Permission configuring method, device and system

A permission configuration and permission technology, applied in the field of network communication, can solve problems such as hidden dangers of UPnP device management security, and achieve the effect of improving management security

Inactive Publication Date: 2011-05-11
GLOBAL INNOVATION AGGREGATORS LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventor found that: the control point usually controls multiple UPnP devices, and when the self-signed certificate of the control point in a UPnP device is canceled, the UPnP device may also obtain the certificate from other devices. The self-signed certificate of the control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission configuring method, device and system
  • Permission configuring method, device and system
  • Permission configuring method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Embodiment 1, a rights configuration method. The flow of the method is attached figure 1 shown.

[0038] figure 1 , S100. Delete the authority corresponding to the control point identifier according to the received logout command, and store the logout information of the control point identifier. Storing the logout information identified by the control point means adding the logout information identified by the control point to the stored logout information. Before the logout information identified by the control point is added to the stored logout information, the stored logout information may be empty, or may contain logout information identified by other control points.

[0039] The logout command in S100 may be sent by the control point. Moreover, the control point identifier may be a self-signed certificate generated by the control point corresponding to the identifier, or may be a value obtained by calculating the self-signed certificate using a predetermined a...

Embodiment 2

[0056] Embodiment 2, a rights configuration method. The flow of the method is attached figure 2 shown.

[0057] figure 2 In S200, delete the authority corresponding to the control point identifier according to the received logout command, and store the logout information of the control point identifier. The control point identifier here may be referred to as a control point identifier to be canceled. Storing the logout information identified by the control point means adding the logout information identified by the control point to the stored logout information. Before the logout information identified by the control point is added to the stored logout information, the stored logout information may be empty, or may contain logout information identified by other control points.

[0058] A specific example of S200 is: the logout command carries information to be logged out and verification information, and the stored logout message includes the information to be logged out...

Embodiment 3

[0067] Embodiment 3, a rights configuration method. The following describes this embodiment by taking the execution subject as a control point as an example. The flow of the method is attached image 3 shown.

[0068] image 3 In S300, the control point acquires logout information of the control point identifier from the first controlled device. The cancellation information includes information to be canceled and verification information, and the verification information may include signature information of the information to be canceled.

[0069] A specific example for the control point to obtain the logout information identified by the control point from the first controlled device is: the control point sends a command to obtain logout information to the first controlled device, and after the first controlled device receives the command to obtain logout information, Obtain the logout information of the control point from the stored information, and return the logout info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a permission configuring method, device and system, wherein the permission configuring method comprises the steps of: deleting a permission corresponding to a control point identification according to a received logout command, and adding logout information of the control point identification in stored logout information; and when the permission is allocated for the control point identification to be allocated with the permission and the logout information of the control point identification to be allocated with the permission exists in the stored logout information, not allocating the permission for the control point identification to be allocated with the permission. With the technical scheme, wrongly re-allocating the permission for the control point identification after the permission corresponding to the control point identification is deleted can be avoided, and the management safety of controlled equipment can be improved.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to the authority configuration technology. Background technique [0002] Universal Plug and Play (Universal Plug and Play, UPnP) technology can enable home network devices to realize intercommunication and control, that is, a digital home network can be realized by using the UPnP technology. The home network device may include a control point and a UPnP device. The control point reads the state and control information of the UPnP device by using a control command of the UPnP protocol, and controls the UPnP device to perform corresponding operations. [0003] UPnP technology provides security management services. UPnP devices can authenticate control points based on self-signed certificates generated by the control points themselves to verify the access rights of control points. UPnP devices only allow control points with access rights to manage them. [0004] In some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06H04L9/32
Inventor 张钦亮吴黄伟方平朱萸
Owner GLOBAL INNOVATION AGGREGATORS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products