[go: up one dir, main page]

CN102638796A - Authentication modification and allocation method and system - Google Patents

Authentication modification and allocation method and system Download PDF

Info

Publication number
CN102638796A
CN102638796A CN2011100362600A CN201110036260A CN102638796A CN 102638796 A CN102638796 A CN 102638796A CN 2011100362600 A CN2011100362600 A CN 2011100362600A CN 201110036260 A CN201110036260 A CN 201110036260A CN 102638796 A CN102638796 A CN 102638796A
Authority
CN
China
Prior art keywords
authorization authentication
user
change configuration
authorization
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100362600A
Other languages
Chinese (zh)
Inventor
魏巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2011100362600A priority Critical patent/CN102638796A/en
Priority to PCT/CN2011/081187 priority patent/WO2012106958A1/en
Publication of CN102638796A publication Critical patent/CN102638796A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an authentication modification and allocation method and system, which are applied in a home information machine. The method comprises the steps of: setting different priorities for authentications of different modules and users; determining modules and users needing to be modified and allocated, and the belonged priorities of the modules and users; and conducting modification and allocation of authentication information of all the modules and users in the priorities. The authentication modification and allocation method and system conduct uniform modification and allocation to all the modules and users included in each priority through setting the priority of authentication, thus avoiding that all the modules and users need to initiate modification and allocation request when the authentication is modified and allocated, effectively reducing the information interaction times and time delay when the authentication is modified and allocated, and further reducing the complexity of the authentication modification and allocation mechanism in the home gateway.

