Method and terminal for setting permission of application and controlling restricted region

A technology of limited area and authority, applied in electrical components, transmission systems, digital data authentication, etc., can solve the problems of easy operation by others, misoperation, malicious operation terminal high-value applications, etc.

Active Publication Date: 2013-02-20
周万荣
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] On the other hand, because smart phones and tablet terminals are very powerful, there are many types of applications, such as communication applications, audio and video playback applications, mobile payment, and remote control. Some types of applications have high value, especially mobile payment, remot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal for setting permission of application and controlling restricted region
  • Method and terminal for setting permission of application and controlling restricted region
  • Method and terminal for setting permission of application and controlling restricted region

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to facilitate the understanding of the present invention, specific examples will be given below for further description.

[0045] The first embodiment of the present invention provides a method for setting application permission and controlling a limited area, such as figure 1 As shown, the steps are as follows:

[0046] In step S101, two-way communication is established with the regional server through the regional identification code in advance, and the packaged application sent by the regional server is received.

[0047]Step S102, generate a human-computer interaction interface corresponding to the member identification code according to the authority association relationship between the packaged application, the member identification code of each user in the multi-user, and the corresponding operation authority. The human-computer interaction interface includes at least one icon, the icon Used to identify regional mobile terminals, controlled devices and / ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and terminal for setting permission of an application and controlling a restricted region. The method disclosed by the invention comprises the following steps of: establishing bidirectional communication in advance by virtue of a region identification code and a region server, receiving an encapsulation application sent by the region server, and generating a human-computer interaction interface corresponding to a member identification code according to the encapsulation application and authority association between the member identification code of each member of multiple members and corresponding operating authorization; calling the corresponding human-computer interaction interface according to the member identification code input by the user, and controlling the region mobile terminal and/or controlled equipment of an icon identification in the human-computer interaction interface; or calling the encapsulation application of the icon identification in the human-computer interaction interface and controlling the region mobile terminal and/or controlled equipment corresponding to the encapsulation application. Communication is established by virtue of the region identification code and the restricted region while the encapsulation application is synchronized, and further authority association stored locally is combined, so that authority management for controlling the terminals in the restricted region by multiple users is realized.

Description

technical field [0001] The invention relates to the field of intelligent control management, in particular to a method and a terminal for setting application authority and controlling a limited area. Background technique [0002] The rapid development of information technology has resulted in the emergence of many new products and equipment, which not only provide people with better entertainment and online experience, but also provide people with more convenient application scenarios, such as mobile payment, such as remote shopping, such as based on M2M (Machine-to-Machine: device-to-device) remote IoT control management. Tablet PC is one of the typical representatives. Taking a tablet computer as an example, because its portability is poorer than that of a mobile terminal, but its visual experience and operating experience are significantly better than that of a mobile terminal, so the application scenarios are more in relatively fixed places, such as limited areas of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31H04L29/08
Inventor 周万荣
Owner 周万荣
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products