CN102638796A - Authentication modification and allocation method and system - Google Patents
Authentication modification and allocation method and system Download PDFInfo
- Publication number
- CN102638796A CN102638796A CN2011100362600A CN201110036260A CN102638796A CN 102638796 A CN102638796 A CN 102638796A CN 2011100362600 A CN2011100362600 A CN 2011100362600A CN 201110036260 A CN201110036260 A CN 201110036260A CN 102638796 A CN102638796 A CN 102638796A
- Authority
- CN
- China
- Prior art keywords
- authorization authentication
- user
- change configuration
- authorization
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000012986 modification Methods 0.000 title claims abstract description 9
- 230000004048 modification Effects 0.000 title claims abstract description 9
- 238000013475 authorization Methods 0.000 claims description 194
- 230000008859 change Effects 0.000 claims description 173
- 238000012545 processing Methods 0.000 claims description 23
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 230000003993 interaction Effects 0.000 abstract description 6
- 230000007246 mechanism Effects 0.000 abstract description 6
- 230000006870 function Effects 0.000 description 15
- 238000012508 change request Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000036772 blood pressure Effects 0.000 description 1
- 230000036760 body temperature Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides an authentication modification and allocation method and system, which are applied in a home information machine. The method comprises the steps of: setting different priorities for authentications of different modules and users; determining modules and users needing to be modified and allocated, and the belonged priorities of the modules and users; and conducting modification and allocation of authentication information of all the modules and users in the priorities. The authentication modification and allocation method and system conduct uniform modification and allocation to all the modules and users included in each priority through setting the priority of authentication, thus avoiding that all the modules and users need to initiate modification and allocation request when the authentication is modified and allocated, effectively reducing the information interaction times and time delay when the authentication is modified and allocated, and further reducing the complexity of the authentication modification and allocation mechanism in the home gateway.
Description
Technical Field
The present invention relates to mobile communication technologies, and in particular, to a method and a system for changing configuration of authorization authentication.
Background
The household information machine is a household information terminal which is pushed out in the third generation mobile communication technology (3G) era, is an information terminal system which integrates multiple functions of a mobile phone, a telephone, information, broadband, household security and the like, and achieves the effect of integrating basic conversation, information service, broadband service, household security and intelligent household control; the 3G wireless network must be able to support different data transmission speeds, that is, at least 2Mbps (megabyte per second), 384kbps (kilobyte per second), and 144kbps in indoor, outdoor, and vehicular environments, respectively, referred to in the industry as "broadband in cell phone".
Wherein, the telephone function means: can dial and answer the phone, receive and send the message; the 3G family information terminal is similar to a 3G mobile phone which can be placed at home, and can enjoy the same functions as the 3G mobile phone after a 3G number Subscriber Identity Module (SIM) card is inserted; the internet access function is as follows: with the expansion of the mobile 3G network, the bandwidth and the speed are improved, so that the wireless internet video browsing is easier and faster; the security function means: after the door magnet and the infrared detector are installed, the wireless remote security function can be realized. When conditions such as theft invasion, accidental fire or gas leakage occur, the family information machine sends alarm information to a preset mobile phone, so that a master can timely learn and process the alarm information. The family information machine can also shoot a real-time video picture at home according to the instruction of the owner and send the real-time video picture to the mobile phone of the owner for later evidence collection; the video monitoring function means: the condition at home can be watched anytime and anywhere; the intelligent home functions are: the household remote control function can be realized; the terminal can freely control any electrical equipment in the family through the wireless remote control head and the wireless intelligent switch arranged at each corner of the family, so as to carry out various operations such as changing television channels, adjusting air conditioner temperature or switching on and off room lamps. Meanwhile, the master can continue to control the switches of various household electrical appliances by editing the short messages; telemedicine functions refer to: the patient can transmit the conditions of blood pressure, body temperature and the like to a corresponding platform of a hospital through a home information terminal for remote medical treatment; the study and entertainment functions are as follows: english learning, game playing, mp4, digital photo frame, photo taking and other functions; other functions refer to: the functions of stock investment, entrance guard talkback, property management and the like can be realized.
