Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for controlling authority of mobile equipment under different conditions

A technology of mobile devices and permissions, which is applied in the direction of instruments, time registers, and individual input/output registers, etc., and can solve problems such as mobile device permission settings

Inactive Publication Date: 2012-09-12
李凯
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to solve the problem of setting mobile device permissions under different conditions in the process of existing mobile devices controlling external devices, the present invention provides a method for limiting external device permissions for different external conditions and different time periods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for controlling authority of mobile equipment under different conditions
  • Method for controlling authority of mobile equipment under different conditions

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0024] Example 1: In the simplest locking system, the key cooperates with the key to let the key perform a certain action, and the locking system enters the state of no audit, that is: any key can pass, and after passing , the locking system will also record the key. When connecting for the second time, the mobile device without administrator authority can use the same key as the first time to connect with the locking system and control the locking system. In this way, a mobile device without administrator rights has obtained an "invisible key" with no specific shape, color, and intangibility.

example 2

[0025] Example 2: In a complex centrally managed access control system, the rights of a mobile device without administrator rights are implanted through a device with management rights, that is, a mobile device without administrator rights is connected to a device with administrator rights. Connection, the device with administrator rights sends a key that can be recognized by the access control system to the mobile device without administrator rights, and the mobile device without administrator rights can control some functions of the access control system by using this key (open , off, etc.).

example 3

[0026] Example 3: In hotels, hotels, schools, companies, etc., the device with administrator privileges also assigns information including time intervals and environmental parameters in the key to mobile devices without administrator privileges, such as: When a passenger checks into a certain hotel and has paid a one-day deposit, the front desk of the hotel will require the customer's mobile device (such as a mobile phone, tablet, etc.) to connect to the hotel's computer system (a device with administrator authority), and then, The computer at the front desk of the hotel (a device with administrator authority) will send a key to the customer's mobile device (such as a mobile phone, a tablet, etc.), and the key is specially encrypted and stored in the customer's mobile device (such as a mobile phone, a tablet, etc.) computer, etc.).

[0027] Step 2: Device connection. A mobile device without administrator rights passes through step 1, which is equivalent to obtaining an "invis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for controlling the authority of mobile equipment under different conditions. The method comprises the following steps of: adding a group of components for detecting external environment into external equipment to sense surrounding environment in real time; adding a time module into a control chip of the external equipment to record time; and setting the conditions and the time by the external equipment with administrator authority, wherein when the components for detecting the external environment determine that the current external environment cannot be in accordance with a standard which is set by the external equipment with the administrator authority, a control instruction of the external equipment is refused even if the mobile equipment with control authority controls the external equipment.

Description

technical field [0001] The method for controlling mobile device permissions under different conditions is applied to the field of mobile device management and control of external devices when the mobile device controls external devices, especially when the mobile device controls external devices. According to different conditions, different mobile devices , to set different permission fields. Background technique [0002] In the prior art, there is already a perfect method for controlling external devices through mobile devices. The control process includes processes such as PIN code verification, dynamic password verification, data verification, and command verification. There have been solutions to the problem, and therefore, the method for the mobile device to control the external device belongs to the existing known technology. [0003] In the process of mobile devices controlling external devices, different permissions need to be set for different mobile devices. In th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 李凯
Owner 李凯
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products