Method and device for configuring client and terminal equipment

文档序号:1851060 发布日期:2021-11-16 浏览:8次 中文

阅读说明:本技术 一种配置客户端的方法及装置、终端设备 (Method and device for configuring client and terminal equipment ) 是由 张军 于 2019-08-28 设计创作,主要内容包括:本申请实施例提供一种配置客户端的方法及装置、终端设备,该方法包括:客户端从第一配置设备获取第一配置信息,基于所述第一配置信息配置所述客户端的安全资源,其中,被配置的所述安全资源至少关联所述第一配置信息;所述客户端从第二配置设备获取第二配置信息,基于所述第二配置信息配置所述客户端的所述安全资源,其中,被配置的所述安全资源至少关联所述第一配置信息和所述第二配置信息。(The embodiment of the application provides a method and a device for configuring a client and a terminal device, wherein the method comprises the following steps: a client acquires first configuration information from first configuration equipment, and configures a security resource of the client based on the first configuration information, wherein the configured security resource is at least associated with the first configuration information; the client acquires second configuration information from a second configuration device, and configures the secure resource of the client based on the second configuration information, wherein the configured secure resource at least relates to the first configuration information and the second configuration information.)

A method of configuring a client, the method comprising:

a client acquires first configuration information from first configuration equipment, and configures a security resource of the client based on the first configuration information, wherein the configured security resource is at least associated with the first configuration information;

the client acquires second configuration information from a second configuration device, and configures the secure resource of the client based on the second configuration information, wherein the configured secure resource at least relates to the first configuration information and the second configuration information.

The method of claim 1, wherein the secure resource comprises a first resource, the first resource being a master-related resource; the first resource has a first attribute and a second attribute; wherein the content of the first and second substances,

the first attribute is used for representing an equipment owner identification, and the first attribute supports a plurality of values;

the second attribute is used for representing a resource owner identifier, and the second attribute supports multiple values.

The method of claim 2, wherein the first configuration information carries a first device identifier of the first configuration device, and the second configuration information carries a second device identifier of the second configuration device;

the configured secure resource associates at least the first configuration information and the second configuration information, including:

the value of the first attribute of the first resource at least comprises a first value and a second value, and the value of the second attribute of the first resource at least comprises a first value and a second value;

the first value is the first device identifier, and the second value is the second device identifier.

The method of any of claims 1-3, wherein the secure resource comprises a second resource, the second resource being a credential-related resource; the second resource has a third attribute and a fourth attribute; wherein the content of the first and second substances,

the third attribute is used for representing voucher content;

the fourth attribute is used for representing a resource owner identifier, and the fourth attribute supports multiple values.

The method of claim 4, wherein the first configuration information carries a first device identifier of the first configuration device, and the second configuration information carries a second device identifier of the second configuration device;

the configured secure resource associates at least the first configuration information and the second configuration information, including:

the value of the fourth attribute of the second resource at least comprises a first value and a second value;

the first value is the first device identifier, and the second value is the second device identifier.

The method of any of claims 1 to 5, wherein the client obtains first configuration information from a first configuration device, and configures secure resources of the client based on the first configuration information, comprising:

the client sends a first configuration request message to the first configuration device, wherein the first configuration request message is used for requesting the first configuration device to configure the security resource of the client;

the client receives at least one of a first configuration signaling, a second configuration signaling, a third configuration signaling and a fourth configuration signaling sent by the first configuration device, where the first configuration signaling is used to configure a first attribute of a first resource of the client, the second configuration signaling is used to configure a second attribute of the first resource of the client, the third configuration signaling is used to configure a fourth attribute of a second resource of the client, and the fourth configuration signaling is used to configure a third attribute of the second resource of the client.

The method of any of claims 1 to 5, wherein the client obtains first configuration information from a first configuration device, and configures secure resources of the client based on the first configuration information, comprising:

the client sends a second configuration request message to the first configuration device, wherein the second configuration request message is used for requesting configuration parameters from the first configuration device;

the client receives a first configuration parameter sent by the first configuration device, and configures at least one of a first attribute of a first resource of the client, a second attribute of the first resource of the client, a fourth attribute of a second resource of the client and a third attribute of the second resource of the client based on the first configuration parameter.

The method according to claim 7, wherein the second configuration request message carries a third device identifier of the client, and the third device identifier is used by the first configuration device to determine the first configuration parameter corresponding to the client.

The method of claim 7 or 8, wherein the first configuration parameter comprises at least one of: a first device identification of the first configuration device, first credential content.