However, when the authorization authentication is changed and configured, each module and user in the home information machine need to initiate a change and configuration request, so that the number of times and time delay of information interaction during the authorization authentication change and configuration are increased, and further, the complexity of an authorization authentication change and configuration mechanism in the home information machine is increased.
Disclosure of Invention
In order to solve the technical problem, the invention provides a change configuration method and a system of authorization authentication, which are used for reducing the information interaction times and time delay during the change and configuration of the authorization authentication, and further reducing the complexity of an authorization authentication change and configuration mechanism in a home information machine.
The invention provides a change configuration method of authorization authentication, which is applied to a home information machine and comprises the following steps:
setting different priorities for authorization authentication of different modules and users;
determining a module and a user needing to change configuration and the priority of the module and the user; and
and changing and configuring the authorization authentication information of all modules and users in the priority.
Preferably, the above change configuration method for authorization authentication may have the following features:
after the setting of different priorities for the authorization authentication of different modules and users, and before determining the modules and users needing to change configuration, the method further comprises:
actively sending an authorization authentication change configuration request; or,
and after receiving the sent authorization authentication change configuration request, sending the authorization authentication change configuration request.
Preferably, the above change configuration method for authorization authentication may further have the following features:
the actively sending the authorization authentication change configuration request comprises:
the family information machine initiates an authorization authentication change configuration request to the module and the user; or
The module initiates an authorization authentication change configuration request to the user.
Preferably, the above change configuration method for authorization authentication may further have the following features:
the receiving the authorization authentication change configuration request comprises:
the family information machine receives an authorization authentication change configuration request sent by a user and a module; or
The module receives an authorization authentication change configuration request sent by a user.
Preferably, the above change configuration method for authorization authentication may further have the following features:
if the family information machine initiates an authorization authentication change configuration request to the module and the user, or the family information machine receives the authorization authentication change configuration request sent by the user and the module; then said changing configures the authorization authentication information of all modules and users in said priority including:
the home information machine configures the authorization and authentication information of the home information machine according to priority change, and sends the authorization and authentication change configuration information to all modules and users in the priority;
all the modules and the user receive the authorization authentication change configuration information and reconfigure respective authorization authentication information;
if the module initiates an authorization authentication change configuration request to a user, or the module receives an authorization authentication change configuration request sent by the user, the authorization authentication information of all modules and users in the change configuration priority comprises:
the module changes and configures the authorization authentication information of the module according to the priority and sends the authorization authentication change configuration information to the user in the priority;
and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
The invention also provides a change configuration system of authorization authentication, which is applied to the family information machine, and the system comprises:
setting means for setting different priorities for authorization authentication of different modules and users;
the device comprises a determining device, a judging device and a judging device, wherein the determining device is used for determining a module and a user which need to change configuration and the priority of the module and the user; and
and the change configuration device is used for changing and configuring the authorization authentication information of all the modules and the users in the priority.
Preferably, the above authorization-authenticated change configuration system may have the following features:
the system further comprises:
the processing device is used for actively sending an authorization authentication change configuration request after the setting device sets different priorities for authorization authentication of different modules and users and before the determined configuration determines the module and the user needing to change the configuration; or after receiving the transmitted authorization authentication change configuration request, transmitting the authorization authentication change configuration request.
Preferably, the above authorization-authenticated change configuration system may further have the following features:
the processing device is further used for initiating an active authorization authentication change configuration request to the module and the user; or initiating a proactive authorization authentication change configuration request to the user.
Preferably, the above authorization-authenticated change configuration system may further have the following features:
the processing device is further used for receiving a passive authorization authentication change configuration request sent by a user and a module; or receiving a passive authorization authentication change configuration request sent by a user.
