CN102333288A - Method for controlling application program running of terminal and terminal - Google Patents

Method for controlling application program running of terminal and terminal Download PDF

Info

Publication number
CN102333288A
CN102333288A CN201110145232A CN201110145232A CN102333288A CN 102333288 A CN102333288 A CN 102333288A CN 201110145232 A CN201110145232 A CN 201110145232A CN 201110145232 A CN201110145232 A CN 201110145232A CN 102333288 A CN102333288 A CN 102333288A
Authority
CN
China
Prior art keywords
value
tlv field
application program
tag
note
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110145232A
Other languages
Chinese (zh)
Other versions
CN102333288B (en
Inventor
陈志亮
文临丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Huawei Software Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201110145232.2A priority Critical patent/CN102333288B/en
Publication of CN102333288A publication Critical patent/CN102333288A/en
Application granted granted Critical
Publication of CN102333288B publication Critical patent/CN102333288B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention, which belongs to the communication technology field, discloses a method for controlling application program running of a terminal and the terminal. According to the invention, it can be ensured that power consumption is low; and the number of application programs designated by a TLV field can be extended. The method comprises the following steps that: a short message sent by a remote user is received; it is detected whether a TLV field is defined in the short message; if so, it is determined whether a Tag value of the TLV field is a predefined indicated value as well as the indicated value is an application program extension identification and is used for indicating that definition is carried out on the application program through a Value of the TLV field, wherein the Value is corresponded to the Tag value; if it is determined that the Tag value is the predefined indicated value, an application program that the Value is corresponded to is obtained according to the TLV field Value corresponding to the Tag value; and then the application program is executed. According to the embodiment of the invention, the method and the terminal are mainly applied to a process in which running of a terminal application program is remotely controlled by a short message.