Description

Authorization authentication change configuration method and system
Technical Field
The present invention relates to mobile communication technologies, and in particular, to a method and a system for changing configuration of authorization authentication.
Background
The household information machine is a household information terminal which is pushed out in the third generation mobile communication technology (3G) era, is an information terminal system which integrates multiple functions of a mobile phone, a telephone, information, broadband, household security and the like, and achieves the effect of integrating basic conversation, information service, broadband service, household security and intelligent household control; the 3G wireless network must be able to support different data transmission speeds, that is, at least 2Mbps (megabyte per second), 384kbps (kilobyte per second), and 144kbps in indoor, outdoor, and vehicular environments, respectively, referred to in the industry as "broadband in cell phone".
Wherein, the telephone function means: can dial and answer the phone, receive and send the message; the 3G family information terminal is similar to a 3G mobile phone which can be placed at home, and can enjoy the same functions as the 3G mobile phone after a 3G number Subscriber Identity Module (SIM) card is inserted; the internet access function is as follows: with the expansion of the mobile 3G network, the bandwidth and the speed are improved, so that the wireless internet video browsing is easier and faster; the security function means: after the door magnet and the infrared detector are installed, the wireless remote security function can be realized. When conditions such as theft invasion, accidental fire or gas leakage occur, the family information machine sends alarm information to a preset mobile phone, so that a master can timely learn and process the alarm information. The family information machine can also shoot a real-time video picture at home according to the instruction of the owner and send the real-time video picture to the mobile phone of the owner for later evidence collection; the video monitoring function means: the condition at home can be watched anytime and anywhere; the intelligent home functions are: the household remote control function can be realized; the terminal can freely control any electrical equipment in the family through the wireless remote control head and the wireless intelligent switch arranged at each corner of the family, so as to carry out various operations such as changing television channels, adjusting air conditioner temperature or switching on and off room lamps. Meanwhile, the master can continue to control the switches of various household electrical appliances by editing the short messages; telemedicine functions refer to: the patient can transmit the conditions of blood pressure, body temperature and the like to a corresponding platform of a hospital through a home information terminal for remote medical treatment; the study and entertainment functions are as follows: english learning, game playing, mp4, digital photo frame, photo taking and other functions; other functions refer to: the functions of stock investment, entrance guard talkback, property management and the like can be realized.
However, when the authorization authentication is changed and configured, each module and user in the home information machine need to initiate a change and configuration request, so that the number of times and time delay of information interaction during the authorization authentication change and configuration are increased, and further, the complexity of an authorization authentication change and configuration mechanism in the home information machine is increased.
Disclosure of Invention
In order to solve the technical problem, the invention provides a change configuration method and a system of authorization authentication, which are used for reducing the information interaction times and time delay during the change and configuration of the authorization authentication, and further reducing the complexity of an authorization authentication change and configuration mechanism in a home information machine.
The invention provides a change configuration method of authorization authentication, which is applied to a home information machine and comprises the following steps:
setting different priorities for authorization authentication of different modules and users;
determining a module and a user needing to change configuration and the priority of the module and the user; and
and changing and configuring the authorization authentication information of all modules and users in the priority.
Preferably, the above change configuration method for authorization authentication may have the following features:
after the setting of different priorities for the authorization authentication of different modules and users, and before determining the modules and users needing to change configuration, the method further comprises:
actively sending an authorization authentication change configuration request; or,
and after receiving the sent authorization authentication change configuration request, sending the authorization authentication change configuration request.
Preferably, the above change configuration method for authorization authentication may further have the following features:
the actively sending the authorization authentication change configuration request comprises:
the family information machine initiates an authorization authentication change configuration request to the module and the user; or
The module initiates an authorization authentication change configuration request to the user.
Preferably, the above change configuration method for authorization authentication may further have the following features:
the receiving the authorization authentication change configuration request comprises:
the family information machine receives an authorization authentication change configuration request sent by a user and a module; or
The module receives an authorization authentication change configuration request sent by a user.
Preferably, the above change configuration method for authorization authentication may further have the following features:
if the family information machine initiates an authorization authentication change configuration request to the module and the user, or the family information machine receives the authorization authentication change configuration request sent by the user and the module; then said changing configures the authorization authentication information of all modules and users in said priority including:
the home information machine configures the authorization and authentication information of the home information machine according to priority change, and sends the authorization and authentication change configuration information to all modules and users in the priority;
all the modules and the user receive the authorization authentication change configuration information and reconfigure respective authorization authentication information;
if the module initiates an authorization authentication change configuration request to a user, or the module receives an authorization authentication change configuration request sent by the user, the authorization authentication information of all modules and users in the change configuration priority comprises:
the module changes and configures the authorization authentication information of the module according to the priority and sends the authorization authentication change configuration information to the user in the priority;
and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
The invention also provides a change configuration system of authorization authentication, which is applied to the family information machine, and the system comprises:
setting means for setting different priorities for authorization authentication of different modules and users;