Preferably, the above authorization-authenticated change configuration system may further have the following features:
if the processing device initiates an authorization authentication change configuration request to the module and the user, or the processing device receives the authorization authentication change configuration request sent by the user and the module; the change configuration device is further configured to change and configure the authorization authentication information of the change configuration device according to the priority, and send the authorization authentication change configuration information to all modules and users in the priority; all the modules and the user receive the authorization authentication change configuration information and reconfigure respective authorization authentication information; or
If the processing device initiates an authorization authentication change configuration request to the user, or the processing device receives an authorization authentication change configuration request sent by the user, the change configuration device is further used for changing and configuring the authorization authentication information of the processing device according to the priority and sending the authorization authentication change configuration information to the user in the priority; and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
According to the change configuration method and the system for the authorization authentication, the authorization authentication priority is set, all modules and users included in each priority are uniformly changed and configured, so that the condition that each module and each user need to initiate a change and configuration request when the authorization authentication is changed and configured is avoided, the information interaction times and time delay when the authorization authentication is changed and configured are effectively reduced, and the complexity of an authorization authentication change and configuration mechanism in a home information machine is further reduced.
Drawings
FIG. 1 is a flow chart of an embodiment of a method for changing configuration of authorization authentication according to the present invention;
FIG. 2 is a schematic structural diagram of an embodiment of a change configuration system for authorization authentication according to the present invention.
Detailed Description
The invention is described in further detail below with reference to the following figures and examples:
the invention provides a change configuration method of authorization authentication, which comprises the following steps:
setting different priorities for authorization authentication of different modules and users;
determining a module and a user needing to change configuration and the priority of the module and the user; and
and changing and configuring the authorization authentication information of all modules and users in the priority.
In addition, after the different priorities are set for the authorization authentication of different modules and users, before the modules and users needing to change configuration are determined, the method further comprises the following steps:
actively sending an authorization authentication change configuration request; or,
and after receiving the sent authorization authentication change configuration request, sending the authorization authentication change configuration request.
The change configuration of the authorization authentication in the home information machine comprises two types, namely an active authorization authentication change configuration initiated from the home information machine, the module to the user or the home information machine to the module; the second is a bottom-up mode, that is, the passive authorization authentication from the user or the module to the home information machine or from the user to the module changes the configuration.
The authorization authentication can be dynamically changed and configured based on the priority in the household information machine.
Fig. 1 is a flowchart of an embodiment of a method for changing configuration of authorization authentication according to the present invention, where the method includes:
101, setting priorities for authorization authentication of different modules and users by the home information machine;
the home information machine sets priorities for authorization authentication of different modules, for example, the priorities are divided from high to low according to functions of different modules such as basic call, information service, broadband service, home security, smart home control and the like, but not limited to the above;
the module refers to a functional module in the home information machine; the authorization authentication of the household information machine on different modules and users means that the household information machine carries out authorization authentication on which functional modules can be used by different users;
the family information machine can preset the number of the authorization authentication priority levels and the authorization authentication content included in each priority level; the authorization authentication priority may be divided into different levels, for example, the level of priority may be divided into: n stages, N = 1, 2, … …, N; n is the number of priorities, and N is the number of preset priorities; wherein, it is assumed that the authorized authentication change and configuration priority represented by the priority level when N = 1 is the highest, and the authorized authentication change and configuration priority represented by the priority level when N = N is the lowest;
103, the module and the user send authorization authentication change and configuration requests to the home information machine, wherein the requests comprise the module and the user which need to be changed and configured;
105, the home information machine and the module change and reconfigure the authorization and authentication information of the home information machine and the module according to the authorization and authentication priority;
if the home information machine sends a configuration change request of active authorization authentication to the module and the user, the steps may be: the family information machine sends authorization authentication change and configuration information to the module and the user;
if the module sends a proactive authorization authentication change configuration request to the user, the steps may be: the module sends authorization authentication change and configuration information to the user;
if the home information machine receiving module and the passive authorization authentication change configuration request sent by the user, the steps may be: the family information machine sends authorization authentication change and configuration information to the module and the user;
if the module receives a passive authorization authentication change configuration request sent by a user, the steps may be: the module sends authorization authentication change and configuration information to the user;
step 107, the module and the user receive the authorization authentication change and configuration information and reconfigure the respective authorization authentication information; or the user receives the authorization authentication change and configuration information and reconfigures the authorization authentication information of the user;
According to the change configuration method of the authorization authentication, the modules and the users related to the authorization authentication content are classified by setting the authorization authentication priority, all the modules and the users included in each priority are uniformly changed and configured during changing and configuring, so that the change and configuration requests of each module and each user are avoided when the authorization authentication is changed and configured, the information interaction times and time delay during the change and configuration of the authorization authentication are effectively reduced, and the complexity of an authorization authentication change and configuration mechanism in a home information machine is further reduced.