Description

The method and the terminal of the operation of control terminal application program
Technical field
The present invention relates to communication technical field, relate in particular to a kind of method and terminal of control terminal application program operation.
Background technology
Along with the development of Internet of Things, terminals such as mobile phone become more and more important as the information receiving and transmitting of wireless remote and the function of control relaying.For satisfying the demand of Internet of Things, need remote control terminal application program operation, through controlled application program on this terminal accomplish image data, reported data or under action such as send instructions.
At present, the method through the operation of note control terminal application program has two kinds:
First kind,, start fixing application program by the terminal judges that receives short message content, triggering through defining special short message content; This kind method is specially: define the specific specific control command of short message content representative in advance; Which kind of effect discerns short message content through an inbox monitoring module is; This inbox monitoring module constantly reads user's inbox; If finding has new message, whether first judges system accepts the control of this note called number, judges whether short message content is control command again.If the definition of short message content coincidence control instruction is then carried out corresponding application according to this instruction.Because above-mentioned inbox monitoring module must move and could monitor the new message that inbox receives at any time always, so the defective that above scheme can bring system power dissipation to increase; And because control command is sign with the short message content, normal note maybe be identical with specific control note, can cause normal note can't read or control the note confusion.
In order to practice thrift power consumption and not influence the reading of normal note; Another kind of scheme is proposed in the prior art; This scheme is for using each application program of TLV (Tag Length Value, label length value) Field Definition in SMPP (Short Message Peer-to-peer Protocol, the Short Message Peer to Peer) agreement; Which kind of application program comes the identification control note through a TLV Field Sanitization module, be by the identification of the Tag value in the TLV field again.Concrete, after the terminal receives note, before putting into short message inbox, judge whether this note has the TLV field earlier.If have the TLV field in this note, system can confirm corresponding application program according to the existing definition of TLV field Tag value in the SMPP agreement, and calls this corresponding application program.If no TLV field in this note, system can be used as normal short message to this note and be put in the terminal system inbox.This kind scheme is only carried out the identification control note when receiving note, and need not move the identification control note always, so can reduce the power consumption at terminal; And because pass through TLV field identification control note in this scheme, irrelevant with the normal short message content, so can not influence the reading of normal note.But the Tag value of a TLV field is only represented a kind of application program in the standard agreement, and these application programs must define in terminal system in advance.Because the Tag value of TLV field has only 2 bytes, each byte has 8, and then 2 bytes have 16, so the value of Tag has 216-1=65535, can only define 65535 application programs at most, so the limited amount of the application program that this scheme can define.
State in realization in the process through the operation of note control terminal application program; The inventor finds to have following problem in the prior art at least: during the application program at the Tag value defined terminal in using the TLV field; Though can reduce the power consumption at terminal; But because application program of the correspondence of Tag value in the TLV field, and the Tag value has only two bytes, the limited amount of the end application that causes defining.
Summary of the invention
Embodiments of the invention provide a kind of method and terminal of control terminal application program operation, can guarantee that power consumption is lower, can expand the quantity of the application program of TLV field appointment again.
For achieving the above object, embodiments of the invention adopt following technical scheme:
A kind of method of control terminal application program operation comprises:
The note that the receiving remote user sends;
Detect and whether defined label length value TLV field in the said note;
Defined the TLV field in the said note if detect; Whether the Tag value of then confirming said TLV field is predefined indicated value; Said indicated value is the application extensions sign, is used to indicate the Value value application programs through the TLV field corresponding with said Tag value to define;
If confirming said Tag value is predefined indicated value, then obtains the Value value corresponding application program with said TLV field, and carry out said application program according to the Value value of the TLV field of said Tag value correspondence.
A kind of terminal comprises:
Receiving element is used for the note that the receiving remote user sends;
Detecting unit is used for detecting said note and whether has defined label length value TLV field;
Confirm the unit; Be used in said detection when said note has defined the TLV field; Whether the Tag value of confirming said TLV field is predefined indicated value; Said indicated value is the application extensions sign, is used to indicate the Value value application programs through the TLV field corresponding with said Tag value to define;
First acquiring unit when being used for confirming that in said definite unit said Tag value is predefined indicated value, obtains the Value value corresponding application program with said TLV field according to the Value value of the corresponding TLV field of said Tag value;
Performance element is used to carry out the said application program that said first acquiring unit obtains.
The method and the terminal of the control terminal application program operation that the embodiment of the invention provides are only carried out the identification control note, and need not be moved the identification control note always, so can reduce the power consumption at terminal when receiving note; And this method and terminal can adopt the Value value in the TLV field to come the predefine corresponding application program; Because each Tag value can corresponding a plurality of Value values; And the definition of the Value value in the TLV field is not receive byte limit; Its number of applications that can define is also unrestricted, compares with utilizing two corresponding 65535 application programs of 65535 Tag value defineds of byte in the prior art, has realized the expansion of the specified number of applications of TLV field.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the method flow diagram of control terminal application program operation in the embodiment of the invention 1;