the device comprises a determining device, a judging device and a judging device, wherein the determining device is used for determining a module and a user which need to change configuration and the priority of the module and the user; and
and the change configuration device is used for changing and configuring the authorization authentication information of all the modules and the users in the priority.
Preferably, the above authorization-authenticated change configuration system may have the following features:
the system further comprises:
the processing device is used for actively sending an authorization authentication change configuration request after the setting device sets different priorities for authorization authentication of different modules and users and before the determined configuration determines the module and the user needing to change the configuration; or after receiving the transmitted authorization authentication change configuration request, transmitting the authorization authentication change configuration request.
Preferably, the above authorization-authenticated change configuration system may further have the following features:
the processing device is further used for initiating an active authorization authentication change configuration request to the module and the user; or initiating a proactive authorization authentication change configuration request to the user.
Preferably, the above authorization-authenticated change configuration system may further have the following features:
the processing device is further used for receiving a passive authorization authentication change configuration request sent by a user and a module; or receiving a passive authorization authentication change configuration request sent by a user.
Preferably, the above authorization-authenticated change configuration system may further have the following features:
if the processing device initiates an authorization authentication change configuration request to the module and the user, or the processing device receives the authorization authentication change configuration request sent by the user and the module; the change configuration device is further configured to change and configure the authorization authentication information of the change configuration device according to the priority, and send the authorization authentication change configuration information to all modules and users in the priority; all the modules and the user receive the authorization authentication change configuration information and reconfigure respective authorization authentication information; or
If the processing device initiates an authorization authentication change configuration request to the user, or the processing device receives an authorization authentication change configuration request sent by the user, the change configuration device is further used for changing and configuring the authorization authentication information of the processing device according to the priority and sending the authorization authentication change configuration information to the user in the priority; and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
According to the change configuration method and the system for the authorization authentication, the authorization authentication priority is set, all modules and users included in each priority are uniformly changed and configured, so that the condition that each module and each user need to initiate a change and configuration request when the authorization authentication is changed and configured is avoided, the information interaction times and time delay when the authorization authentication is changed and configured are effectively reduced, and the complexity of an authorization authentication change and configuration mechanism in a home information machine is further reduced.
Drawings
FIG. 1 is a flow chart of an embodiment of a method for changing configuration of authorization authentication according to the present invention;
FIG. 2 is a schematic structural diagram of an embodiment of a change configuration system for authorization authentication according to the present invention.
Detailed Description
The invention is described in further detail below with reference to the following figures and examples:
the invention provides a change configuration method of authorization authentication, which comprises the following steps:
setting different priorities for authorization authentication of different modules and users;
determining a module and a user needing to change configuration and the priority of the module and the user; and
and changing and configuring the authorization authentication information of all modules and users in the priority.
In addition, after the different priorities are set for the authorization authentication of different modules and users, before the modules and users needing to change configuration are determined, the method further comprises the following steps:
actively sending an authorization authentication change configuration request; or,
and after receiving the sent authorization authentication change configuration request, sending the authorization authentication change configuration request.
The change configuration of the authorization authentication in the home information machine comprises two types, namely an active authorization authentication change configuration initiated from the home information machine, the module to the user or the home information machine to the module; the second is a bottom-up mode, that is, the passive authorization authentication from the user or the module to the home information machine or from the user to the module changes the configuration.
The authorization authentication can be dynamically changed and configured based on the priority in the household information machine.
Fig. 1 is a flowchart of an embodiment of a method for changing configuration of authorization authentication according to the present invention, where the method includes:
101, setting priorities for authorization authentication of different modules and users by the home information machine;
the home information machine sets priorities for authorization authentication of different modules, for example, the priorities are divided from high to low according to functions of different modules such as basic call, information service, broadband service, home security, smart home control and the like, but not limited to the above;
the module refers to a functional module in the home information machine; the authorization authentication of the household information machine on different modules and users means that the household information machine carries out authorization authentication on which functional modules can be used by different users;
the family information machine can preset the number of the authorization authentication priority levels and the authorization authentication content included in each priority level; the authorization authentication priority may be divided into different levels, for example, the level of priority may be divided into: n stages, N = 1, 2, … …, N; n is the number of priorities, and N is the number of preset priorities; wherein, it is assumed that the authorized authentication change and configuration priority represented by the priority level when N = 1 is the highest, and the authorized authentication change and configuration priority represented by the priority level when N = N is the lowest;
step 102, when the authentication is a passive type, the method goes to step 103, otherwise, the method goes to step 104;
103, the module and the user send authorization authentication change and configuration requests to the home information machine, wherein the requests comprise the module and the user which need to be changed and configured;
step 104, the family information machine determines that modules and users related to configuration need to be dynamically changed, and classifies the modules and the users according to preset priority;
105, the home information machine and the module change and reconfigure the authorization and authentication information of the home information machine and the module according to the authorization and authentication priority;
