Method, system and device for implementing information locking
A technology of information locking and attribute information, which is used in security devices, transmission systems, wireless communications, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0100] figure 2 It is a schematic diagram of the device management tree of the mobile terminal. Such as figure 2 As shown, the device management tree includes node A, node X, node Y, node X1 to node X7, and the lock node Lock, unlock node Unlock, server identification node ServerID, lock mode node Mode, and lock granularity node Granularity are set in the management. For simplicity of description, this embodiment abstracts the nodes in the device management tree into node A, node X, node X1 to node X7, and node Y. In practical applications, what is the structure of the device management tree, and which nodes can be represented by The user decides by himself, as long as the DMS and the mobile terminal agree in advance. Such as image 3 As shown, that is: node A is the root node (Interior Node), and X1~X7 are ID nodes, name (Name) nodes, description (Description), data (Data), operations (Operations), status (Status) nodes, etc. , the definition of its nodes is the same as...
Embodiment 2
[0187] This embodiment adopts the indicator node mode; the device management tree of this embodiment is similar to the device management tree in Embodiment 1, the only difference is that the Lock node and the Unlock node are indicator nodes, and the description of the Lock node and the Unlock node is shown in Table 8 Show:
[0188] Node: X / X5 / LockOr Unlock
[0189] Tree Occurrence format Minimum Access Types (Min.Access Types) 1 (one) Boolean get
[0190] table eight
[0191] In addition, in this embodiment, the mobile terminal will monitor the Lock node in real time.
[0192] Figure 5 is a flowchart of this embodiment. Such as Figure 5 As shown, the method for realizing locking in this embodiment includes the following steps:
[0193] Step 501: DMS sends a locking message to the mobile terminal, the locking message carries DMS identification, locking mode, indication information and locking object information, and ...
Embodiment 3
[0222] In this embodiment, the locking is implemented by means of tags. Image 6 is the flow chart of this embodiment, such as Image 6 As shown, this embodiment includes the following steps:
[0223] Step 601: The DMS sends a locking message carrying locking mode and locking object information to the mobile terminal, and the locking object information includes destination node path information and locking granularity.
[0224] In this embodiment, the locking message can be extended on the basis of the DM protocol, and its format is as follows:
[0225]
[0226] 1
[0227]
[0228]
[0229] . / A / X / X5
[0230]
[0231]
[0232] Read-Lock
[0233] Component
[0234]
[0235] Step 602: The mobile terminal modifies the attribute information of the locked object according to the locking mode and locking granularity in the locking message.
[0236] Similar to Embodiment 1 and Embodiment 2, the attribute ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 