As shown in fig. 2, which is a schematic structural diagram of an embodiment of the change configuration system for authorization authentication of the present invention, the system includes a setting device 21, a determining device 22 and a change configuration device 23, wherein: the setting device is used for setting different priorities for authorization authentication of different modules and users; the determining device is used for determining the module and the user needing to change the configuration and the priority of the module and the user; and the change configuration device is used for changing and configuring the authorization authentication information of all the modules and the users in the priority.
In addition, the system may further include a processing device 24, configured to actively send an authorization authentication change configuration request after the setting device sets different priorities for authorization authentications of different modules and users and before the determining configuration determines the module and the user that need to change configuration; or after receiving the transmitted authorization authentication change configuration request, transmitting the authorization authentication change configuration request.
Wherein, the processing device can be further used for initiating a configuration change request of active authorization authentication to the module and the user; or initiating a proactive authorization authentication change configuration request to the user. The processing device can be further used for receiving a passive authorization authentication change configuration request sent by a user and a module; or receiving a passive authorization authentication change configuration request sent by a user.
Preferably, if the processing device initiates an authorization authentication change configuration request to the module or the user, or the processing device receives an authorization authentication change configuration request sent by the user or the module; the change configuration device is further configured to change and configure the authorization authentication information of the change configuration device according to the priority, and send the authorization authentication change configuration information to all modules and users in the priority; and the all modules and the user receive the authorization authentication change configuration information and reconfigure the respective authorization authentication information.
Preferably, if the processing device initiates an authorization authentication change configuration request to the user, or the processing device receives an authorization authentication change configuration request sent by the user, the change configuration device is further configured to change and configure authorization authentication information of itself according to the priority, and send the authorization authentication change configuration information to the user in the priority; and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
The above-mentioned authorization-authentication change configuration system may be located in the home information machine, and the process of implementing the authorization-authentication change configuration by the authorization-authentication change configuration system may be referred to in fig. 1, and is not described herein again.
According to the change configuration system of the authorization authentication, the modules and the users related to the authorization authentication content are classified by setting the authorization authentication priority, and all the modules and the users included in each priority are uniformly changed and configured during changing and configuring, so that the change and configuration requests of each module and each user are avoided when the authorization authentication is changed and configured, the information interaction times and time delay during the change and configuration of the authorization authentication are effectively reduced, and the complexity of an authorization authentication change and configuration mechanism in a home information machine is further reduced.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing the relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, and the like. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module/unit in the above embodiments may be implemented in the form of hardware, and may also be implemented in the form of a software functional module. The present invention is not limited to any specific form of combination of hardware and software.
The above embodiments are merely to illustrate the technical solutions of the present invention and not to limit the present invention, and the present invention has been described in detail with reference to the preferred embodiments. It will be understood by those skilled in the art that various modifications and equivalent arrangements may be made without departing from the spirit and scope of the present invention and it should be understood that the present invention is to be covered by the appended claims.
Claims (10)
1. A modification configuration method of authorization authentication is applied to a home information machine, and the method comprises the following steps:
setting different priorities for authorization authentication of different modules and users;
determining a module and a user needing to change configuration and the priority of the module and the user; and
and changing and configuring the authorization authentication information of all modules and users in the priority.
2. The authorization-authenticated change-configuration method according to claim 1, wherein:
after the setting of different priorities for the authorization authentication of different modules and users, and before determining the modules and users needing to change configuration, the method further comprises:
actively sending an authorization authentication change configuration request; or,
and after receiving the sent authorization authentication change configuration request, sending the authorization authentication change configuration request.