Fig. 2 is the method flow diagram of control terminal application program operation in the embodiment of the invention 2;
Fig. 3 is the composition frame chart at a kind of terminal in the embodiment of the invention 3;
Fig. 4 is the composition frame chart at another kind of terminal in the embodiment of the invention 3;
Fig. 5 is the composition frame chart at another kind of terminal in the embodiment of the invention 3.
Embodiment
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
Embodiment 1
The embodiment of the invention provides a kind of method of control terminal application program operation, and as shown in Figure 1, this method comprises:
101, the note of receiving remote user transmission.
102, detect in the said note whether defined the TLV field.
Wherein, said TLV field is made up of Tag value, Length value and Value value, and the Value value both can be that numeral also can be a character, the byte number that on behalf of the Value value, the Length value take.Length value and Value value are null values under default setting.
103, defined the TLV field in the said note if detect; Whether the Tag value of then confirming said TLV field is predefined indicated value; Said indicated value is the application extensions sign, is used to indicate the Value value application programs through the TLV field corresponding with said Tag value to define.
Wherein, said indicated value is the expansion signs of indivedual Tag values of appointment when predefine as application program, and what it was indicated is not certain application program, but the set that a plurality of application program is formed.And Value value and application program are one to one, have only through the Value value under this indicated value and just can find corresponding application program.
104,, then obtain the Value value corresponding application program with said TLV field, and carry out said application program according to the Value value of the TLV field of said Tag value correspondence if confirming said Tag value is predefined indicated value.
In the embodiment of the invention, only when receiving note, carry out the identification control note, and need not move the identification control note always, so can reduce the power consumption at terminal; And this method and terminal can adopt the Value value in the TLV field to come the predefine corresponding application program; Because each Tag value can corresponding a plurality of Value values; And the definition of the Value value in the TLV field is not receive byte limit; Its number of applications that can define is also unrestricted, compares with utilizing two corresponding 65535 application programs of 65535 Tag value defineds of byte in the prior art, has realized the expansion of the specified number of applications of TLV field.
Embodiment 2
The embodiment of the invention provides the method for a kind of control terminal application program operation, and the Value value in the TLV field that the terminal can comprise through note is judged and the startup corresponding application.Concrete, as shown in Figure 2, the method for this control terminal application program operation is:
201, the note of receiving remote user transmission.
Wherein, need to prove, in receiving the process of note, the note that receives is not directly put into inbox, but carry out identification and the filtration of step 202 to 206 before new message being put into inbox.So just removed from and uninterruptedly read the power consumption of terminal that inbox is brought, thus the stand-by time that prolongs the terminal.
202, detect in the said note whether defined the TLV field; If detect and defined the TLV field in the said note, then execution in step 203; If detecting does not have definition of T LV field in the said note, then execution in step 206.
Wherein, said TLV field is made up of Tag value, Length value and Value value, and the Value value both can be that numeral also can be a character, the byte number that on behalf of the Value value, the Length value take.Length value and Value value are null values under default setting.And come the method for identification control note can not influence short message content through the TLV field, clear and definite differentiates normal note and special control note, thereby prevents that normal note from can't read or control the chaotic problem that lost efficacy of note.And, can comprise a plurality of TLV fields simultaneously in the note, terminal system can be done the judgement and the operation of step 203 to step 206 successively to each TLV field in this case.The method of sending a plurality of control informations through a note like this can improve the efficient of control terminal application program operation.
Whether the Tag value of 203, confirming said TLV field is predefined indicated value; If confirm that said Tag value is predefined indicated value, then execution in step 204; If confirm that said Tag value is not predefined indicated value, then execution in step 205.
Wherein, said indicated value is the application extensions sign, is used to indicate the Value value application programs through corresponding with said Tag value to define.When predefine, specify the expansion sign of indivedual Tag values as application program, what it was indicated is not certain application program, but the set that a plurality of application program is formed.And Value value and application program are one to one, have only through the Value value under this indicated value and just can find corresponding application program.
204, obtain the Value value corresponding application program with said TLV field according to the Value value of the corresponding TLV field of said Tag value, and carry out said application program.
Wherein, said Value value according to said Tag value correspondence is confirmed can realize that this method comprises through following method with said Value value corresponding application program:
The Value value corresponding according to said Tag value inquired about the mapping table of predefined Value value and application program, obtains and said Value value corresponding application program.Concrete, in terminal system, the mapping table of Value value of consumer premise justice and application program, the application deployment of User Defined permission execution in mapping table.Not obtaining application program that the user allows and be configured in the mapping table then can not be by Long-distance Control, thereby makes end application allow the selectable discretionary protection of user.The unique corresponding application program of each Value value; Each Value value is defined by user oneself, and unique in mapping table, and the Value value can be that numeral also can be a character; The embodiment of the invention does not limit this, can be other the form of expression yet.Wherein, The position of the mapping table storage of predefined Value value and application program can be the disk at terminal or an independent module on the terminal; It also can be external connection of storage card or the like; Be not limited only to above memory location, the embodiment of the invention is enumerated other storable positions no longer one by one.When the Value value is represented with digital form; As shown in table 1; Because integer generally all is 4 bytes, need not changes during programming, and use numeral can avoid terminal system to do the judgement of language set; So the Value value can be example with the integer of 4 bytes, thus the decision process of Value value in the simplification programming.For example, numerical value " 15 " corresponding application program is "/disk/program/camera.exe " in the table 1; Numerical value " 11 " corresponding application program is "/disk/program/fire.exe " or the like.