The method of any of claims 1 to 9, wherein the client obtains second configuration information from a second configuration device, and configures secure resources of the client based on the second configuration information, comprising:

the client sends a third configuration request message to the second configuration device, wherein the third configuration request message is used for requesting the second configuration device to configure the security resource of the client;

the client receives at least one of a fifth configuration signaling, a sixth configuration signaling, a seventh configuration signaling, and an eighth configuration signaling sent by the second configuration device, where the fifth configuration signaling is used to configure a first attribute of a first resource of the client, the sixth configuration signaling is used to configure a second attribute of the first resource of the client, the seventh configuration signaling is used to configure a fourth attribute of a second resource of the client, and the eighth configuration signaling is used to configure a third attribute of the second resource of the client.

The method of any of claims 1 to 9, wherein the client obtains second configuration information from a second configuration device, and configures secure resources of the client based on the second configuration information, comprising:

the client sends a fourth configuration request message to the second configuration device, wherein the fourth configuration request message is used for requesting configuration parameters from the second configuration device;

and the client receives a second configuration parameter sent by the second configuration device, and configures at least one of the first attribute of the first resource of the client, the second attribute of the first resource of the client, the fourth attribute of the second resource of the client and the third attribute of the second resource of the client based on the second configuration parameter.

The method according to claim 11, wherein the fourth configuration request message carries a third device identifier of the client, and the third device identifier is used by the second configuration device to determine a second configuration parameter corresponding to the client.

The method of claim 11 or 12, wherein the second configuration parameter comprises at least one of: a second device identification of the second configuration device, second credential content.

A method of configuring a client, the method comprising:

a client acquires first configuration information from first configuration equipment, and configures a first security resource of the client based on the first configuration information, wherein the configured first security resource is associated with the first configuration information;

the client acquires second configuration information from a second configuration device, and configures a second security resource of the client based on the second configuration information, wherein the configured second security resource is associated with the second configuration information.

The method of claim 14, wherein the first secure resource comprises a first resource, the first resource being a master-related resource; the first resource has a first attribute and a second attribute; wherein the content of the first and second substances,

the first attribute is used for representing the device owner identification;

the second attribute is used for representing the resource owner identification.

The method of claim 14 or 15, wherein the first secure resource comprises a second resource, the second resource being a credential related resource; the second resource has a third attribute and a fourth attribute; wherein the content of the first and second substances,

the third attribute is used for representing voucher content;

the fourth attribute is used for representing the resource owner identification.

The method of any of claims 14 to 16, wherein the second secure resource comprises a third resource, the third resource being a master-related resource; the third resource has a first attribute and a second attribute; wherein the content of the first and second substances,

the first attribute is used for representing the device owner identification;

the second attribute is used for representing the resource owner identification.

The method of any of claims 14 to 17, wherein the second secure resource comprises a fourth resource, the fourth resource being a credential related resource; the fourth resource has a third attribute and a fourth attribute; wherein the content of the first and second substances,

the third attribute is used for representing voucher content;

the fourth attribute is used for representing the resource owner identification.

The method of any of claims 14 to 18, wherein the client obtains second configuration information from a second configuration device, configuring a second secure resource of the client based on the second configuration information, comprising:

after the client acquires the second configuration information, determining whether the first security resource is configured;

and under the condition that the first security resource is configured, the client creates a second security resource and configures the second security resource based on the second configuration information.

The method of any of claims 14 to 19, wherein the client obtains first configuration information from a first configuration device, configuring a first secure resource of the client based on the first configuration information, comprising:

the client sends a second configuration request message to the first configuration device, wherein the second configuration request message is used for requesting configuration parameters from the first configuration device;

the client receives a first configuration parameter sent by the first configuration device, and configures at least one of a first attribute of a first resource of the client, a second attribute of the first resource of the client, a fourth attribute of a second resource of the client and a third attribute of the second resource of the client based on the first configuration parameter.

The method of claim 20, wherein the second configuration request message carries a third device identifier of the client, and the third device identifier is used by the first configuration device to determine the first configuration parameter corresponding to the client.

The method of claim 20 or 21, wherein the first configuration parameter comprises at least one of: a first device identification of the first configuration device, first credential content.

The method of any of claims 14 to 22, wherein the client obtains second configuration information from a second configuration device, configuring a second secure resource of the client based on the second configuration information, comprising:

the client sends a fourth configuration request message to the second configuration device, wherein the fourth configuration request message is used for requesting configuration parameters from the second configuration device;

and the client receives a second configuration parameter sent by the second configuration device, and configures at least one of a first attribute of a third resource of the client, a second attribute of the third resource of the client, a fourth attribute of a fourth resource of the client and a third attribute of the fourth resource of the client based on the second configuration parameter.

