为第N次管理操作时,N为大于1的整数,所述第一终端确定不需要通过所述认证终端对所述用户进行认证,此时第一终端可以不执行步骤806,直接执行步骤809。In a possible implementation manner, when it is determined that the authorization mode of the first software is the second mode and the first software is the Nth management operation, N is an integer greater than 1, and the first terminal It is determined that the user does not need to be authenticated by the authentication terminal. In this case, the first terminal may not perform step 806 and directly perform step 809.
步骤806:第一终端根据第一软件对应的管理策略确定认证终端为第一终端时,第一终端获取来自用户的第一授权信息。Step 806: When the first terminal determines that the authentication terminal is the first terminal according to the management policy corresponding to the first software, the first terminal obtains the first authorization information from the user.
步骤807:当第一授权信息与第一终端中预配置的授权信息相匹配时,所述第一终端确定所述用户是所述授权用户。Step 807: When the first authorization information matches the authorization information pre-configured in the first terminal, the first terminal determines that the user is the authorized user.
举例来说,预配置的授权信息包括预配置的验证密码,第一授权信息包括用户输入的验证密码。当第一终端确定用户在第一终端中输入的验证密码与预配置的验证密码相同时,第一终端可以确定所述用户为授权用户。For example, the pre-configured authorization information includes a pre-configured verification password, and the first authorization information includes a verification password entered by the user. When the first terminal determines that the authentication password entered by the user in the first terminal is the same as the pre-configured authentication password, the first terminal may determine that the user is an authorized user.
本申请实施例中,当所述第一授权信息与所述第一终端中预配置的授权信息不匹配时,所述第一终端确定所述用户不是所述授权用户。第一终端确定所述用户不是所述授权用户时,可以不执行所述管理操作。In the embodiment of the present application, when the first authorization information does not match the authorization information pre-configured in the first terminal, the first terminal determines that the user is not the authorized user. When the first terminal determines that the user is not the authorized user, the management operation may not be performed.
第一终端对第一软件进行管理操作之前,还可以获取用户的第一确认指示,具体参考以下步骤808。Before the first terminal performs the management operation on the first software, it may also obtain the user's first confirmation instruction. For details, refer to the following step 808.
步骤808:第一终端获取用户的第一确认指示。Step 808: The first terminal obtains the user's first confirmation instruction.
第一终端具体如何获取第一确认指示,可以参考步骤411中的描述,在此不再赘述。For specifically how the first terminal obtains the first confirmation instruction, reference may be made to the description in step 411, which will not be repeated here.
步骤809:第一终端根据所述用户的第一确认指示对所述第一软件执行所述管理操作。Step 809: The first terminal performs the management operation on the first software according to the first confirmation instruction of the user.
例如,可以根据步骤804获取到的安装包进行安装第一软件,或者根据步骤804获取到的更新包对第一软件进行更新。For example, the first software may be installed according to the installation package obtained in step 804, or the first software may be updated according to the update package obtained in step 804.
步骤808至步骤809可以参考图4所示的流程中相应步骤中的描述,在此不再赘述。For steps 808 to 809, reference may be made to the descriptions of the corresponding steps in the flow shown in FIG. 4, which will not be repeated here.
需要说明的是,上面的过程中,步骤808也可以位于步骤803与步骤807之间的任一步骤执行,例如位于步骤803与步骤804之间执行,本申请实施例对步骤808的具体执行顺序并不限定。It should be noted that, in the above process, step 808 can also be executed between step 803 and step 807, for example, between step 803 and step 804. The specific execution order of step 808 in the embodiment of this application is Not limited.
通过上面的过程可知,第一终端中的第一软件在管理操作之前,需要第一终端确定执行管理操作第一软件的用户是否为授权用户。通过这种方式,实现对第一软件的管理操作的授权管控,提高第一终端的安全性。From the above process, it can be known that before the management operation of the first software in the first terminal, the first terminal is required to determine whether the user performing the management operation of the first software is an authorized user. In this way, the authorization control of the management operation of the first software is realized, and the security of the first terminal is improved.
下面将以认证终端为第二终端进行描述。The following will describe the authentication terminal as the second terminal.
实施例三:认证终端为第二终端。Embodiment 3: The authentication terminal is the second terminal.
当认证终端为第二终端时,需要第二终端确定当前执行管理操作第一软件的用户是否为授权用户,具体可以参考图9所示的流程。When the authentication terminal is the second terminal, the second terminal is required to determine whether the user currently executing the management operation of the first software is an authorized user. For details, refer to the flow shown in FIG. 9.
步骤901:网络设备根据第一软件对应的管理策略确定认证终端为第二终端,并分别向第一终端和第二终端发送管理通知消息。Step 901: The network device determines that the authentication terminal is the second terminal according to the management policy corresponding to the first software, and sends a management notification message to the first terminal and the second terminal respectively.
如前所述,网络设备可以根据管理策略中的第一信息确定认证终端。As mentioned above, the network device can determine the authentication terminal according to the first information in the management policy.
以下以管理操作为更新第一软件或者安装第一软件为例进行描述。当管理操作为更新第一软件或者安装第一软件时,可以包括步骤902以及步骤903。The following describes the management operation as an example of updating the first software or installing the first software. When the management operation is to update the first software or install the first software, step 902 and step 903 may be included.
步骤902:第一终端向网络设备发送第一请求消息,用于请求第一软件的安装包或更新包。Step 902: The first terminal sends a first request message to the network device for requesting an installation package or an update package of the first software.
步骤903:网络设备向第一终端发送第一响应消息。Step 903: The network device sends a first response message to the first terminal.
步骤904:第一终端接收第一响应消息,并获取第一软件的安装包或更新包。Step 904: The first terminal receives the first response message, and obtains the installation package or the update package of the first software.
步骤901至步骤904可以参考图4所示的流程中相应步骤中的描述,在此不再赘述。For steps 901 to 904, reference may be made to the descriptions in the corresponding steps in the flow shown in FIG. 4, which will not be repeated here.
步骤905:第一终端根据第一软件对应的管理策略中的第二信息确定第一软件的授权模式。Step 905: The first terminal determines the authorization mode of the first software according to the second information in the management policy corresponding to the first software.
第一终端可以根据所述授权模式确定是否需要通过所述认证终端对所述用户进行认证。具体的,一种可能的实现方式中,当确定所述第一软件的授权模式为第一模式时,所述第一终端确定需要通过所述认证终端对所述用户进行认证,此时第一终端可以执行步骤906。The first terminal may determine whether the user needs to be authenticated by the authentication terminal according to the authorization mode. Specifically, in a possible implementation manner, when it is determined that the authorization mode of the first software is the first mode, the first terminal determines that the user needs to be authenticated by the authentication terminal, and then the first The terminal may perform step 906.
一种可能的实现方式中,当确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,所述第一终端确定需要通过所述认证终端对所述用户进行认证,此时第一终端可以执行步骤906。In a possible implementation, when it is determined that the authorization mode of the first software is the second mode, and the first software is the first management operation, the first terminal determines that it needs to pass the authentication terminal pair The user is authenticated, and the first terminal can execute step 906 at this time.
一种可能的实现方式中,当确定所述第一软件的授权模式为第二模式时,且所述第一软件为第N次管理操作时,N为大于1的整数,所述第一终端确定不需要通过所述认证终端对所述用户进行认证,此时第一终端可以不执行步骤906,直接执行步骤910。In a possible implementation manner, when it is determined that the authorization mode of the first software is the second mode and the first software is the Nth management operation, N is an integer greater than 1, and the first terminal It is determined that the user does not need to be authenticated by the authentication terminal. In this case, the first terminal may not perform step 906 and directly perform step 910.
可选的,当第一终端获取到第一软件的安装包或更新包之后,如果长时间没有接收到第二终端的第二授权信息,则可以发送消息提醒第二终端,具体可以参考步骤906。当然,第一终端也可以在其它情况下执行步骤906,本申请实施例对此并不限定。需要说明的是,步骤906不执行时,第二终端可以在步骤903中接收到管理通知消息之后执行步骤907。Optionally, after the first terminal obtains the installation package or update package of the first software, if it has not received the second authorization information of the second terminal for a long time, a message may be sent to remind the second terminal. For details, refer to step 906 . Of course, the first terminal may also perform step 906 in other situations, which is not limited in the embodiment of the present application. It should be noted that when step 906 is not performed, the second terminal may perform step 907 after receiving the management notification message in step 903.
可选的,步骤906:第一终端根据第一软件对应的管理策略确定认证终端为第二终端时,第一终端向第二终端发送认证请求消息,用于请求第二终端对用户进行认证。Optionally, step 906: when the first terminal determines that the authentication terminal is the second terminal according to the management policy corresponding to the first software, the first terminal sends an authentication request message to the second terminal for requesting the second terminal to authenticate the user.
步骤907:第二终端获取来自用户的第二授权信息。Step 907: The second terminal obtains the second authorization information from the user.
其中,第二授权信息可以包括用户输入的验证密码或者指纹或者人脸图像等。Wherein, the second authorization information may include a verification password or fingerprint or face image input by the user.
其中,第二终端确定所述第二授权信息与所述第二终端中预配置的授权信息相匹配时,第二终端确定所述用户是授权用户;相应的,当确定所述第二授权信息与所述第二终端中预配置的授权信息不匹配时,第二终端确定用户不是授权用户。Wherein, when the second terminal determines that the second authorization information matches the authorization information pre-configured in the second terminal, the second terminal determines that the user is an authorized user; correspondingly, when the second authorization information is determined When it does not match the authorization information pre-configured in the second terminal, the second terminal determines that the user is not an authorized user.
举例来说,预配置的授权信息包括预配置的验证密码,第二授权信息包括用户输入至所述第二终端的验证密码。当第一终端确定用户在第一终端中输入的验证密码与预配置的验证密码相同时,第一终端可以确定所述用户为授权用户,否则可以确定所述用户不是授权用户。For example, the pre-configured authorization information includes a pre-configured authentication password, and the second authorization information includes the authentication password input by the user to the second terminal. When the first terminal determines that the authentication password entered by the user in the first terminal is the same as the pre-configured authentication password, the first terminal may determine that the user is an authorized user, otherwise, it may determine that the user is not an authorized user.