3. The authorization-authenticated change-configuration method according to claim 2, wherein:
the actively sending the authorization authentication change configuration request comprises:
the family information machine initiates an authorization authentication change configuration request to the module and the user; or
The module initiates an authorization authentication change configuration request to the user.
4. The authorization-authenticated change-configuration method according to claim 2, wherein:
the receiving the authorization authentication change configuration request comprises:
the family information machine receives an authorization authentication change configuration request sent by a user and a module; or
The module receives an authorization authentication change configuration request sent by a user.
5. The authorization-authenticated change-configuration method according to claim 4, wherein:
if the family information machine initiates an authorization authentication change configuration request to the module and the user, or the family information machine receives the authorization authentication change configuration request sent by the user and the module; then said changing configures the authorization authentication information of all modules and users in said priority including:
the home information machine configures the authorization and authentication information of the home information machine according to priority change, and sends the authorization and authentication change configuration information to all modules and users in the priority;
all the modules and the user receive the authorization authentication change configuration information and reconfigure respective authorization authentication information;
if the module initiates an authorization authentication change configuration request to a user, or the module receives an authorization authentication change configuration request sent by the user, the authorization authentication information of all modules and users in the change configuration priority comprises:
the module changes and configures the authorization authentication information of the module according to the priority and sends the authorization authentication change configuration information to the user in the priority;
and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
6. An authorized change configuration system applied to a home information machine, the system comprising:
setting means for setting different priorities for authorization authentication of different modules and users;
the device comprises a determining device, a judging device and a judging device, wherein the determining device is used for determining a module and a user which need to change configuration and the priority of the module and the user; and
and the change configuration device is used for changing and configuring the authorization authentication information of all the modules and the users in the priority.
7. The authorized change configuration system according to claim 6, wherein:
the system further comprises:
the processing device is used for actively sending an authorization authentication change configuration request after the setting device sets different priorities for authorization authentication of different modules and users and before the determined configuration determines the module and the user needing to change the configuration; or after receiving the transmitted authorization authentication change configuration request, transmitting the authorization authentication change configuration request.
8. The authorized change configuration system according to claim 7, wherein:
the processing device is further used for initiating an active authorization authentication change configuration request to the module and the user; or initiating a proactive authorization authentication change configuration request to the user.
9. The authorized change configuration system according to claim 7, wherein:
the processing device is further used for receiving a passive authorization authentication change configuration request sent by a user and a module; or receiving a passive authorization authentication change configuration request sent by a user.
10. The authorized change configuration system according to claim 9, wherein:
if the processing device initiates an authorization authentication change configuration request to the module and the user, or the processing device receives the authorization authentication change configuration request sent by the user and the module; the change configuration device is further configured to change and configure the authorization authentication information of the change configuration device according to the priority, and send the authorization authentication change configuration information to all modules and users in the priority; all the modules and the user receive the authorization authentication change configuration information and reconfigure respective authorization authentication information; or
If the processing device initiates an authorization authentication change configuration request to the user, or the processing device receives an authorization authentication change configuration request sent by the user, the change configuration device is further used for changing and configuring the authorization authentication information of the processing device according to the priority and sending the authorization authentication change configuration information to the user in the priority; and the user receives the authorization authentication change configuration information and reconfigures the authorization authentication information of the user.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100362600A CN102638796A (en) | 2011-02-11 | 2011-02-11 | Authentication modification and allocation method and system |