The Value value Application program
15 /disk/program/camera.exe
11 /disk/program/fire.exe
13 /disk/program/gps.exe
78 / disk/program/ wakes sleep .exe up
Table 1
At this moment, the form of TLV field is as shown in table 2, and wherein indicated value (being the Tag value) also is a predefined numeral, and by the agency of in step 203 comprises two bytes, for example 0x8001.
Tag Length Value
0x8001 4 78
0x8001 4 15
Table 2
For example, a note is received at the terminal, comprises the TLV field in this note, is example with a TLV field in the table 2, and the Tag value in the TLV field is 0x8001, and the Value value is 78.At this moment; The method of control terminal application program operation is specially: when the Tag value is 0x8001 in the TLV field of in detecting note, carrying; Then obtain the Value value 78 in the TLV field, and according to the 78 inquiry Value values of the Value value in the TLV field and the tabulation of application program corresponding relation, i.e. table 1; Obtain and Value value 78 corresponding application program "/disk/program/ wakes sleep .exe up ", and start this application program.Same, if the terminal receives that the Value value in the TLV field of note is 15, then obtain and Value value 15 corresponding application program "/disk/program/camera.exe ", and start this application program.
Need to prove; When the Value value is digital form; Because integer generally all is 4 bytes, avoid program to do the judgement of language set in order to use, so be 4 bytes generally with the Value value defined; Certainly the embodiment of the invention does not limit this yet, and the byte of any length all belongs to the scope of embodiment of the invention protection.When the Value value defined was 4 bytes, it can the corresponding application program number just reach 232=4294967295.
In addition, the Value value not only can be a numeral, also can be character.When user-defined Value value is the character string of random length; The mapping table of this Value value and application program is as shown in table 3; Character string " startcamera " corresponding application program is "/disk/program/camera.exe ", and character string " poweroff1 " corresponding application program is "/disk/program/shutdown.exe " or the like.
The Value value Application program
startcamera /disk/program/camera.exe
poweroff1 /disk/program/shutdown.exe
Table 3
At this moment, the form of TLV field is as shown in table 4, and wherein the Length value is the string length of Value value.
Tag Length Value
0x8001 11 startcamera
0x8001 9 poweroff1
Table 4
For example, a note is received at the terminal, comprises the TLV field in this note, is example with a TLV field in the table 4, and the Tag value in the TLV field is 0x8001, and the Value value is poweroff1.At this moment; The method of control terminal application program operation is specially: when the terminal detects Tag value in the TLV field of carrying in the note when being 0x8001; Then obtain the Value value poweroff1 in the TLV field, and tabulate, be i.e. table 3 according to the corresponding relation of inquiry Value value of the Value value poweroff1 in the TLV field and application program; Obtain and Value value poweroff1 corresponding application program "/disk/program/shutdown.exe ", and start this application program.Same, if the terminal receives that the Value value in the TLV field of note is startcamera, then obtain and startcamera corresponding application program "/disk/program/camera.exe ", and start this application program.
Can know according to foregoing description; Definable numeral of Value value or character are very many; Other people are very little through the probability that transmission has the correct control terminal application program operation of the note of TLV field; So the application program that is allowed to move and be configured in the mapping table also can be protected, and prevents stolen.
205, obtain and said Tag value corresponding application program according to said Tag value, and carry out said application program.
Wherein, be identified as the Tag value that does not belong to indicated value through judgement with after filtering, the method for its control terminal application program operation is a prior art, repeats no more here.
206, the note that receives is placed in the inbox as general information, so that the user checks.
In the embodiment of the invention, only when receiving note, carry out the identification control note, and need not move the identification control note always, so can reduce the power consumption at terminal.And; This method and terminal adopt the Value value in the TLV field to come the predefine corresponding application program; Because each Tag value can corresponding a plurality of Value values, and the definition of the Value value in the TLV field is not receive byte limit, its number of applications that can define is also unrestricted; With can only utilize two 65535 corresponding Tag values of byte to define 65535 application programs in the prior art to compare, realized the expansion of the specified number of applications of TLV field.
And because in this scheme through TLV field identification control note, this TLV field does not belong to the normal short message content, can be clear and definite normal short message and control note are differentiated, so can not influence the reading of normal note.And one can comprise a plurality of TLV fields simultaneously in the note, the method for sending a plurality of control informations through a note can improve the efficient of control terminal application program operation.
Further; Because Value value in the mapping table and corresponding application program thereof all are User Defineds and allow operation; The application program that does not obtain user's permission and be configured in the mapping table all can not be by Long-distance Control, so end application allows the selectable discretionary protection of user.Simultaneously; Because the Value value in the mapping table in the terminal system is by User Defined; And definable numeral of Value value or character are very many; Other people are very little through the probability that transmission has the correct control terminal application program operation of the note of TLV field, so the application program that is allowed to move and be configured in the mapping table also can be protected, prevent stolen.