The method of claim 23, wherein the fourth configuration request message carries a third device identifier of the client, and the third device identifier is used by the second configuration device to determine a second configuration parameter corresponding to the client.

The method of claim 23 or 24, wherein the second configuration parameter comprises at least one of: a second device identification of the second configuration device, second credential content.

An apparatus to configure a client, the apparatus comprising:

the first configuration unit is used for acquiring first configuration information from first configuration equipment; configuring a secure resource of the client based on the first configuration information, wherein the configured secure resource is associated with at least the first configuration information;

the second configuration unit is used for acquiring second configuration information from second configuration equipment; configuring the secure resource of the client based on the second configuration information, wherein the configured secure resource associates at least the first configuration information and the second configuration information.

The apparatus of claim 26, wherein the secure resource comprises a first resource, the first resource being a master-related resource; the first resource has a first attribute and a second attribute; wherein the content of the first and second substances,

the first attribute is used for representing an equipment owner identification, and the first attribute supports a plurality of values;

the second attribute is used for representing a resource owner identifier, and the second attribute supports multiple values.

The apparatus of claim 27, wherein the first configuration information carries a first device identifier of the first configuration device, and the second configuration information carries a second device identifier of the second configuration device;

the value of the first attribute of the first resource at least comprises a first value and a second value, and the value of the second attribute of the first resource at least comprises a first value and a second value;

the first value is the first device identifier, and the second value is the second device identifier.

The apparatus of any of claims 26 to 28, wherein the secure resource comprises a second resource, the second resource being a credential related resource; the second resource has a third attribute and a fourth attribute; wherein the content of the first and second substances,

the third attribute is used for representing voucher content;

the fourth attribute is used for representing a resource owner identifier, and the fourth attribute supports multiple values.

The apparatus of claim 29, wherein the first configuration information carries a first device identifier of the first configuration device, and the second configuration information carries a second device identifier of the second configuration device;

the value of the fourth attribute of the second resource at least comprises a first value and a second value;

the first value is the first device identifier, and the second value is the second device identifier.

The apparatus according to any one of claims 26 to 30, wherein the first configuration unit is configured to:

sending a first configuration request message to the first configuration device, wherein the first configuration request message is used for requesting the first configuration device to configure the security resource of the client;

receiving at least one of a first configuration signaling, a second configuration signaling, a third configuration signaling, and a fourth configuration signaling sent by the first configuration device, where the first configuration signaling is used to configure a first attribute of a first resource of the client, the second configuration signaling is used to configure a second attribute of the first resource of the client, the third configuration signaling is used to configure a fourth attribute of a second resource of the client, and the fourth configuration signaling is used to configure a third attribute of the second resource of the client.

The apparatus according to any one of claims 26 to 30, wherein the first configuration unit is configured to:

sending a second configuration request message to the first configuration device, wherein the second configuration request message is used for requesting configuration parameters from the first configuration device;

and receiving a first configuration parameter sent by the first configuration device, and configuring at least one of a first attribute of the first resource of the client, a second attribute of the first resource of the client, a fourth attribute of the second resource of the client and a third attribute of the second resource of the client based on the first configuration parameter.

The apparatus of claim 32, wherein the second configuration request message carries a third device identifier of the client, and the third device identifier is used by the first configuration device to determine the first configuration parameter corresponding to the client.

The apparatus of claim 32 or 33, wherein the first configuration parameter comprises at least one of: a first device identification of the first configuration device, first credential content.

The apparatus according to any one of claims 26 to 34, wherein the second configuration unit is configured to:

sending a third configuration request message to the second configuration device, where the third configuration request message is used to request the second configuration device to configure the security resource of the client;

receiving at least one of a fifth configuration signaling, a sixth configuration signaling, a seventh configuration signaling, and an eighth configuration signaling sent by the second configuration device, where the fifth configuration signaling is used to configure a first attribute of a first resource of the client, the sixth configuration signaling is used to configure a second attribute of the first resource of the client, the seventh configuration signaling is used to configure a fourth attribute of a second resource of the client, and the eighth configuration signaling is used to configure a third attribute of the second resource of the client.