步骤908:第二终端获取用户的第二确认指示。Step 908: The second terminal obtains the user's second confirmation instruction.
第二终端具体如何获取用户的第二确认指示,可以参考步骤408中的描述,在此不再赘述。For specifically how the second terminal obtains the second confirmation instruction of the user, reference may be made to the description in step 408, which will not be repeated here.
需要说明的是,步骤908也可以位于步骤907之前执行,本申请实施例对步骤907和步骤908的具体执行顺序并不限定。It should be noted that step 908 may also be executed before step 907, and the specific execution order of step 907 and step 908 is not limited in the embodiment of the present application.
第二终端根据第二授权信息确定用户是授权用户时,执行步骤909。When the second terminal determines that the user is an authorized user according to the second authorization information, step 909 is executed.
步骤909:第二终端向所述第一终端发送第二确认指示。Step 909: The second terminal sends a second confirmation instruction to the first terminal.
步骤910:第一终端接收第二确认指示,并根据第二确认指示对所述第一软件执行所述管理操作。Step 910: The first terminal receives a second confirmation instruction, and executes the management operation on the first software according to the second confirmation instruction.
需要说明的是,当第二终端确定所述第二授权信息与所述第二终端中预配置的授权信息不匹配时,第二终端可以向第一终端发送暂停管理操作消息;所述暂停管理操作消息用于指示所述用户不是所述授权用户。或者第二终端获取到用户输入的取消管理操作指示时,第二终端可以向第一终端发送取消管理操作消息;所述取消管理操作消息用于指示取消管理操作所述第一软件。It should be noted that when the second terminal determines that the second authorization information does not match the authorization information pre-configured in the second terminal, the second terminal may send a suspension management operation message to the first terminal; the suspension management The operation message is used to indicate that the user is not the authorized user. Or when the second terminal obtains the management cancellation instruction input by the user, the second terminal may send a management cancellation message to the first terminal; the management cancellation message is used to instruct to cancel the management operation of the first software.
相应的,第一终端接收到暂停管理操作消息或取消管理操作消息时,第一终端可以不对第一软件进行软件管理操作。Correspondingly, when the first terminal receives the message of suspending the management operation or the message of canceling the management operation, the first terminal may not perform the software management operation on the first software.
上面的过程中,第一终端在执行管理操作之前,需要第二终端确定执行管理操作的第一软件的用户是否为授权用户。通过这种方式,可以实现通过第一终端远程对第一软件的管理操作进行授权,提高第一软件的管理操作的灵活性。In the above process, before the first terminal performs the management operation, the second terminal is required to determine whether the user of the first software performing the management operation is an authorized user. In this way, it is possible to remotely authorize the management operation of the first software through the first terminal, and improve the flexibility of the management operation of the first software.
需要说明的是,图9所示的流程中,步骤909还可以采用以下步骤909a替换,在该步骤909a中,第二终端并不是根据第二授权信息确定用户是否为授权用户,而是转发第二授权信息。It should be noted that in the process shown in FIG. 9, step 909 can also be replaced by the following step 909a. In step 909a, the second terminal does not determine whether the user is an authorized user according to the second authorization information, but forwards the first 2. Authorization information.
步骤909a:第二终端向所述第一终端发送所述第二确认指示以及第二授权信息。Step 909a: The second terminal sends the second confirmation instruction and second authorization information to the first terminal.
第一终端获取来自第二终端的第二授权信息之后,可以根据第二授权信息确定当前执行软件管理操作的用户是否为授权用户,此时步骤910采用步骤910a替换。After the first terminal obtains the second authorization information from the second terminal, it can determine whether the user currently performing the software management operation is an authorized user according to the second authorization information. In this case, step 910 is replaced with step 910a.
步骤910a:当第二授权信息与第一终端中预配置的授权信息相匹配时,所述第一终端确定所述用户是所述授权用户,并根据第二确认指示对所述第一软件执行管理操作。Step 910a: When the second authorization information matches the authorization information pre-configured in the first terminal, the first terminal determines that the user is the authorized user, and executes the first software according to the second confirmation instruction Management operations.
本申请实施例中,当所述第二授权信息与所述第一终端中预配置的授权信息不匹配时,所述第一终端确定所述用户不是所述授权用户。第一终端确定所述用户不是所述授权用户时,可以不执行管理操作。In the embodiment of the present application, when the second authorization information does not match the authorization information pre-configured in the first terminal, the first terminal determines that the user is not the authorized user. When the first terminal determines that the user is not the authorized user, the management operation may not be performed.
举例来说,预配置的授权信息包括预配置的验证密码,第二授权信息包括用户输入的验证密码。当第一终端确定用户在第二终端中输入的验证密码与预配置的验证密码相同时,第一终端可以确定所述用户为授权用户,否则可以确定所述用户不是授权用户。For example, the pre-configured authorization information includes a pre-configured verification password, and the second authorization information includes a verification password entered by the user. When the first terminal determines that the authentication password entered by the user in the second terminal is the same as the pre-configured authentication password, the first terminal may determine that the user is an authorized user, otherwise, it may determine that the user is not an authorized user.
举例来说,预配置的授权信息包括预配置的指纹信息,第二授权信息包括用户输入的指纹信息。当第一终端确定用户输入的指纹信息与预配置的指纹信息相同时,第一终端可以确定所述用户为授权用户,否则可以确定所述用户不是授权用户。For example, the pre-configured authorization information includes pre-configured fingerprint information, and the second authorization information includes fingerprint information input by the user. When the first terminal determines that the fingerprint information input by the user is the same as the pre-configured fingerprint information, the first terminal may determine that the user is an authorized user, otherwise, it may determine that the user is not an authorized user.
图4至图9所示的流程中,描述了在认证终端不同的情况下,如何进行软件管理操作的流程,在具体应用过程中,可以根据实际情况选择所需的流程。The processes shown in Figs. 4 to 9 describe the process of how to perform software management operations in the case of different authentication terminals. In the specific application process, the required process can be selected according to the actual situation.
本文中描述的各个实施例可以为独立的方案,也可以根据内在逻辑进行组合,这些方案都落入本申请的保护范围中。The various embodiments described in this document may be independent solutions, or may be combined according to internal logic, and these solutions fall within the protection scope of the present application.
可以理解的是,上述各个方法实施例中,由第一终端实现的方法和操作,也可以由可用于第一终端的部件(例如芯片或者电路)实现,由第二终端实现的方法和操作,也可以由可用于第二终端的部件(例如芯片或者电路)实现,由网络设备实现的方法和操作,也可以由可用于网络设备的部件(例如芯片或者电路)实现。It is understandable that, in the foregoing method embodiments, the methods and operations implemented by the first terminal can also be implemented by components (such as chips or circuits) that can be used in the first terminal, and the methods and operations implemented by the second terminal can also be implemented by the second terminal. It can also be implemented by a component (such as a chip or circuit) that can be used in the second terminal, and the method and operation implemented by a network device can also be implemented by a component (such as a chip or circuit) that can be used in the network device.
上述本申请提供的实施例中,分别从各个设备之间交互的角度对本申请实施例提供的方法进行了介绍。为了实现上述本申请实施例提供的方法中的各功能,第一终端、第二终端与网络设备可以包括硬件结构和/或软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能以硬件结构、软件模块、还是硬件结构加软件模块的方式来执行,取决于技术方案的特定应用和设计约束条件。In the foregoing embodiments provided in the present application, the methods provided in the embodiments of the present application are respectively introduced from the perspective of interaction between various devices. In order to implement the functions in the methods provided in the above embodiments of the present application, the first terminal, the second terminal, and the network device may include a hardware structure and/or a software module, in the form of a hardware structure, a software module, or a hardware structure plus a software module To achieve the above functions. Whether a certain function among the above-mentioned functions is executed by a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraint conditions of the technical solution.
本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。另外,在本申请各个实施例中的各功能模块可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。The division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation. In addition, the functional modules in the various embodiments of the present application may be integrated in one processor, or may exist alone physically, or two or more modules may be integrated in one module. The above-mentioned integrated modules can be implemented in the form of hardware or software functional modules.
与上述构思相同,如图10所示,本申请实施例还提供一种装置1000用于实现上述方法中第一终端或第二终端或网络设备的功能。例如,该装置可以为软件模块或者芯片系统。本申请实施例中,芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。该装置1000可以包括:处理单元1001和通信单元1002。Similar to the foregoing concept, as shown in FIG. 10, an embodiment of the present application further provides an apparatus 1000 for implementing the functions of the first terminal or the second terminal or the network device in the foregoing method. For example, the device may be a software module or a chip system. In the embodiments of the present application, the chip system may be composed of chips, or may include chips and other discrete devices. The apparatus 1000 may include: a processing unit 1001 and a communication unit 1002.
本申请实施例中,通信单元也可以称为收发单元,可以包括发送单元和/或接收单元,分别用于执行上文方法实施例中第一终端或第二终端或网络设备发送和接收的步骤。In the embodiments of the present application, the communication unit may also be referred to as a transceiver unit, and may include a sending unit and/or a receiving unit, which are respectively used to perform the sending and receiving steps of the first terminal or the second terminal or the network device in the above method embodiment. .
以下,结合图10至图11详细说明本申请实施例提供的通信装置。应理解,装置实施例的描述与方法实施例的描述相互对应,因此,未详细描述的内容可以参见上文方法实施例,为了简洁,这里不再赘述。Hereinafter, the communication device provided by the embodiment of the present application will be described in detail with reference to FIGS. It should be understood that the description of the device embodiment and the description of the method embodiment correspond to each other. Therefore, for the content that is not described in detail, please refer to the above method embodiment. For brevity, details are not repeated here.