Embodiment 3
The embodiment of the invention provides a kind of terminal, and is as shown in Figure 3, comprising: receiving element 31, detecting unit 32, confirm unit 33, first acquiring unit 34 and performance element 35.
Receiving element 31 is used for the note that the receiving remote user sends.
Detecting unit 32 is used for detecting said note and whether has defined the TLV field.Wherein, said TLV field is made up of Tag value, Length value and Value value, and the Value value both can be that numeral also can be a character, the byte number that on behalf of the Value value, the Length value take.Length value and Value value are null values under default setting.
Confirm unit 33; Be used for when said detecting unit 32 detects said note and defined the TLV field; Whether the Tag value of confirming said TLV field is predefined indicated value; Said indicated value is the application extensions sign, is used to indicate the Value value application programs through the TLV field corresponding with said Tag value to define.Wherein, said indicated value is the expansion signs of indivedual Tag values of appointment when predefine as application program, and what it was indicated is not certain application program, but the set that a plurality of application program is formed.And Value value and application program are one to one, have only through the Value value under this indicated value and just can find corresponding application program.
First acquiring unit 34 when being used for confirming that in said definite unit 33 said Tag values are predefined indicated value, obtains the Value value corresponding application program with said TLV field according to the Value value of the TLV field of said Tag value correspondence.
Performance element 35 is used to carry out the said application program that said first acquiring unit 34 obtains.
Further, as shown in Figure 4, said first acquiring unit 34 comprises:
Enquiry module 341 is used for the Value value according to the corresponding TLV field of said Tag value, inquires about the mapping table of predefined Value value and application program.Need to prove, in terminal system, the mapping table of Value value of consumer premise justice and application program, the application deployment of User Defined permission execution in mapping table.Not obtaining application program that the user allows and be configured in the mapping table then can not be by Long-distance Control, thereby makes end application allow the selectable discretionary protection of user.The unique corresponding application program of each Value value; Each Value value is defined by user oneself, and unique in mapping table, and the Value value can be that numeral also can be a character; The embodiment of the invention does not limit this, can be other the form of expression yet.Wherein, The position of the mapping table storage of predefined Value value and application program can be the disk at terminal or a module on the terminal; Can be external connection of storage card or the like also, be not limited only to above memory location, the embodiment of the invention be enumerated other storable positions no longer one by one.
Acquisition module 342 is used for Query Result according to said enquiry module 341 and obtains the Value value corresponding application program with said TLV field.
Further, as shown in Figure 5, said terminal also comprises: second acquisition unit 36.
Second acquisition unit 36 when being used for confirming that in said definite unit 33 said Tag values are not predefined indicated value, obtains and said Tag value corresponding application program according to said Tag value.
Said performance element 35 also is used for, and carries out the application program that said second acquisition unit 36 obtains.
Need to prove that other of embodiment of the invention functional module that said terminal comprises are described, can reference implementation example 1 and the description of embodiment 2 counterparts, the embodiment of the invention will repeat no more here.
In the embodiment of the invention, only when receiving note, carry out the identification control note, and need not move the identification control note always, so can reduce the power consumption at terminal.And; This method and terminal adopt the Value value in the TLV field to come the predefine corresponding application program; Because each Tag value can corresponding a plurality of Value values, and the definition of the Value value in the TLV field is not receive byte limit, its number of applications that can define is also unrestricted; Compare with utilizing two corresponding 65535 application programs of 65535 Tag value defineds of byte in the prior art, realized the expansion of the specified number of applications of TLV field.
And because in this scheme through TLV field identification control note, this TLV field does not belong to the normal short message content, can be clear and definite normal short message and control note are differentiated, so can not influence the reading of normal note.And one can comprise a plurality of TLV fields simultaneously in the note, the method for sending a plurality of control informations through a note can improve the efficient of control terminal application program operation.
Further; Because Value value in the mapping table and corresponding application program thereof all are User Defineds and allow operation; The application program that does not obtain user's permission and be configured in the mapping table all can not be by Long-distance Control, so end application allows the selectable discretionary protection of user.Simultaneously; Because the Value value in the mapping table in the terminal system is by User Defined; And definable numeral of Value value or character are very many; Other people are very little through the probability that transmission has the correct control terminal application program operation of the note of TLV field, so the application program that is allowed to move and be configured in the mapping table also can be protected, prevent stolen.
Through the description of above execution mode, the those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential common hardware, can certainly pass through hardware, but the former is better execution mode under a lot of situation.Based on such understanding; The part that technical scheme of the present invention contributes to prior art in essence in other words can be come out with the embodied of software product, and this computer software product is stored in the storage medium that can read, like the floppy disk of computer; Hard disk or CD etc.; Comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of each embodiment of the present invention.
The above; Be merely embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technical staff who is familiar with the present technique field is in the technical scope that the present invention discloses; Can expect easily changing or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of said claim.