step 106, the family information machine sends authorization authentication change and configuration information to the module, the user or the module to the user, wherein the authorization authentication change and configuration information comprises a new authorization authentication module and a new authorization authentication user;
if the home information machine sends a configuration change request of active authorization authentication to the module and the user, the steps may be: the family information machine sends authorization authentication change and configuration information to the module and the user;
if the module sends a proactive authorization authentication change configuration request to the user, the steps may be: the module sends authorization authentication change and configuration information to the user;
if the home information machine receiving module and the passive authorization authentication change configuration request sent by the user, the steps may be: the family information machine sends authorization authentication change and configuration information to the module and the user;
if the module receives a passive authorization authentication change configuration request sent by a user, the steps may be: the module sends authorization authentication change and configuration information to the user;
step 107, the module and the user receive the authorization authentication change and configuration information and reconfigure the respective authorization authentication information; or the user receives the authorization authentication change and configuration information and reconfigures the authorization authentication information of the user;
step 108, the module and the user send the confirmation completion message of the authorization authentication change and configuration to the home information machine, or the user sends the confirmation completion message of the authorization authentication change and configuration to the module to complete the change and configuration of the authorization authentication.
According to the change configuration method of the authorization authentication, the modules and the users related to the authorization authentication content are classified by setting the authorization authentication priority, all the modules and the users included in each priority are uniformly changed and configured during changing and configuring, so that the change and configuration requests of each module and each user are avoided when the authorization authentication is changed and configured, the information interaction times and time delay during the change and configuration of the authorization authentication are effectively reduced, and the complexity of an authorization authentication change and configuration mechanism in a home information machine is further reduced.
As shown in fig. 2, which is a schematic structural diagram of an embodiment of the change configuration system for authorization authentication of the present invention, the system includes a setting device 21, a determining device 22 and a change configuration device 23, wherein: the setting device is used for setting different priorities for authorization authentication of different modules and users; the determining device is used for determining the module and the user needing to change the configuration and the priority of the module and the user; and the change configuration device is used for changing and configuring the authorization authentication information of all the modules and the users in the priority.
In addition, the system may further include a processing device 24, configured to actively send an authorization authentication change configuration request after the setting device sets different priorities for authorization authentications of different modules and users and before the determining configuration determines the module and the user that need to change configuration; or after receiving the transmitted authorization authentication change configuration request, transmitting the authorization authentication change configuration request.
Wherein, the processing device can be further used for initiating a configuration change request of active authorization authentication to the module and the user; or initiating a proactive authorization authentication change configuration request to the user. The processing device can be further used for receiving a passive authorization authentication change configuration request sent by a user and a module; or receiving a passive authorization authentication change configuration request sent by a user.
Preferably, if the processing device initiates an authorization authentication change configuration request to the module or the user, or the processing device receives an authorization authentication change configuration request sent by the user or the module; the change configuration device is further configured to change and configure the authorization authentication information of the change configuration device according to the priority, and send the authorization authentication change configuration information to all modules and users in the priority; and the all modules and the user receive the authorization authentication change configuration information and reconfigure the respective authorization authentication information.
Preferably, if the processing device initiates an authorization authentication change configuration request to the user, or the processing device receives an authorization authentication change configuration request sent by the user, the change configuration device is further configured to change and configure authorization authentication information of itself according to the priority, and send the authorization authentication change configuration information to the user in the priority; and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
The above-mentioned authorization-authentication change configuration system may be located in the home information machine, and the process of implementing the authorization-authentication change configuration by the authorization-authentication change configuration system may be referred to in fig. 1, and is not described herein again.
According to the change configuration system of the authorization authentication, the modules and the users related to the authorization authentication content are classified by setting the authorization authentication priority, and all the modules and the users included in each priority are uniformly changed and configured during changing and configuring, so that the change and configuration requests of each module and each user are avoided when the authorization authentication is changed and configured, the information interaction times and time delay during the change and configuration of the authorization authentication are effectively reduced, and the complexity of an authorization authentication change and configuration mechanism in a home information machine is further reduced.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing the relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, and the like. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module/unit in the above embodiments may be implemented in the form of hardware, and may also be implemented in the form of a software functional module. The present invention is not limited to any specific form of combination of hardware and software.
The above embodiments are merely to illustrate the technical solutions of the present invention and not to limit the present invention, and the present invention has been described in detail with reference to the preferred embodiments. It will be understood by those skilled in the art that various modifications and equivalent arrangements may be made without departing from the spirit and scope of the present invention and it should be understood that the present invention is to be covered by the appended claims.