在一种可能的设计中,该装置1000可实现对应于上文方法实施例中的终端设备或者网络设备执行的步骤或者流程,下面分别进行描述。In a possible design, the apparatus 1000 can implement the steps or processes corresponding to the terminal device or the network device in the above method embodiment, which will be described separately below.
示例性地,当该装置1000实现前面的流程中第一终端的功能时:Exemplarily, when the device 1000 implements the function of the first terminal in the previous process:
通信单元1002,用于接收管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The communication unit 1002 is configured to receive management notification messages; the management notification messages are used to notify management operations of the first software; the management operations include updating the first software, installing the first software, and uninstalling the first software. Any item in a piece of software;
处理单元1001,用于根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和第二终端时,通过所述认证终端对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户,且获取到所述用户输入的第一确认指示,以及接收到来自所述第二终端的第二确认指示时,根据所述第一确认指示以及所述第二确认指示对所述第一软件执行所述管理通知消息指示的所述管理操作;The processing unit 1001 is configured to, when it is determined that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software through the authentication terminal; When it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the second confirmation instruction from the second terminal is received, according to the first confirmation An instruction and the second confirmation instruction to perform the management operation indicated by the management notification message on the first software;
其中,所述第一确认指示用于指示所述用户确认对所述第一软件执行所述管理操作。The first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software.
在一种可能的实施方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal;
所述处理单元1001具体用于:The processing unit 1001 is specifically configured to:
所述第一终端根据所述第一软件对应的所述管理策略中的所述第一信息确定所述认证终端包括所述第一终端和所述第二终端。The first terminal determines, according to the first information in the management policy corresponding to the first software, that the authentication terminal includes the first terminal and the second terminal.
在一种可能的实施方式中,所述管理策略包括第二信息,所述第二信息用于指示所述第一软件的授权模式;In a possible implementation manner, the management policy includes second information, and the second information is used to indicate an authorization mode of the first software;
所述对确认管理所述第一软件的用户进行认证之前,所述处理单元1001还用于:Before the authentication of the user confirming the management of the first software, the processing unit 1001 is further configured to:
根据所述管理策略中的所述第二信息确定所述第一软件的授权模式;Determining the authorization mode of the first software according to the second information in the management policy;
根据所述授权模式确定需要通过所述认证终端对所述用户进行认证。It is determined according to the authorization mode that the user needs to be authenticated by the authentication terminal.
在一种可能的实施方式中,所述授权模式包括第一模式和第二模式,所述第一模式为所述第一软件的每一次的管理操作都需要通过所述认证终端对所述用户进行认证;In a possible implementation manner, the authorization mode includes a first mode and a second mode, and the first mode is that each management operation of the first software requires the authentication terminal to authenticate the user To be certified;
所述第二模式为所述第一软件的第一次管理操作需要通过所述认证终端对所述用户进行认证,所述第一软件的第一次管理操作之后的管理操作不需要通过所述认证终端对所述用户进行认证;The second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operations after the first management operation of the first software do not need to pass the The authentication terminal authenticates the user;
所述通过所述认证终端对确认管理所述第一软件的用户进行认证之前,所述处理单元1001还用于:Before the authentication of the user confirming the management of the first software through the authentication terminal, the processing unit 1001 is further configured to:
当确定所述第一软件的授权模式为所述第一模式,或者确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,确定需要通过所述认证终端对所述用户进行认证。When it is determined that the authorization mode of the first software is the first mode, or the authorization mode of the first software is determined to be the second mode, and the first software is the first management operation, it is determined that the authorization mode needs to be passed The authentication terminal authenticates the user.
在一种可能的实施方式中,所述处理单元1001具体用于:In a possible implementation manner, the processing unit 1001 is specifically configured to:
获取所述用户在所述第一终端中输入的第一授权信息,并获取来自所述第二终端的第二授权信息;所述第一授权信息包括所述用户输入至所述第一终端的认证信息,所述第二授权信息包括所述用户输入至所述第二终端的认证信息;Obtain the first authorization information entered by the user in the first terminal, and obtain the second authorization information from the second terminal; the first authorization information includes the information entered by the user in the first terminal Authentication information, where the second authorization information includes authentication information input by the user to the second terminal;
当所述第一授权信息与所述第一终端中预配置的授权信息相匹配,且所述第一授权信 息或者所述预配置的授权信息与所述第二授权信息相匹配时,确定所述用户是所述授权用户。When the first authorization information matches the authorization information pre-configured in the first terminal, and the first authorization information or the pre-configured authorization information matches the second authorization information, it is determined The user is the authorized user.
在一种可能的实施方式中,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;In a possible implementation manner, the management policy includes third information, and the third information is used to indicate the authorized user;
所述处理单元1001还用于:The processing unit 1001 is further configured to:
根据所述管理策略中的所述第三信息确定所述授权用户。The authorized user is determined according to the third information in the management policy.
在一种可能的实施方式中,所述接收管理通知消息之前,所述通信单元1002还用于:In a possible implementation manner, before the receiving the management notification message, the communication unit 1002 is further configured to:
获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring the management policy set by the authorized user, and sending the management policy to the network device;
或者接收来自所述网络设备的所述管理策略。Or receive the management policy from the network device.
在一种可能的实施方式中,所述通信装置为车载终端,所述第二终端为移动终端。In a possible implementation manner, the communication device is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
示例性地,当该装置1000实现前面的流程中第二终端的功能时:Exemplarily, when the device 1000 implements the function of the second terminal in the previous process:
通信单元1002,用于接收所述管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The communication unit 1002 is configured to receive the management notification message; the management notification message is used to notify the management operation of the first software; the management operation includes updating the first software, installing the first software, and uninstalling the first software. Any item of the first software;
处理单元1001,用于根据所述第一软件对应的管理策略确定认证终端包括第二终端时,对确认管理所述第一软件的用户进行认证;The processing unit 1001 is configured to authenticate the user confirming to manage the first software when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software;
当确定所述用户为管理所述第一软件的授权用户时,所述第二终端向第一终端发送所述用户输入的第二确认指示,所述第二确认指示用于指示所述用户确认对所述第一软件执行所述管理通知消息指示的所述管理操作。When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal, and the second confirmation instruction is used to instruct the user to confirm Performing the management operation indicated by the management notification message on the first software.
在一种可能的实施方式中,所述处理单元1001具体用于:In a possible implementation manner, the processing unit 1001 is specifically configured to:
获取所述用户在所述第二终端中输入的第二授权信息;所述第二授权信息包括所述用户输入至所述第二终端的认证信息;Acquiring second authorization information entered by the user in the second terminal; the second authorization information includes authentication information entered by the user in the second terminal;
当所述第一授权信息与所述第二终端中预配置的授权信息相匹配时,确定所述用户是管理所述第一软件的所述授权用户。When the first authorization information matches the authorization information pre-configured in the second terminal, it is determined that the user is the authorized user who manages the first software.
在一种可能的实施方式中,所述通信单元1002还用于:In a possible implementation manner, the communication unit 1002 is further configured to:
获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring the management policy set by the authorized user, and sending the management policy to the network device;
或者接收来自所述网络设备的所述管理策略。Or receive the management policy from the network device.
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;所述处理单元1001根据所述管理策略中的所述第一信息确定所述认证终端为所述第二终端。In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal; the processing unit 1001 determines the The authentication terminal is the second terminal.
在一种可能的实施方式中,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;所述处理单元1001还用于:In a possible implementation manner, the management policy includes third information, and the third information is used to indicate the authorized user; the processing unit 1001 is further used to:
根据所述管理策略中的所述第三信息确定所述授权用户。The authorized user is determined according to the third information in the management policy.
一种可能的实现方式中,所述第一终端为车载终端,所述第二终端为移动终端。In a possible implementation manner, the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
示例性地,当该装置1000实现前面的流程中网络设备的功能时:Exemplarily, when the apparatus 1000 implements the function of the network device in the previous process:
处理单元1001,用于当确定对第一软件进行管理操作时,根据所述第一软件对应的管理策略确定认证终端,所述认证终端用于对确认管理所述第一软件的用户进行认证;所述认证终端包括第一终端和第二终端;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The processing unit 1001 is configured to determine an authentication terminal according to a management policy corresponding to the first software when it is determined to perform a management operation on the first software, and the authentication terminal is used to authenticate a user who confirms the management of the first software; The authentication terminal includes a first terminal and a second terminal; the management operation includes any one of updating the first software, installing the first software, and uninstalling the first software;
通信单元1002,用于向所述认证终端发送管理通知消息,所述管理通知消息用于通知 对所述第一软件进行所述管理操作。The communication unit 1002 is configured to send a management notification message to the authentication terminal, where the management notification message is used to notify the first software to perform the management operation.
一种可能的实现方式中,所述确定对第一软件进行管理操作之前,所述通信单元1002还用于:In a possible implementation manner, before the determining to perform a management operation on the first software, the communication unit 1002 is further configured to:
向所述第一终端以及所述第二终端发送所述管理策略;Sending the management policy to the first terminal and the second terminal;