Claims (8)

1. the method for a control terminal application program operation is characterized in that, comprising:
The note that the receiving remote user sends;
Detect and whether defined label length value TLV field in the said note;
Defined the TLV field in the said note if detect; Whether the Tag value of then confirming said TLV field is predefined indicated value; Said indicated value is the application extensions sign, is used to indicate the Value value application programs through the TLV field corresponding with said Tag value to define;
If confirming said Tag value is predefined indicated value, then obtains the Value value corresponding application program with said TLV field, and carry out said application program according to the Value value of the TLV field of said Tag value correspondence.
2. method according to claim 1 is characterized in that, said Value value according to the corresponding TLV field of said Tag value is confirmed to comprise with the Value value corresponding application program of said TLV field:
According to the Value value of the corresponding TLV field of said Tag value, inquire about the mapping table of predefined Value value and application program, obtain Value value corresponding application program with said TLV field.
3. according to claim 1 or 2 described methods, it is characterized in that said Value value is numeral or character.
4. method according to claim 3 is characterized in that, said TLV field also comprises the Length value, the byte number of said Length value representation Value value.
5. a terminal is characterized in that, comprising:
Receiving element is used for the note that the receiving remote user sends;
Detecting unit is used for detecting said note and whether has defined label length value TLV field;
Confirm the unit; Be used in said detection when said note has defined the TLV field; Whether the Tag value of confirming said TLV field is predefined indicated value; Said indicated value is the application extensions sign, is used to indicate the Value value application programs through the TLV field corresponding with said Tag value to define;
First acquiring unit when being used for confirming that in said definite unit said Tag value is predefined indicated value, obtains the Value value corresponding application program with said TLV field according to the Value value of the corresponding TLV field of said Tag value;
Performance element is used to carry out the said application program that said first acquiring unit obtains.
6. terminal according to claim 5 is characterized in that, said acquiring unit comprises:
Enquiry module is used for the Value value according to the corresponding TLV field of said Tag value, inquires about the mapping table of predefined Value value and application program;
Acquisition module is used for Query Result according to said enquiry module and obtains the Value value corresponding application program with said TLV field.
7. according to claim 5 or 6 described terminals, it is characterized in that said Value value is numeral or character.
8. terminal according to claim 7 is characterized in that, said TLV field also comprises the Length value, the byte number of said Length value representation Value value.
CN201110145232.2A 2011-05-31 2011-05-31 Method for controlling application program running of terminal and terminal Expired - Fee Related CN102333288B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110145232.2A CN102333288B (en) 2011-05-31 2011-05-31 Method for controlling application program running of terminal and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110145232.2A CN102333288B (en) 2011-05-31 2011-05-31 Method for controlling application program running of terminal and terminal