Claims (10)

1. A modification configuration method of authorization authentication is applied to a home information machine, and the method comprises the following steps:
setting different priorities for authorization authentication of different modules and users;
determining a module and a user needing to change configuration and the priority of the module and the user; and
and changing and configuring the authorization authentication information of all modules and users in the priority.
2. The authorization-authenticated change-configuration method according to claim 1, wherein:
after the setting of different priorities for the authorization authentication of different modules and users, and before determining the modules and users needing to change configuration, the method further comprises:
actively sending an authorization authentication change configuration request; or,
and after receiving the sent authorization authentication change configuration request, sending the authorization authentication change configuration request.
3. The authorization-authenticated change-configuration method according to claim 2, wherein:
the actively sending the authorization authentication change configuration request comprises:
the family information machine initiates an authorization authentication change configuration request to the module and the user; or
The module initiates an authorization authentication change configuration request to the user.
4. The authorization-authenticated change-configuration method according to claim 2, wherein:
the receiving the authorization authentication change configuration request comprises:
the family information machine receives an authorization authentication change configuration request sent by a user and a module; or
The module receives an authorization authentication change configuration request sent by a user.
5. The authorization-authenticated change-configuration method according to claim 4, wherein:
if the family information machine initiates an authorization authentication change configuration request to the module and the user, or the family information machine receives the authorization authentication change configuration request sent by the user and the module; then said changing configures the authorization authentication information of all modules and users in said priority including:
the home information machine configures the authorization and authentication information of the home information machine according to priority change, and sends the authorization and authentication change configuration information to all modules and users in the priority;
all the modules and the user receive the authorization authentication change configuration information and reconfigure respective authorization authentication information;
if the module initiates an authorization authentication change configuration request to a user, or the module receives an authorization authentication change configuration request sent by the user, the authorization authentication information of all modules and users in the change configuration priority comprises:
the module changes and configures the authorization authentication information of the module according to the priority and sends the authorization authentication change configuration information to the user in the priority;
and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
6. An authorized change configuration system applied to a home information machine, the system comprising:
setting means for setting different priorities for authorization authentication of different modules and users;
the device comprises a determining device, a judging device and a judging device, wherein the determining device is used for determining a module and a user which need to change configuration and the priority of the module and the user; and
and the change configuration device is used for changing and configuring the authorization authentication information of all the modules and the users in the priority.
7. The authorized change configuration system according to claim 6, wherein:
the system further comprises:
the processing device is used for actively sending an authorization authentication change configuration request after the setting device sets different priorities for authorization authentication of different modules and users and before the determined configuration determines the module and the user needing to change the configuration; or after receiving the transmitted authorization authentication change configuration request, transmitting the authorization authentication change configuration request.
8. The authorized change configuration system according to claim 7, wherein:
the processing device is further used for initiating an active authorization authentication change configuration request to the module and the user; or initiating a proactive authorization authentication change configuration request to the user.
9. The authorized change configuration system according to claim 7, wherein:
the processing device is further used for receiving a passive authorization authentication change configuration request sent by a user and a module; or receiving a passive authorization authentication change configuration request sent by a user.
10. The authorized change configuration system according to claim 9, wherein:
if the processing device initiates an authorization authentication change configuration request to the module and the user, or the processing device receives the authorization authentication change configuration request sent by the user and the module; the change configuration device is further configured to change and configure the authorization authentication information of the change configuration device according to the priority, and send the authorization authentication change configuration information to all modules and users in the priority; all the modules and the user receive the authorization authentication change configuration information and reconfigure respective authorization authentication information; or
If the processing device initiates an authorization authentication change configuration request to the user, or the processing device receives an authorization authentication change configuration request sent by the user, the change configuration device is further used for changing and configuring the authorization authentication information of the processing device according to the priority and sending the authorization authentication change configuration information to the user in the priority; and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
CN2011100362600A 2011-02-11 2011-02-11 Authentication modification and allocation method and system Pending CN102638796A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2011100362600A CN102638796A (en) 2011-02-11 2011-02-11 Authentication modification and allocation method and system
PCT/CN2011/081187 WO2012106958A1 (en) 2011-02-11 2011-10-24 Modification and configuration method and system for authorization authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100362600A CN102638796A (en) 2011-02-11 2011-02-11 Authentication modification and allocation method and system