PCT/CN2011/081187 WO2012106958A1 (en) | 2011-02-11 | 2011-10-24 | Modification and configuration method and system for authorization authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100362600A CN102638796A (en) | 2011-02-11 | 2011-02-11 | Authentication modification and allocation method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102638796A true CN102638796A (en) | 2012-08-15 |
Family
ID=46622987
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100362600A Pending CN102638796A (en) | 2011-02-11 | 2011-02-11 | Authentication modification and allocation method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102638796A (en) |
WO (1) | WO2012106958A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114024742A (en) * | 2021-11-03 | 2022-02-08 | 北京天融信网络安全技术有限公司 | Authorization management method, device, device and storage medium |
CN114172732A (en) * | 2021-12-09 | 2022-03-11 | 北京数字众智科技有限公司 | Authentication switching method and device, electronic equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040243808A1 (en) * | 2002-04-15 | 2004-12-02 | Ryuji Ishiguro | Information processing device, method, and program |
CN101159618A (en) * | 2007-11-23 | 2008-04-09 | 杭州华三通信技术有限公司 | A permission configuration method and device |
CN101951403A (en) * | 2010-09-16 | 2011-01-19 | 中兴通讯股份有限公司 | Classification-based centralized authentication and authorization method in information terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100583781C (en) * | 2006-10-10 | 2010-01-20 | 中山大学 | Apparatus and method for controlling digital household electrical appliance use authority by family members |
CN101364894A (en) * | 2008-09-24 | 2009-02-11 | 金蝶软件(中国)有限公司 | Authority range setting method, workflow providing method and apparatus based on the method |
-
2011
- 2011-02-11 CN CN2011100362600A patent/CN102638796A/en active Pending
- 2011-10-24 WO PCT/CN2011/081187 patent/WO2012106958A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040243808A1 (en) * | 2002-04-15 | 2004-12-02 | Ryuji Ishiguro | Information processing device, method, and program |
CN101159618A (en) * | 2007-11-23 | 2008-04-09 | 杭州华三通信技术有限公司 | A permission configuration method and device |
CN101951403A (en) * | 2010-09-16 | 2011-01-19 | 中兴通讯股份有限公司 | Classification-based centralized authentication and authorization method in information terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114024742A (en) * | 2021-11-03 | 2022-02-08 | 北京天融信网络安全技术有限公司 | Authorization management method, device, device and storage medium |
CN114172732A (en) * | 2021-12-09 | 2022-03-11 | 北京数字众智科技有限公司 | Authentication switching method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2012106958A1 (en) | 2012-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11096223B2 (en) | Methods and apparatuses for requesting system information | |
CN109076552B (en) | Channel monitoring method, device, system and storage medium | |
CN100438624C (en) | Wireless method and system of monitoring and controlling video based on mobile communication platform in third generation | |
CN104581442B (en) | A kind of method and device for realizing terminal WIFI intercommunication | |
US20180054854A1 (en) | Wireless communication device and wireless communication method | |
CN103249047A (en) | Wireless local area network hotspot access authentication method and device | |
CN103260003A (en) | Intelligent household video doorphone system and communication method thereof | |
CN108713346B (en) | Channel monitoring method, device, system and storage medium | |
CN109328482B (en) | Control instruction transmission method, base station, terminal and storage medium | |
CN106792823A (en) | A kind of terminal connection method and device based on Miracast | |
CN105530108A (en) | Information push method and apparatus | |
CN107223359A (en) | Method, device, user equipment and the base station configured for channel carrier wave | |
CN102638796A (en) | Authentication modification and allocation method and system | |
CN117941451A (en) | Processing method, communication device and storage medium | |
CN109314969A (en) | Transmission configuration method, apparatus, equipment, system and storage medium | |
CN109743538A (en) | Monitor video checks control method | |
CN101808298A (en) | Method for transmitting prompt language and terminal | |
CN117354472A (en) | Multi-network scheduling camera based on eSIM technology | |
WO2017028568A1 (en) | Smart apparatus control method and device utilizing same | |
WO2012034377A1 (en) | Classification-based centralized authentication and authorization method in information terminal | |
CN102638850B (en) | Information feedback method and system | |
CN113342370B (en) | Configuration updating method and device, electronic equipment and storage medium | |
CN113093561A (en) | Door equipment control method and device, storage medium and electronic device | |
CN103905859A (en) | Television control system and method | |
US20090247194A1 (en) | System and method for transmitting messages between a platform and a set of terminals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120815 |