或者接收来自所述第一终端或所述第二终端的所述管理策略。Or receive the management policy from the first terminal or the second terminal.
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal;
所述处理单元1001具体用于:The processing unit 1001 is specifically configured to:
根据所述管理策略中的所述第一信息确定所述认证终端。The authentication terminal is determined according to the first information in the management policy.
一种可能的实现方式中,所述第一终端为车载终端,所述第二终端为移动终端。In a possible implementation manner, the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;所述处理单元1001根据所述管理策略中的所述第一信息确定所述认证终端。In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal; the processing unit 1001 determines the Authentication terminal.
如图11所示为本申请实施例提供的装置1100,图11所示的装置可以为图10所示的装置的一种硬件电路的实现方式。该通信装置可适用于图2所示出的流程图中,执行上述方法实施例中终端设备或者网络设备的功能。为了便于说明,图11仅示出了该通信装置的主要部件。FIG. 11 shows an apparatus 1100 provided by an embodiment of the application, and the apparatus shown in FIG. 11 may be a hardware circuit implementation of the apparatus shown in FIG. 10. The communication device can be applied to the flowchart shown in FIG. 2 to perform the functions of the terminal device or the network device in the foregoing method embodiment. For ease of description, FIG. 11 only shows the main components of the communication device.
图11所示的装置1100包括至少一个处理器1120,用于实现本申请实施例提供的图2中任一方法。The apparatus 1100 shown in FIG. 11 includes at least one processor 1120, configured to implement any method in FIG. 2 provided in an embodiment of the present application.
装置1100还可以包括至少一个存储器1130,用于存储程序指令和/或数据。存储器1130和处理器1120耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器1120可能和存储器1130协同操作。处理器1120可能执行存储器1130中存储的程序指令。所述至少一个存储器中的至少一个可以包括于处理器中。The device 1100 may further include at least one memory 1130 for storing program instructions and/or data. The memory 1130 and the processor 1120 are coupled. The coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, and may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules. The processor 1120 may operate in cooperation with the memory 1130. The processor 1120 may execute program instructions stored in the memory 1130. At least one of the at least one memory may be included in the processor.
在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。为避免重复,这里不再详细描述。In the implementation process, each step of the above method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software. The steps of the method disclosed in combination with the embodiments of the present application may be embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor. The software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers. The storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
应注意,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理电路(digital signal processor,DSP)、专用集成芯片(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。It should be noted that the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software. The above-mentioned processor may be a general-purpose processor, a digital signal processing circuit (digital signal processor, DSP), a dedicated integrated circuit (application specific integrated circuit, ASIC), a field programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers. The storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), and synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) ) And direct memory bus random access memory (direct rambus RAM, DR RAM). It should be noted that the memories of the systems and methods described herein are intended to include, but are not limited to, these and any other suitable types of memories.
装置1100还可以包括通信接口1110,用于通过传输介质和其它设备进行通信,从而用于装置1100中的装置可以和其它设备进行通信。在本申请实施例中,通信接口可以是收发器、电路、总线、模块或其它类型的通信接口。在本申请实施例中,通信接口为收发器时,收发器可以包括独立的接收器、独立的发射器;也可以集成收发功能的收发器、或者是接口电路。The apparatus 1100 may further include a communication interface 1110 for communicating with other devices through a transmission medium, so that the apparatus used in the apparatus 1100 can communicate with other devices. In the embodiment of the present application, the communication interface may be a transceiver, circuit, bus, module, or other type of communication interface. In the embodiment of the present application, when the communication interface is a transceiver, the transceiver may include an independent receiver and an independent transmitter; it may also be a transceiver with integrated transceiver functions, or an interface circuit.
装置1100还可以包括通信线路1140。其中,通信接口1110、处理器1120以及存储器1130可以通过通信线路1140相互连接;通信线路1140可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。所述通信线路1140可以分为地址总线、数据总线、控制总线等。为便于表示,图11中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The device 1100 may also include a communication line 1140. Among them, the communication interface 1110, the processor 1120, and the memory 1130 may be connected to each other through a communication line 1140; the communication line 1140 may be a peripheral component interconnection standard (peripheral component interconnect, PCI for short) bus or an extended industry standard architecture (extended industry standard architecture) , Referred to as EISA) bus and so on. The communication line 1140 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is used to represent in FIG. 11, but it does not mean that there is only one bus or one type of bus.
示例性地,当该装置1100实现前面的流程中第一终端的功能时:Exemplarily, when the device 1100 implements the function of the first terminal in the previous process:
通信接口1110,用于接收管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The communication interface 1110 is used to receive management notification messages; the management notification messages are used to notify management operations of the first software; the management operations include updating the first software, installing the first software, and uninstalling the first software. Any item in a piece of software;
处理器1120,用于根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和第二终端时,通过所述认证终端对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户,且获取到所述用户输入的第一确认指示,以及接收到来自所述第二终端的第二确认指示时,根据所述第一确认指示以及所述第二确认指示对所述第一软件执行所述管理通知消息指示的所述管理操作;The processor 1120 is configured to, according to the management policy corresponding to the first software, determine that the authentication terminal includes the first terminal and the second terminal, authenticate the user who confirms the management of the first software through the authentication terminal; When it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the second confirmation instruction from the second terminal is received, according to the first confirmation An instruction and the second confirmation instruction to perform the management operation indicated by the management notification message on the first software;
其中,所述第一确认指示用于指示所述用户确认对所述第一软件执行所述管理操作。The first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software.
在一种可能的实施方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal;
所述处理器1120具体用于:The processor 1120 is specifically configured to:
所述第一终端根据所述第一软件对应的所述管理策略中的所述第一信息确定所述认证终端包括所述第一终端和所述第二终端。The first terminal determines, according to the first information in the management policy corresponding to the first software, that the authentication terminal includes the first terminal and the second terminal.
在一种可能的实施方式中,所述管理策略包括第二信息,所述第二信息用于指示所述第一软件的授权模式;In a possible implementation manner, the management policy includes second information, and the second information is used to indicate an authorization mode of the first software;
所述对确认管理所述第一软件的用户进行认证之前,所述处理器1120还用于:Before the authentication of the user confirming the management of the first software, the processor 1120 is further configured to:
根据所述管理策略中的所述第二信息确定所述第一软件的授权模式;Determining the authorization mode of the first software according to the second information in the management policy;
根据所述授权模式确定需要通过所述认证终端对所述用户进行认证。It is determined according to the authorization mode that the user needs to be authenticated by the authentication terminal.
在一种可能的实施方式中,所述授权模式包括第一模式和第二模式,所述第一模式为所述第一软件的每一次的管理操作都需要通过所述认证终端对所述用户进行认证;In a possible implementation manner, the authorization mode includes a first mode and a second mode, and the first mode is that each management operation of the first software requires the authentication terminal to authenticate the user To be certified;
所述第二模式为所述第一软件的第一次管理操作需要通过所述认证终端对所述用户进行认证,所述第一软件的第一次管理操作之后的管理操作不需要通过所述认证终端对所述用户进行认证;The second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operations after the first management operation of the first software do not need to pass the The authentication terminal authenticates the user;
所述通过所述认证终端对确认管理所述第一软件的用户进行认证之前,所述处理器1120还用于:Before the authentication of the user confirming to manage the first software through the authentication terminal, the processor 1120 is further configured to:
当确定所述第一软件的授权模式为所述第一模式,或者确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,确定需要通过所述认证终端对所述用户进行认证。When it is determined that the authorization mode of the first software is the first mode, or the authorization mode of the first software is determined to be the second mode, and the first software is the first management operation, it is determined that it needs to pass The authentication terminal authenticates the user.
在一种可能的实施方式中,所述处理器1120具体用于:In a possible implementation manner, the processor 1120 is specifically configured to:
获取所述用户在所述第一终端中输入的第一授权信息,并获取来自所述第二终端的第二授权信息;所述第一授权信息包括所述用户输入至所述第一终端的认证信息,所述第二授权信息包括所述用户输入至所述第二终端的认证信息;Obtain the first authorization information entered by the user in the first terminal, and obtain the second authorization information from the second terminal; the first authorization information includes the information entered by the user in the first terminal Authentication information, where the second authorization information includes authentication information input by the user to the second terminal;
当所述第一授权信息与所述第一终端中预配置的授权信息相匹配,且所述第一授权信息或者所述预配置的授权信息与所述第二授权信息相匹配时,确定所述用户是所述授权用户。When the first authorization information matches the authorization information pre-configured in the first terminal, and the first authorization information or the pre-configured authorization information matches the second authorization information, it is determined The user is the authorized user.
在一种可能的实施方式中,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;In a possible implementation manner, the management policy includes third information, and the third information is used to indicate the authorized user;
所述处理器1120还用于:The processor 1120 is further configured to:
根据所述管理策略中的所述第三信息确定所述授权用户。The authorized user is determined according to the third information in the management policy.
在一种可能的实施方式中,所述接收管理通知消息之前,所述通信接口1110还用于:In a possible implementation manner, before the receiving the management notification message, the communication interface 1110 is further configured to:
获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring the management policy set by the authorized user, and sending the management policy to the network device;
或者接收来自所述网络设备的所述管理策略。Or receive the management policy from the network device.
在一种可能的实施方式中,所述通信装置为车载终端,所述第二终端为移动终端。In a possible implementation manner, the communication device is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
示例性地,当该装置1100实现前面的流程中第二终端的功能时:Exemplarily, when the device 1100 implements the function of the second terminal in the previous process:
通信接口1110,用于接收所述管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The communication interface 1110 is used to receive the management notification message; the management notification message is used to notify the management operation of the first software; the management operation includes updating the first software, installing the first software, and uninstalling the first software. Any item of the first software;
处理器1120,用于根据所述第一软件对应的管理策略确定认证终端包括第二终端时,对确认管理所述第一软件的用户进行认证;The processor 1120 is configured to, when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who is confirmed to manage the first software;
当确定所述用户为管理所述第一软件的授权用户时,所述第二终端向第一终端发送所述用户输入的第二确认指示,所述第二确认指示用于指示所述用户确认对所述第一软件执行所述管理通知消息指示的所述管理操作。When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal, and the second confirmation instruction is used to instruct the user to confirm Performing the management operation indicated by the management notification message on the first software.
在一种可能的实施方式中,所述处理器1120具体用于:In a possible implementation manner, the processor 1120 is specifically configured to:
获取所述用户在所述第二终端中输入的第二授权信息;所述第二授权信息包括所述用户输入至所述第二终端的认证信息;Acquiring second authorization information entered by the user in the second terminal; the second authorization information includes authentication information entered by the user in the second terminal;
当所述第一授权信息与所述第二终端中预配置的授权信息相匹配时,确定所述用户是管理所述第一软件的所述授权用户。When the first authorization information matches the authorization information pre-configured in the second terminal, it is determined that the user is the authorized user who manages the first software.
在一种可能的实施方式中,所述通信接口1110还用于:In a possible implementation manner, the communication interface 1110 is further used for:
获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring the management policy set by the authorized user, and sending the management policy to the network device;
或者接收来自所述网络设备的所述管理策略。Or receive the management policy from the network device.
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;所述处理器1120根据所述管理策略中的所述第一信息确定所述认证终端为所述第二终端。In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal; the processor 1120 determines the The authentication terminal is the second terminal.
在一种可能的实施方式中,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;所述处理器1120还用于:In a possible implementation manner, the management policy includes third information, and the third information is used to indicate the authorized user; the processor 1120 is further configured to:
根据所述管理策略中的所述第三信息确定所述授权用户。The authorized user is determined according to the third information in the management policy.
一种可能的实现方式中,所述第一终端为车载终端,所述第二终端为移动终端。In a possible implementation manner, the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
示例性地,当该装置1100实现前面的流程中网络设备的功能时:Exemplarily, when the apparatus 1100 implements the function of the network device in the previous process:
处理器1120,用于当确定对第一软件进行管理操作时,根据所述第一软件对应的管理策略确定认证终端,所述认证终端用于对确认管理所述第一软件的用户进行认证;所述认证终端包括第一终端和第二终端;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The processor 1120 is configured to determine an authentication terminal according to a management policy corresponding to the first software when it is determined to perform a management operation on the first software, where the authentication terminal is used to authenticate a user who has confirmed the management of the first software; The authentication terminal includes a first terminal and a second terminal; the management operation includes any one of updating the first software, installing the first software, and uninstalling the first software;
通信接口1110,用于向所述认证终端发送管理通知消息,所述管理通知消息用于通知对所述第一软件进行所述管理操作。The communication interface 1110 is configured to send a management notification message to the authentication terminal, where the management notification message is used to notify the first software to perform the management operation.
一种可能的实现方式中,所述确定对第一软件进行管理操作之前,所述通信接口1110还用于:In a possible implementation manner, before the determining to perform a management operation on the first software, the communication interface 1110 is further used for:
向所述第一终端以及所述第二终端发送所述管理策略;Sending the management policy to the first terminal and the second terminal;
或者接收来自所述第一终端或所述第二终端的所述管理策略。Or receive the management policy from the first terminal or the second terminal.
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal;
所述处理器1120具体用于:The processor 1120 is specifically configured to:
根据所述管理策略中的所述第一信息确定所述认证终端。The authentication terminal is determined according to the first information in the management policy.
一种可能的实现方式中,所述第一终端为车载终端,所述第二终端为移动终端。In a possible implementation manner, the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
一种可能的实现方式中,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;所述处理器1120根据所述管理策略中的所述第一信息确定所述认证终端。In a possible implementation manner, the management policy includes first information, and the first information is used to indicate the authentication terminal; the processor 1120 determines the Authentication terminal.
本申请实施例还提供了一种系统,具体可以参考如图12所示。该系统1200包括网络设备1201,第一终端1202以及第二终端1203。The embodiment of the present application also provides a system. For details, refer to FIG. 12. The system 1200 includes a network device 1201, a first terminal 1202, and a second terminal 1203.
网络设备1201,用于确定对第一软件进行管理操作时,根据所述第一软件对应的管理策略确定认证终端,所述认证终端用于对确认管理所述第一软件的用户进行认证;所述认证终端包括第一终端和第二终端;向所述认证终端发送管理通知消息,所述管理通知消息用于通知对所述第一软件进行所述管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The network device 1201 is configured to determine an authentication terminal according to a management policy corresponding to the first software when determining to perform a management operation on the first software, and the authentication terminal is used to authenticate a user who has confirmed the management of the first software; The authentication terminal includes a first terminal and a second terminal; a management notification message is sent to the authentication terminal, and the management notification message is used to notify the management operation of the first software; the management operation includes updating the Any one of the first software, installing the first software, and uninstalling the first software;
第二终端1203,用于接收所述管理通知消息;根据所述第一软件对应的管理策略确定认证终端包括所述第二终端时,对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户时,向所述第一终端发送所述用户输入的第二确认指示, 所述第二确认指示用于指示所述用户通过所述第二终端确认对所述第一软件执行所述管理通知消息指示的所述管理操作;The second terminal 1203 is configured to receive the management notification message; when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software; when it is determined When the user is an authorized user who manages the first software, a second confirmation instruction input by the user is sent to the first terminal, where the second confirmation instruction is used to instruct the user to use the second terminal Confirming that the management operation indicated by the management notification message is performed on the first software;
第一终端1202,用于接收所述管理通知消息;根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和所述第二终端时,通过所述认证终端对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户,且获取到所述用户输入的第一确认指示,以及接收到来自所述第二终端的第二确认指示时,根据所述第一确认指示以及所述第二确认指示对所述第一软件执行所述管理通知消息指示的所述管理操作;其中,所述第一确认指示用于指示所述用户通过所述第一终端确认对所述第一软件执行所述管理操作。The first terminal 1202 is configured to receive the management notification message; when it is determined that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, the authentication terminal is used to confirm the management office The user of the first software is authenticated; when it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the second terminal is received from the second terminal. When confirming the instruction, perform the management operation indicated by the management notification message on the first software according to the first confirmation instruction and the second confirmation instruction; wherein, the first confirmation instruction is used to instruct the The user confirms to perform the management operation on the first software through the first terminal.
网络设备1201,第一终端1202以及第二终端1203还可以执行其他内容,具体可以参考前面的描述,在此不再赘述。The network device 1201, the first terminal 1202, and the second terminal 1203 may also execute other content. For details, reference may be made to the foregoing description, which will not be repeated here.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, optical storage, etc.) containing computer-usable program codes.
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。This application is described with reference to flowcharts and/or block diagrams of methods, equipment (systems), and computer program products according to this application. It should be understood that each process and/or block in the flowchart and/or block diagram, and the combination of processes and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions can be provided to the processor of a general-purpose computer, a special-purpose computer, an embedded processor, or other programmable data processing equipment to generate a machine, so that the instructions executed by the processor of the computer or other programmable data processing equipment are used to generate It is a device that realizes the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device. The device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the application without departing from the scope of the application. In this way, if these modifications and variations of this application fall within the scope of the claims of this application and their equivalent technologies, then this application is also intended to include these modifications and variations.