Publications (2)

Publication Number Publication Date
CN102333288A true CN102333288A (en) 2012-01-25
CN102333288B CN102333288B (en) 2014-02-19

Family

ID=45484865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110145232.2A Expired - Fee Related CN102333288B (en) 2011-05-31 2011-05-31 Method for controlling application program running of terminal and terminal

Country Status (1)

Country Link
CN (1) CN102333288B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103744711A (en) * 2014-01-27 2014-04-23 国家电网公司 Remote restart method and system of electric power application based on 3G (The 3rd Generation Telecommunication) and encrypted short message

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050265279A1 (en) * 2002-10-18 2005-12-01 Milan Markovic Apparatus and messages for interworking between unlicensed access network and GPRS network for data services
CN101018145A (en) * 2006-02-07 2007-08-15 腾讯科技(深圳)有限公司 A device and method for remote management
CN101227671A (en) * 2007-12-28 2008-07-23 北京握奇数据系统有限公司 Method for interactive managing data base with mobile terminal and smart card thereof
CN101710914A (en) * 2009-11-16 2010-05-19 中兴通讯股份有限公司 Mobile terminal and method for achieving mobile terminal vibration

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050265279A1 (en) * 2002-10-18 2005-12-01 Milan Markovic Apparatus and messages for interworking between unlicensed access network and GPRS network for data services
CN101018145A (en) * 2006-02-07 2007-08-15 腾讯科技(深圳)有限公司 A device and method for remote management
CN101227671A (en) * 2007-12-28 2008-07-23 北京握奇数据系统有限公司 Method for interactive managing data base with mobile terminal and smart card thereof
CN101710914A (en) * 2009-11-16 2010-05-19 中兴通讯股份有限公司 Mobile terminal and method for achieving mobile terminal vibration

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103744711A (en) * 2014-01-27 2014-04-23 国家电网公司 Remote restart method and system of electric power application based on 3G (The 3rd Generation Telecommunication) and encrypted short message

Also Published As

Publication number Publication date
CN102333288B (en) 2014-02-19

Similar Documents

Publication Publication Date Title
CN102982141B (en) A kind of method and device realizing distributed data base agency
CN102006588B (en) Method and system for monitoring network behavior of smart mobile phone
US20130055271A1 (en) Apparatus and method for controlling polling
CN107426800B (en) Method and device for reducing power consumption of terminal and smart card
CN102411684B (en) Data protection method and device
CN102196021A (en) System for remotely erasing data, method, server, and mobile device thereof
CN105549718A (en) Method and device for optimizing power consumption of application program and electronic equipment
CN110222535B (en) Processing device, method and storage medium for block chain configuration file
CN103759393A (en) Air conditioner, wireless air conditioner controller, system and control method of air conditioner
CN102821084A (en) Method for identifying open platform, open platform and open system
CN107610259A (en) A kind of Work attendance method and device based on surrounding environment marker
CN103973876A (en) Mobile terminal and tracking method for lost mobile terminal
CN104866782A (en) Data processing method and apparatus
CN110831050B (en) Sensor node control method and system
US8441348B2 (en) Multiple device loss status retrieval without ID provision
EP3468261B1 (en) Control method and apparatus for smart card, terminal device, and smart card
CN106604316A (en) Wireless access equipment fault positioning method, device and system
CN113037820B (en) Thing networking device communication module
CN101442539B (en) Method and apparatus for implementing field filtration
CN102333288B (en) Method for controlling application program running of terminal and terminal
CN105516988A (en) Telephone filtering method and device, electronic equipment and server
CN103036913A (en) Mobile terminal power and environment monitoring method and system and mobile terminal proxy server
US20100064046A1 (en) Management of communications from stolen devices
CN104394258A (en) Method and device for processing contact change of communication object
US20170160892A1 (en) Individual customization system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140219

Termination date: 20180531

CF01 Termination of patent right due to non-payment of annual fee