Publications (1)

Publication Number Publication Date
CN102638796A true CN102638796A (en) 2012-08-15

Family

ID=46622987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100362600A Pending CN102638796A (en) 2011-02-11 2011-02-11 Authentication modification and allocation method and system

Country Status (2)

Country Link
CN (1) CN102638796A (en)
WO (1) WO2012106958A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114024742A (en) * 2021-11-03 2022-02-08 北京天融信网络安全技术有限公司 Authorization management method, device, device and storage medium
CN114172732A (en) * 2021-12-09 2022-03-11 北京数字众智科技有限公司 Authentication switching method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040243808A1 (en) * 2002-04-15 2004-12-02 Ryuji Ishiguro Information processing device, method, and program
CN101159618A (en) * 2007-11-23 2008-04-09 杭州华三通信技术有限公司 A permission configuration method and device
CN101951403A (en) * 2010-09-16 2011-01-19 中兴通讯股份有限公司 Classification-based centralized authentication and authorization method in information terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100583781C (en) * 2006-10-10 2010-01-20 中山大学 Apparatus and method for controlling digital household electrical appliance use authority by family members
CN101364894A (en) * 2008-09-24 2009-02-11 金蝶软件(中国)有限公司 Authority range setting method, workflow providing method and apparatus based on the method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040243808A1 (en) * 2002-04-15 2004-12-02 Ryuji Ishiguro Information processing device, method, and program
CN101159618A (en) * 2007-11-23 2008-04-09 杭州华三通信技术有限公司 A permission configuration method and device
CN101951403A (en) * 2010-09-16 2011-01-19 中兴通讯股份有限公司 Classification-based centralized authentication and authorization method in information terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114024742A (en) * 2021-11-03 2022-02-08 北京天融信网络安全技术有限公司 Authorization management method, device, device and storage medium
CN114172732A (en) * 2021-12-09 2022-03-11 北京数字众智科技有限公司 Authentication switching method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2012106958A1 (en) 2012-08-16

Similar Documents

Publication Publication Date Title
US11096223B2 (en) Methods and apparatuses for requesting system information
CN109076552B (en) Channel monitoring method, device, system and storage medium
CN100438624C (en) Wireless method and system of monitoring and controlling video based on mobile communication platform in third generation
CN104581442B (en) A kind of method and device for realizing terminal WIFI intercommunication
US20180054854A1 (en) Wireless communication device and wireless communication method
CN103249047A (en) Wireless local area network hotspot access authentication method and device
CN103260003A (en) Intelligent household video doorphone system and communication method thereof
CN108713346B (en) Channel monitoring method, device, system and storage medium
CN109328482B (en) Control instruction transmission method, base station, terminal and storage medium
CN106792823A (en) A kind of terminal connection method and device based on Miracast
CN105530108A (en) Information push method and apparatus
CN107223359A (en) Method, device, user equipment and the base station configured for channel carrier wave
CN102638796A (en) Authentication modification and allocation method and system
CN117941451A (en) Processing method, communication device and storage medium
CN109314969A (en) Transmission configuration method, apparatus, equipment, system and storage medium
CN109743538A (en) Monitor video checks control method
CN101808298A (en) Method for transmitting prompt language and terminal
CN117354472A (en) Multi-network scheduling camera based on eSIM technology
WO2017028568A1 (en) Smart apparatus control method and device utilizing same
WO2012034377A1 (en) Classification-based centralized authentication and authorization method in information terminal
CN102638850B (en) Information feedback method and system
CN113342370B (en) Configuration updating method and device, electronic equipment and storage medium
CN113093561A (en) Door equipment control method and device, storage medium and electronic device
CN103905859A (en) Television control system and method
US20090247194A1 (en) System and method for transmitting messages between a platform and a set of terminals

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120815