Claims (35)

  1. 一种软件管理系统,其特征在于,包括:A software management system, characterized in that it includes:
    网络设备,用于确定对第一软件进行管理操作时,根据所述第一软件对应的管理策略确定认证终端,所述认证终端用于对确认管理所述第一软件的用户进行认证;所述认证终端包括第一终端和第二终端;向所述认证终端发送管理通知消息,所述管理通知消息用于通知对所述第一软件进行所述管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The network device is configured to determine an authentication terminal according to a management policy corresponding to the first software when determining to perform a management operation on the first software, and the authentication terminal is used to authenticate a user who has confirmed the management of the first software; The authentication terminal includes a first terminal and a second terminal; a management notification message is sent to the authentication terminal, the management notification message is used to notify the management operation of the first software; the management operation includes updating the first software 1. Software, any one of installing the first software and uninstalling the first software;
    所述第二终端,用于接收所述管理通知消息;根据所述第一软件对应的管理策略确定认证终端包括所述第二终端时,对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户时,向所述第一终端发送所述用户输入的第二确认指示,所述第二确认指示用于指示所述用户通过所述第二终端确认对所述第一软件执行所述管理通知消息指示的所述管理操作;The second terminal is configured to receive the management notification message; when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software; when When it is determined that the user is an authorized user who manages the first software, a second confirmation instruction input by the user is sent to the first terminal, and the second confirmation instruction is used to instruct the user to pass the second The terminal confirms that the management operation indicated by the management notification message is performed on the first software;
    所述第一终端,用于接收所述管理通知消息;根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和所述第二终端时,通过所述认证终端对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户,且获取到所述用户输入的第一确认指示,以及接收到来自所述第二终端的第二确认指示时,根据所述第一确认指示以及所述第二确认指示对所述第一软件执行所述管理通知消息指示的所述管理操作;其中,所述第一确认指示用于指示所述用户通过所述第一终端确认对所述第一软件执行所述管理操作。The first terminal is configured to receive the management notification message; when it is determined that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, the authentication terminal is used to confirm management The user of the first software is authenticated; when it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the first confirmation instruction from the second terminal is received 2. When confirming the instruction, perform the management operation indicated by the management notification message on the first software according to the first confirmation instruction and the second confirmation instruction; wherein, the first confirmation instruction is used to instruct all The user confirms the execution of the management operation on the first software through the first terminal.
  2. 根据权利要求1所述的系统,其特征在于,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;The system according to claim 1, wherein the management policy includes first information, and the first information is used to indicate the authentication terminal;
    所述根据所述第一软件对应的管理策略确定认证终端,包括:The determining the authentication terminal according to the management policy corresponding to the first software includes:
    根据所述管理策略中的所述第一信息确定所述认证终端。The authentication terminal is determined according to the first information in the management policy.
  3. 根据权利要求1至2任一所述的系统,其特征在于,所述管理策略包括第二信息,所述第二信息用于指示所述第一软件的授权模式;The system according to any one of claims 1 to 2, wherein the management policy includes second information, and the second information is used to indicate the authorization mode of the first software;
    所述第一终端对确认管理所述第一软件的用户进行认证之前,还包括:Before the first terminal authenticates the user confirming to manage the first software, the method further includes:
    根据所述管理策略中的所述第二信息确定所述第一软件的授权模式;Determining the authorization mode of the first software according to the second information in the management policy;
    根据所述授权模式确定需要通过所述认证终端对所述用户进行认证。It is determined according to the authorization mode that the user needs to be authenticated by the authentication terminal.
  4. 根据权利要求3所述的系统,其特征在于,所述授权模式包括第一模式和第二模式,所述第一模式为所述第一软件的每一次的管理操作都需要通过所述认证终端对所述用户进行认证;The system according to claim 3, wherein the authorization mode includes a first mode and a second mode, and the first mode is that each management operation of the first software requires passing the authentication terminal Authenticate the user;
    所述第二模式为所述第一软件的第一次管理操作需要通过所述认证终端对所述用户进行认证,所述第一软件的第一次管理操作之后的管理操作不需要通过所述认证终端对所述用户进行认证;The second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operations after the first management operation of the first software do not need to pass the The authentication terminal authenticates the user;
    所述第一终端具体用于:The first terminal is specifically configured to:
    当确定所述第一软件的授权模式为所述第一模式,或者确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,确定需要通过所述认证终端对所述用户进行认证。When it is determined that the authorization mode of the first software is the first mode, or the authorization mode of the first software is determined to be the second mode, and the first software is the first management operation, it is determined that it needs to pass The authentication terminal authenticates the user.
  5. 根据权利要求1至4任一所述的系统,其特征在于,所述第一终端具体用于:The system according to any one of claims 1 to 4, wherein the first terminal is specifically configured to:
    获取所述用户在所述第一终端中输入的第一授权信息,并获取来自所述第二终端的第二授权信息;所述第一授权信息包括所述用户输入至所述第一终端的认证信息,所述第二授权信息包括所述用户输入至所述第二终端的认证信息;Obtain the first authorization information entered by the user in the first terminal, and obtain the second authorization information from the second terminal; the first authorization information includes the information entered by the user in the first terminal Authentication information, where the second authorization information includes authentication information input by the user to the second terminal;
    当所述第一授权信息与所述第一终端中预配置的授权信息相匹配,且所述第一授权信息或者所述预配置的授权信息与所述第二授权信息相匹配时,确定所述用户是所述授权用户。When the first authorization information matches the authorization information pre-configured in the first terminal, and the first authorization information or the pre-configured authorization information matches the second authorization information, it is determined The user is the authorized user.
  6. 根据权利要求1至5任一所述的系统,其特征在于,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;The system according to any one of claims 1 to 5, wherein the management policy includes third information, and the third information is used to indicate the authorized user;
    所述第一终端对确认管理所述第一软件的用户进行认证之前,还用于:Before the first terminal authenticates the user confirming to manage the first software, it is also used to:
    根据所述管理策略中的所述第三信息确定所述授权用户。The authorized user is determined according to the third information in the management policy.
  7. 根据权利要求1至6任一所述的系统,其特征在于,所述第一终端接收管理通知消息之前,还用于:The system according to any one of claims 1 to 6, wherein before the first terminal receives the management notification message, it is further used for:
    获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring the management policy set by the authorized user, and sending the management policy to the network device;
    或者接收来自所述网络设备的所述管理策略。Or receive the management policy from the network device.
  8. 根据权利要求1至7任一所述的系统,其特征在于,所述第二终端具体用于:The system according to any one of claims 1 to 7, wherein the second terminal is specifically configured to:
    获取所述用户在所述第二终端中输入的第二授权信息;所述第二授权信息包括所述用户输入至所述第二终端的认证信息;Acquiring second authorization information entered by the user in the second terminal; the second authorization information includes authentication information entered by the user in the second terminal;
    当所述第一授权信息与所述第二终端中预配置的授权信息相匹配时,确定所述用户是所述授权用户。When the first authorization information matches the authorization information pre-configured in the second terminal, it is determined that the user is the authorized user.
  9. 根据权利要求1至8任一所述的系统,其特征在于,所述第二终端还用于:The system according to any one of claims 1 to 8, wherein the second terminal is further configured to:
    获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring the management policy set by the authorized user, and sending the management policy to the network device;
    或者接收来自所述网络设备的所述管理策略。Or receive the management policy from the network device.
  10. 根据权利要求1至9任一所述的系统,其特征在于,所述第一终端为车载终端,所述第二终端为移动终端。The system according to any one of claims 1 to 9, wherein the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
  11. 一种软件管理方法,其特征在于,包括:A software management method, characterized in that it comprises:
    第一终端接收管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The first terminal receives a management notification message; the management notification message is used to notify the management operation of the first software; the management operation includes updating the first software, installing the first software, and uninstalling the first software. Any of
    所述第一终端根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和第二终端时,通过所述认证终端对确认管理所述第一软件的用户进行认证;When the first terminal determines that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, the user who confirms the management of the first software is authenticated through the authentication terminal;
    当确定所述用户为管理所述第一软件的授权用户,且获取到所述用户输入的第一确认指示,以及接收到来自所述第二终端的第二确认指示时,所述第一终端根据所述第一确认指示以及所述第二确认指示对所述第一软件执行所述管理通知消息指示的所述管理操作;When it is determined that the user is an authorized user who manages the first software, and the first confirmation instruction input by the user is obtained, and the second confirmation instruction from the second terminal is received, the first terminal Performing the management operation indicated by the management notification message on the first software according to the first confirmation instruction and the second confirmation instruction;
    其中,所述第一确认指示用于指示所述用户通过所述第一终端确认对所述第一软件执行所述管理操作。The first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software through the first terminal.
  12. 根据权利要求11所述的方法,其特征在于,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;The method according to claim 11, wherein the management policy includes first information, and the first information is used to indicate the authentication terminal;
    所述第一终端根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和第二终端,包括:The first terminal determines that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, including:
    所述第一终端根据所述第一软件对应的所述管理策略中的所述第一信息确定所述认证终端包括所述第一终端和所述第二终端。The first terminal determines, according to the first information in the management policy corresponding to the first software, that the authentication terminal includes the first terminal and the second terminal.
  13. 根据权利要求11至12任一所述的方法,其特征在于,所述管理策略包括第二信息,所述第二信息用于指示所述第一软件的授权模式;The method according to any one of claims 11 to 12, wherein the management policy includes second information, and the second information is used to indicate the authorization mode of the first software;
    所述第一终端对确认管理所述第一软件的用户进行认证之前,还包括:Before the first terminal authenticates the user confirming to manage the first software, the method further includes:
    所述第一终端根据所述管理策略中的所述第二信息确定所述第一软件的授权模式;Determining, by the first terminal, the authorization mode of the first software according to the second information in the management policy;
    所述第一终端根据所述授权模式确定需要通过所述认证终端对所述用户进行认证。The first terminal determines according to the authorization mode that the user needs to be authenticated by the authentication terminal.
  14. 根据权利要求13所述的方法,其特征在于,所述授权模式包括第一模式和第二模式,所述第一模式为所述第一软件的每一次的管理操作都需要通过所述认证终端对所述用户进行认证;The method according to claim 13, wherein the authorization mode includes a first mode and a second mode, and the first mode is that each management operation of the first software needs to pass the authentication terminal Authenticate the user;
    所述第二模式为所述第一软件的第一次管理操作需要通过所述认证终端对所述用户进行认证,所述第一软件的第一次管理操作之后的管理操作不需要通过所述认证终端对所述用户进行认证;The second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operations after the first management operation of the first software do not need to pass the The authentication terminal authenticates the user;
    所述第一终端通过所述认证终端对确认管理所述第一软件的用户进行认证之前,还包括:Before the first terminal authenticates the user confirming to manage the first software through the authentication terminal, the method further includes:
    当确定所述第一软件的授权模式为所述第一模式,或者确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,确定需要通过所述认证终端对所述用户进行认证。When it is determined that the authorization mode of the first software is the first mode, or the authorization mode of the first software is determined to be the second mode, and the first software is the first management operation, it is determined that it needs to pass The authentication terminal authenticates the user.
  15. 根据权利要求11至14任一所述的方法,其特征在于,所述确定所述用户为管理所述第一软件的授权用户,包括:The method according to any one of claims 11 to 14, wherein the determining that the user is an authorized user who manages the first software comprises:
    所述第一终端获取所述用户在所述第一终端中输入的第一授权信息,并获取来自所述第二终端的第二授权信息;所述第一授权信息包括所述用户输入至所述第一终端的认证信息,所述第二授权信息包括所述用户输入至所述第二终端的认证信息;The first terminal obtains the first authorization information input by the user in the first terminal, and obtains the second authorization information from the second terminal; the first authorization information includes the user input to the The authentication information of the first terminal, where the second authorization information includes the authentication information input by the user to the second terminal;
    当所述第一授权信息与所述第一终端中预配置的授权信息相匹配,且所述第一授权信息或者所述预配置的授权信息与所述第二授权信息相匹配时,所述第一终端确定所述用户是所述授权用户。When the first authorization information matches the authorization information pre-configured in the first terminal, and the first authorization information or the pre-configured authorization information matches the second authorization information, the The first terminal determines that the user is the authorized user.
