Method, device and system for assigning permissions

A permission configuration and permission technology, applied in the field of network communication, can solve the problems of cumbersome operation of UPnP device reconfiguration, different access permission configuration information, etc., and achieve the effect of simplifying the reconfiguration process

Inactive Publication Date: 2011-04-20
GLOBAL INNOVATION AGGREGATORS LLC
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventor found that: the control point usually controls multiple UPnP devices, and the access rights of the control point for different UPnP devices are likely to be different, therefore, the control point sends to multiple UPnP devices separately The access rights configuration information carried in the command is likely to be different, so it is very cumbersome to reconfigure the access rights configuration information of multiple UPnP devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for assigning permissions
  • Method, device and system for assigning permissions
  • Method, device and system for assigning permissions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Embodiment 1, a rights configuration method. The flow of the method is attached figure 1 shown.

[0041] figure 1 , S100. Receive a command carrying mapping information and verification information.

[0042] The command carrying the mapping information and verification information in S100 may be sent from the control point.

[0043] The mapping information in S100 includes the first control point identifier and the second control point identifier of the same control point, that is, the first control point identifier and the second control point identifier are two different identifiers of the same control point, and Not two identities for different control points. A specific example of mapping information is: the first control point identifier may be a new identifier of a control point, and the new identifier of a control point may be called a new control point identifier; the second control point identifier may be an old identifier of the control point, and the The...

Embodiment 2

[0063] Embodiment 2, a rights configuration method. The flow of the method is attached figure 2 shown.

[0064] figure 2 , S200. Determine mapping information and verification information of the mapping information.

[0065] The mapping information in S200 includes the first control point identifier and the second control point identifier of the same control point, and the verification information includes signature information of the above mapping information.

[0066] In S200, the two self-signed certificates generated by a control point can be used as the first control point identifier and the second control point identifier, or the two self-signed certificates generated by a predetermined algorithm for a control point can be calculated separately The obtained values ​​are used as the first control point identifier and the second control point identifier. This embodiment does not limit the specific implementation manner of determining the mapping information.

[0067...

Embodiment 3

[0076] Embodiment 3, a rights configuration method. The following describes this embodiment by taking the execution subject as a control point as an example. The flow of the method is attached image 3 shown.

[0077] image 3 In S300, the control point sends a command to acquire control point mapping information to the first controlled device. The control point that invokes the command to acquire control point mapping information should have corresponding authority, for example, the control point has public authority for the first controlled device. The permission of the control point to call the command to obtain the mapping information of the control point can be set according to actual needs. In this embodiment, the specific authority that the control point that sends the command to obtain the mapping information of the control point should have is not limited.

[0078] The acquire control point mapping information command sent in S300 may acquire the mapping informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system for assigning permissions. The method comprises the following steps of: receiving a command carrying mapping information and verifying information, wherein the mapping information comprises a first control point identifier and a second control point identifier of the same control point; authenticating the mapping information according to the verifying information; and after the mapping information passes the authentication, setting the first control point identifier to succeed to the permission of the second control point identifier. When the technical scheme is implemented, controlled equipment allows the first control point identifier to succeed to the permission of the second control point identifier conveniently when the control point identifiers are updated, and thus, the reconfiguration process of permission configuration information is simplified.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to the authority configuration technology. Background technique [0002] Universal Plug and Play (Universal Plug and Play, UPnP) technology can enable home network devices to realize intercommunication and control, that is, a digital home network can be realized by using the UPnP technology. The home network device may include a control point and a UPnP device. The control point reads the state and control information of the UPnP device by using a control command of the UPnP protocol, and controls the UPnP device to perform corresponding operations. [0003] UPnP technology provides security management services. UPnP devices can authenticate control points based on self-signed certificates generated by the control points themselves to verify the access rights of control points. UPnP devices only allow control points with access rights to manage them. [0004] In some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 张钦亮吴黄伟方平朱萸
Owner GLOBAL INNOVATION AGGREGATORS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products