Method, device and system for assigning permissions

A technology of rights configuration and rights allocation, applied in the field of network communication, can solve the problems of cumbersome operation of reconfiguration of UPnP devices, different access rights configuration information, etc., to achieve the effect of simplifying the reconfiguration process

Inactive Publication Date: 2015-05-27
GLOBAL INNOVATION AGGREGATORS LLC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventor found that: the control point usually controls multiple UPnP devices, and the access rights of the control point for different UPnP devices are likely to be different, therefore, the control point sends to multiple UPnP devices separately The access rights configuration information carried in the command is likely to be different, so it is very cumbersome to reconfigure the access rights configuration information of multiple UPnP devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for assigning permissions
  • Method, device and system for assigning permissions
  • Method, device and system for assigning permissions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] The first embodiment is a permission configuration method. The process of the method is attached figure 1 Shown.

[0041] figure 1 In S100, receiving a command carrying mapping information and verification information.

[0042] The command carrying mapping information and verification information in S100 may be sent by the control point.

[0043] The mapping information in S100 includes the first control point identifier and the second control point identifier of the same control point, that is, the first control point identifier and the second control point identifier are two different identifiers of the same control point, and Not two identifications for different control points. A specific example of the mapping information is: the first control point identifier may be a new identifier of the control point, and the new identifier of the control point may be called a new control point identifier; the second control point identifier may be the old identifier of the control ...

Embodiment 2

[0063] The second embodiment is the permission configuration method. The process of this method is attached figure 2 Shown.

[0064] figure 2 In S200, the mapping information and the verification information of the mapping information are determined.

[0065] The mapping information in S200 includes the first control point identifier and the second control point identifier of the same control point, and the verification information includes signature information of the foregoing mapping information.

[0066] In S200, two self-signed certificates generated by one control point can be used as the first control point identifier and the second control point identifier, or two self-signed certificates generated by a predetermined algorithm for one control point can be calculated separately. The obtained values ​​are used as the first control point identification and the second control point identification. This embodiment does not limit the specific implementation manner of determinin...

Embodiment 3

[0076] The third embodiment is the permission configuration method. Hereinafter, this embodiment will be described by taking the execution subject as the control point as an example. The process of this method is attached image 3 Shown.

[0077] image 3 In S300, the control point sends a command to acquire control point mapping information to the first controlled device. The control point that invokes the command to obtain the control point mapping information should have corresponding authority, for example, the control point has public authority for the first controlled device. The authority of the control point to call the command to obtain the control point mapping information can be set according to actual needs. This embodiment may not limit the specific authority that the control point that sends the command to obtain the control point mapping information should have.

[0078] The acquiring control point mapping information command sent in S300 can acquire the mapping i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system for assigning permissions. The method comprises the following steps of: receiving a command carrying mapping information and verifying information, wherein the mapping information comprises a first control point identifier and a second control point identifier of the same control point; authenticating the mapping information according to the verifying information; and after the mapping information passes the authentication, setting the first control point identifier to succeed to the permission of the second control point identifier. When the technical scheme is implemented, controlled equipment allows the first control point identifier to succeed to the permission of the second control point identifier conveniently when the control point identifiers are updated, and thus, the reconfiguration process of permission configuration information is simplified.

Description

Technical field [0001] The present invention relates to the field of network communication technology, in particular to permission configuration technology. Background technique [0002] Universal Plug and Play (UPnP) technology can enable home network devices to achieve intercommunication and control, that is, use UPnP technology to implement a digital home network. The home network device may include a control point and a UPnP device. The control point uses the control command of the UPnP protocol to read the status and control information of the UPnP device, and controls the UPnP device to perform corresponding operations. [0003] UPnP technology provides security management services. UPnP devices can authenticate control points based on self-signed certificates generated by the control points to verify their access rights. UPnP devices only allow control points with access rights to manage them. [0004] In some cases, such as restoring the factory configuration of the control ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 张钦亮吴黄伟方平朱萸
Owner GLOBAL INNOVATION AGGREGATORS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products