  16. 根据权利要求11至15任一所述的方法,其特征在于,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;The method according to any one of claims 11 to 15, wherein the management policy includes third information, and the third information is used to indicate the authorized user;
    所述第一终端通过所述认证终端对确认管理所述第一软件的用户进行认证之前,还包括:Before the first terminal authenticates the user confirming to manage the first software through the authentication terminal, the method further includes:
    所述第一终端根据所述管理策略中的所述第三信息确定所述授权用户。The first terminal determines the authorized user according to the third information in the management policy.
  17. 根据权利要求11至16任一所述的方法,其特征在于,所述第一终端接收管理通知消息之前,还包括:The method according to any one of claims 11 to 16, wherein before the first terminal receives the management notification message, the method further comprises:
    所述第一终端获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring, by the first terminal, the management policy set by the authorized user, and sending the management policy to the network device;
    或者所述第一终端接收来自所述网络设备的所述管理策略。Or the first terminal receives the management policy from the network device.
  18. 根据权利要求11至17任一所述的方法,其特征在于,所述第一终端为车载终端,所述第二终端为移动终端。The method according to any one of claims 11 to 17, wherein the first terminal is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
  19. 一种软件管理方法,其特征在于,包括:A software management method, characterized in that it comprises:
    第二终端接收所述管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The second terminal receives the management notification message; the management notification message is used to notify the management operation of the first software; the management operation includes updating the first software, installing the first software, and uninstalling the first software. Any item in the software;
    所述第二终端根据所述第一软件对应的管理策略确定认证终端包括所述第二终端时,对确认管理所述第一软件的用户进行认证;When the second terminal determines that the authentication terminal includes the second terminal according to the management policy corresponding to the first software, authenticate the user who is confirmed to manage the first software;
    当确定所述用户为管理所述第一软件的授权用户时,所述第二终端向第一终端发送所述用户输入的第二确认指示,所述第二确认指示用于指示所述用户通过所述第二终端确认对所述第一软件执行所述管理通知消息指示的所述管理操作。When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal, and the second confirmation instruction is used to instruct the user to pass The second terminal confirms that the management operation indicated by the management notification message is performed on the first software.
  20. 根据权利要求19所述的方法,其特征在于,所述第二终端确定所述用户为管理所述第一软件的授权用户,包括:The method according to claim 19, wherein the determining by the second terminal that the user is an authorized user who manages the first software comprises:
    所述第二终端获取所述用户在所述第二终端中输入的第二授权信息;所述第二授权信息包括所述用户输入至所述第二终端的认证信息;Acquiring, by the second terminal, second authorization information input by the user in the second terminal; the second authorization information includes authentication information input by the user to the second terminal;
    当所述第一授权信息与所述第二终端中预配置的授权信息相匹配时,所述第二终端确定所述用户是管理所述第一软件的所述授权用户。When the first authorization information matches the authorization information pre-configured in the second terminal, the second terminal determines that the user is the authorized user who manages the first software.
  21. 根据权利要求19或20所述的方法,其特征在于,所述方法还包括:The method according to claim 19 or 20, wherein the method further comprises:
    所述第二终端获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring, by the second terminal, the management policy set by the authorized user, and sending the management policy to the network device;
    或者所述第二终端接收来自所述网络设备的所述管理策略。Or the second terminal receives the management policy from the network device.
  22. 一种通信装置,其特征在于,包括:A communication device, characterized in that it comprises:
    通信单元,用于接收管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The communication unit is configured to receive management notification messages; the management notification messages are used to notify management operations of the first software; the management operations include updating the first software, installing the first software, and uninstalling the first software. Any item in the software;
    处理单元,用于根据所述第一软件对应的管理策略确定认证终端包括所述第一终端和第二终端时,通过所述认证终端对确认管理所述第一软件的用户进行认证;当确定所述用户为管理所述第一软件的授权用户,且获取到所述用户输入的第一确认指示,以及接收到来自所述第二终端的第二确认指示时,根据所述第一确认指示以及所述第二确认指示对所述第一软件执行所述管理通知消息指示的所述管理操作;The processing unit is configured to: when it is determined that the authentication terminal includes the first terminal and the second terminal according to the management policy corresponding to the first software, authenticate the user who confirms the management of the first software through the authentication terminal; When the user is an authorized user who manages the first software and obtains the first confirmation instruction input by the user and receives the second confirmation instruction from the second terminal, according to the first confirmation instruction And the second confirmation instruction to perform the management operation indicated by the management notification message on the first software;
    其中,所述第一确认指示用于指示所述用户确认对所述第一软件执行所述管理操作。The first confirmation instruction is used to instruct the user to confirm the execution of the management operation on the first software.
  23. 根据权利要求22所述的装置,其特征在于,所述管理策略包括第一信息,所述第一信息用于指示所述认证终端;The apparatus according to claim 22, wherein the management policy comprises first information, and the first information is used to indicate the authentication terminal;
    所述处理单元具体用于:The processing unit is specifically used for:
    所述第一终端根据所述第一软件对应的所述管理策略中的所述第一信息确定所述认证终端包括所述第一终端和所述第二终端。The first terminal determines, according to the first information in the management policy corresponding to the first software, that the authentication terminal includes the first terminal and the second terminal.
  24. 根据权利要求22至23任一所述的装置,其特征在于,所述管理策略包括第二信息,所述第二信息用于指示所述第一软件的授权模式;The device according to any one of claims 22 to 23, wherein the management policy comprises second information, and the second information is used to indicate the authorization mode of the first software;
    所述对确认管理所述第一软件的用户进行认证之前,所述处理单元还用于:Before the authentication of the user confirming the management of the first software, the processing unit is further configured to:
    根据所述管理策略中的所述第二信息确定所述第一软件的授权模式;Determining the authorization mode of the first software according to the second information in the management policy;
    根据所述授权模式确定需要通过所述认证终端对所述用户进行认证。It is determined according to the authorization mode that the user needs to be authenticated by the authentication terminal.
  25. 根据权利要求24所述的装置,其特征在于,所述授权模式包括第一模式和第二模式,所述第一模式为所述第一软件的每一次的管理操作都需要通过所述认证终端对所述用户进行认证;The device according to claim 24, wherein the authorization mode includes a first mode and a second mode, the first mode is that each management operation of the first software requires the authentication terminal Authenticate the user;
    所述第二模式为所述第一软件的第一次管理操作需要通过所述认证终端对所述用户进行认证,所述第一软件的第一次管理操作之后的管理操作不需要通过所述认证终端对所 述用户进行认证;The second mode is that the first management operation of the first software needs to authenticate the user through the authentication terminal, and the management operations after the first management operation of the first software do not need to pass the The authentication terminal authenticates the user;
    所述通过所述认证终端对确认管理所述第一软件的用户进行认证之前,所述处理单元还用于:Before the authentication of the user confirming the management of the first software through the authentication terminal, the processing unit is further configured to:
    当确定所述第一软件的授权模式为所述第一模式,或者确定所述第一软件的授权模式为第二模式,且所述第一软件为第一次管理操作时,确定需要通过所述认证终端对所述用户进行认证。When it is determined that the authorization mode of the first software is the first mode, or the authorization mode of the first software is determined to be the second mode, and the first software is the first management operation, it is determined that it needs to pass The authentication terminal authenticates the user.
  26. 根据权利要求22至25任一所述的装置,其特征在于,所述处理单元具体用于:The device according to any one of claims 22 to 25, wherein the processing unit is specifically configured to:
    获取所述用户在所述第一终端中输入的第一授权信息,并获取来自所述第二终端的第二授权信息;所述第一授权信息包括所述用户输入至所述第一终端的认证信息,所述第二授权信息包括所述用户输入至所述第二终端的认证信息;Obtain the first authorization information entered by the user in the first terminal, and obtain the second authorization information from the second terminal; the first authorization information includes the information entered by the user in the first terminal Authentication information, where the second authorization information includes authentication information input by the user to the second terminal;
    当所述第一授权信息与所述第一终端中预配置的授权信息相匹配,且所述第一授权信息或者所述预配置的授权信息与所述第二授权信息相匹配时,确定所述用户是所述授权用户。When the first authorization information matches the authorization information pre-configured in the first terminal, and the first authorization information or the pre-configured authorization information matches the second authorization information, it is determined The user is the authorized user.
  27. 根据权利要求22至26任一所述的装置,其特征在于,所述管理策略包括第三信息,所述第三信息用于指示所述授权用户;The device according to any one of claims 22 to 26, wherein the management policy includes third information, and the third information is used to indicate the authorized user;
    所述处理单元还用于:The processing unit is also used for:
    根据所述管理策略中的所述第三信息确定所述授权用户。The authorized user is determined according to the third information in the management policy.
  28. 根据权利要求22至27任一所述的装置,其特征在于,所述接收管理通知消息之前,所述通信单元还用于:The apparatus according to any one of claims 22 to 27, wherein before the receiving the management notification message, the communication unit is further configured to:
    获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring the management policy set by the authorized user, and sending the management policy to the network device;
    或者接收来自所述网络设备的所述管理策略。Or receive the management policy from the network device.
  29. 根据权利要求22至28任一所述的装置,其特征在于,所述通信装置为车载终端,所述第二终端为移动终端。The device according to any one of claims 22 to 28, wherein the communication device is a vehicle-mounted terminal, and the second terminal is a mobile terminal.
  30. 一种通信装置,其特征在于,包括:A communication device, characterized in that it comprises:
    通信单元,用于接收所述管理通知消息;所述管理通知消息用于通知对第一软件进行管理操作;所述管理操作包括更新所述第一软件、安装所述第一软件、卸载所述第一软件中的任一项;The communication unit is configured to receive the management notification message; the management notification message is used to notify the management operation of the first software; the management operation includes updating the first software, installing the first software, and uninstalling the first software. Any item in the first software;
    处理单元,用于根据所述第一软件对应的管理策略确定认证终端包括第二终端时,对确认管理所述第一软件的用户进行认证;A processing unit, configured to authenticate the user confirming to manage the first software when it is determined that the authentication terminal includes the second terminal according to the management policy corresponding to the first software;
    当确定所述用户为管理所述第一软件的授权用户时,所述第二终端向第一终端发送所述用户输入的第二确认指示,所述第二确认指示用于指示所述用户确认对所述第一软件执行所述管理通知消息指示的所述管理操作。When it is determined that the user is an authorized user who manages the first software, the second terminal sends a second confirmation instruction input by the user to the first terminal, and the second confirmation instruction is used to instruct the user to confirm Performing the management operation indicated by the management notification message on the first software.
  31. 根据权利要求30所述的装置,其特征在于,所述处理单元具体用于:The device according to claim 30, wherein the processing unit is specifically configured to:
    获取所述用户在所述第二终端中输入的第二授权信息;所述第二授权信息包括所述用户输入至所述第二终端的认证信息;Acquiring second authorization information entered by the user in the second terminal; the second authorization information includes authentication information entered by the user in the second terminal;
    当所述第一授权信息与所述第二终端中预配置的授权信息相匹配时,确定所述用户是管理所述第一软件的所述授权用户。When the first authorization information matches the authorization information pre-configured in the second terminal, it is determined that the user is the authorized user who manages the first software.
  32. 根据权利要求30或31所述的装置,其特征在于,所述通信单元还用于:The device according to claim 30 or 31, wherein the communication unit is further configured to:
    获取所述授权用户设置的所述管理策略,并向所述网络设备发送所述管理策略;Acquiring the management policy set by the authorized user, and sending the management policy to the network device;
    或者接收来自所述网络设备的所述管理策略。Or receive the management policy from the network device.
  33. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求11~18中任意一项所述的方法,或使得所述计算机执行如权利要求19~21中任意一项所述的方法。A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, and when the computer program runs on a computer, the computer executes any one of claims 11-18 The method, or the computer is caused to execute the method according to any one of claims 19-21.
  34. 一种通信装置,其特征在于,所述通信装置包括:A communication device, characterized in that, the communication device includes:
    通信接口,用于与其他装置进行通信;Communication interface, used to communicate with other devices;
    处理器,与所述通信接口耦合,使得所述通信装置执行如权利要求11~18中任意一项所述的方法,或使得所述通信装置执行如权利要求19~21中任意一项所述的方法。A processor, coupled with the communication interface, to enable the communication device to execute the method according to any one of claims 11 to 18, or to enable the communication device to execute the method according to any one of claims 19 to 21 Methods.
  35. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序,当所述计算机程序在计算机上运行时,使得计算机执行如权利要求11~18中任意一项所述的方法,或使得所述计算机执行如权利要求19~21中任意一项所述的方法。A computer program product, characterized in that the computer program product comprises a computer program, when the computer program runs on a computer, the computer is caused to execute the method according to any one of claims 11 to 18, or The computer executes the method according to any one of claims 19-21.
PCT/CN2020/111485 2019-12-19 2020-08-26 Software management method, apparatus and system WO2021120678A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911318704.2 2019-12-19
CN201911318704.2A CN113010893A (en) 2019-12-19 2019-12-19 Software management method, device and system