The apparatus according to any one of claims 26 to 34, wherein the second configuration unit is configured to:

sending a fourth configuration request message to the second configuration device, where the fourth configuration request message is used to request configuration parameters from the second configuration device;

and receiving a second configuration parameter sent by the second configuration device, and configuring at least one of the first attribute of the first resource of the client, the second attribute of the first resource of the client, the fourth attribute of the second resource of the client and the third attribute of the second resource of the client based on the second configuration parameter.

The apparatus of claim 36, wherein the fourth configuration request message carries a third device identifier of the client, and the third device identifier is used by the second configuration device to determine a second configuration parameter corresponding to the client.

The apparatus of claim 36 or 37, wherein the second configuration parameter comprises at least one of: a second device identification of the second configuration device, second credential content.

An apparatus to configure a client, the apparatus comprising:

a first configuration unit, configured to obtain first configuration information from a first configuration device, and configure a first security resource of the client based on the first configuration information, where the configured first security resource is associated with the first configuration information;

a second configuration unit, configured to obtain second configuration information from a second configuration device, and configure a second security resource of the client based on the second configuration information, where the configured second security resource is associated with the second configuration information.

The apparatus of claim 39, wherein the first secure resource comprises a first resource, the first resource being a master-related resource; the first resource has a first attribute and a second attribute; wherein the content of the first and second substances,

the first attribute is used for representing the device owner identification;

the second attribute is used for representing the resource owner identification.

The apparatus of claim 39 or 40, wherein the first secure resource comprises a second resource, the second resource being a credential-related resource; the second resource has a third attribute and a fourth attribute; wherein the content of the first and second substances,

the third attribute is used for representing voucher content;

the fourth attribute is used for representing the resource owner identification.

The apparatus of any of claims 39 to 41, wherein the second secure resource comprises a third resource, the third resource being a master-related resource; the third resource has a first attribute and a second attribute; wherein the content of the first and second substances,

the first attribute is used for representing the device owner identification;

the second attribute is used for representing the resource owner identification.

The apparatus of any of claims 39 to 42, wherein the second secure resource comprises a fourth resource, the fourth resource being a credential-related resource; the fourth resource has a third attribute and a fourth attribute; wherein the content of the first and second substances,

the third attribute is used for representing voucher content;

the fourth attribute is used for representing the resource owner identification.

The apparatus according to any one of claims 39 to 43, wherein the second configuration unit is configured to determine whether the first secure resource has been configured after obtaining second configuration information; and under the condition that the first security resource is configured, creating a second security resource, and configuring the second security resource based on the second configuration information.

The apparatus of any one of claims 39 to 44, wherein the first configuration unit is to:

sending a second configuration request message to the first configuration device, wherein the second configuration request message is used for requesting configuration parameters from the first configuration device;

and receiving a first configuration parameter sent by the first configuration device, and configuring at least one of a first attribute of the first resource of the client, a second attribute of the first resource of the client, a fourth attribute of the second resource of the client and a third attribute of the second resource of the client based on the first configuration parameter.

The apparatus of claim 45, wherein the second configuration request message carries a third device identifier of the client, and the third device identifier is used by the first configuration device to determine the first configuration parameter corresponding to the client.

The apparatus of claim 45 or 46, wherein the first configuration parameter comprises at least one of: a first device identification of the first configuration device, first credential content.

The apparatus according to any one of claims 39 to 47, wherein the second configuration unit is configured to:

sending a fourth configuration request message to the second configuration device, where the fourth configuration request message is used to request configuration parameters from the second configuration device;

and receiving a second configuration parameter sent by the second configuration device, and configuring at least one of a first attribute of a third resource of the client, a second attribute of the third resource of the client, a fourth attribute of a fourth resource of the client and a third attribute of the fourth resource of the client based on the second configuration parameter.

The apparatus of claim 48, wherein the fourth configuration request message carries a third device identifier of the client, and the third device identifier is used by the second configuration device to determine a second configuration parameter corresponding to the client.

The apparatus of claim 48 or 49, wherein the second configuration parameter comprises at least one of: a second device identification of the second configuration device, second credential content.

A terminal device, comprising: a processor and a memory for storing a computer program, the processor being configured to invoke and execute the computer program stored in the memory to perform the method of any of claims 1 to 25.

A chip, comprising: a processor for calling and running a computer program from a memory so that a device on which the chip is installed performs the method of any one of claims 1 to 25.

A computer-readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 1 to 25.

A computer program product comprising computer program instructions to cause a computer to perform the method of any one of claims 1 to 25.

A computer program for causing a computer to perform the method of any one of claims 1 to 25.

41页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:用于远程通信的环境

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类