Publications (1)

Publication Number Publication Date
WO2021120678A1 true WO2021120678A1 (en) 2021-06-24

Family

ID=76382652

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/111485 WO2021120678A1 (en) 2019-12-19 2020-08-26 Software management method, apparatus and system

Country Status (2)

Country Link
CN (1) CN113010893A (en)
WO (1) WO2021120678A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662692A (en) * 2012-03-16 2012-09-12 北京经纬恒润科技有限公司 Method and system for updating application program in electronic control unit
CN105260198A (en) * 2014-07-09 2016-01-20 麦恩电子有限公司 Vehicle software update verification
US20180097804A1 (en) * 2016-10-03 2018-04-05 Gentex Corporation Driver identification and authentication systems and methods

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195991A (en) * 2011-06-28 2011-09-21 辽宁国兴科技有限公司 Terminal security management and authentication method and system
JP2017108274A (en) * 2015-12-09 2017-06-15 クラリオン株式会社 Information takeover system, on-vehicle terminal, and information takeover method
CN110167025B (en) * 2018-02-13 2021-01-29 华为技术有限公司 Communication method and communication device
CN108809969B (en) * 2018-05-30 2020-11-06 新华三技术有限公司 Authentication method, system and device
CN109766108A (en) * 2018-12-12 2019-05-17 北京梧桐车联科技有限责任公司 Vehicle terminal software upgrade-system, method and device
CN110290497B (en) * 2019-06-26 2023-03-31 广州小鹏汽车科技有限公司 Method and device for accessing vehicle-mounted terminal to network and vehicle

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662692A (en) * 2012-03-16 2012-09-12 北京经纬恒润科技有限公司 Method and system for updating application program in electronic control unit
CN105260198A (en) * 2014-07-09 2016-01-20 麦恩电子有限公司 Vehicle software update verification
US20180097804A1 (en) * 2016-10-03 2018-04-05 Gentex Corporation Driver identification and authentication systems and methods

Also Published As

Publication number Publication date
CN113010893A (en) 2021-06-22

Similar Documents

Publication Publication Date Title
EP3694179B1 (en) Proxy for access of a vehicle component
CN107650863B (en) Vehicle sharing method and system
US20200211301A1 (en) Repair management system for autonomous vehicle in a trusted platform
US10602360B2 (en) Secure mobile device integration with vehicles
US11777936B2 (en) Friend key sharing
US20170180330A1 (en) Method and electronic device for vehicle remote control and a non-transitory computer readable storage medium
US20150264017A1 (en) Secure vehicle data communications
KR20200135775A (en) Secure communication between electronic control units in the vehicle
CN110637328A (en) Vehicle access method based on portable equipment
CN109819049B (en) Method, system and device for remotely controlling vehicle
CN109040285B (en) Method and device for safety authentication of vehicle-mounted network, storage medium and vehicle
JP6696942B2 (en) Vehicle security system and vehicle security method
JP2016072675A (en) Management device, vehicle, management method and computer program
US10939296B2 (en) Vehicle smart connection
CN109905356B (en) System and method for directing tethered devices to onboard storage landing pages based on available credit or data balance
US11057195B2 (en) Method and system for providing security for the first time a mobile device makes contact with a device
CN113709695B (en) Authorization method and system for vehicle use
WO2019056971A1 (en) Authentication method and device
JP2014032667A (en) Method and system for authenticating user in remote access to at least one automobile system of automobile
CN112995403A (en) Vehicle control method and related device
US9471795B2 (en) System and method providing permission based access to automotive computers
WO2021120678A1 (en) Software management method, apparatus and system
CN112514323A (en) Electronic device for processing digital key and operation method thereof
CN110557256A (en) Temporary and customized vehicle access
CN115136625B (en) Vehicle-mounted system login method and related device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20901081

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20901081

Country of ref document: EP

Kind code of ref document: A1