CN103595752A - Information management method - Google Patents

Information management method Download PDF

Info

Publication number
CN103595752A
CN103595752A CN201210294881.3A CN201210294881A CN103595752A CN 103595752 A CN103595752 A CN 103595752A CN 201210294881 A CN201210294881 A CN 201210294881A CN 103595752 A CN103595752 A CN 103595752A
Authority
CN
China
Prior art keywords
terminal
clouds
information
renewal
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210294881.3A
Other languages
Chinese (zh)
Other versions
CN103595752B (en
Inventor
任香淑
范涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CN201210294881.3A priority Critical patent/CN103595752B/en
Publication of CN103595752A publication Critical patent/CN103595752A/en
Application granted granted Critical
Publication of CN103595752B publication Critical patent/CN103595752B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an information management method. The method comprises: a first terminal sends an authorization request to a cloud end, wherein the authorization request carries the only identification of a second terminal for authorizing the second terminal to manage the information stored in the cloud end by the first terminal; the second terminal receives the information stored in the cloud end by the first terminal from the cloud end and manages the information; the second terminal uploads the managed information of the first terminal to the cloud end; and if the information of the first terminal is updated before and after the management, the first terminal receives updated information of the terminal from the cloud end. The invention also discloses another two information management methods. By applying the technical scheme disclosed by the invention, the information of one terminal can be managed by another terminal.

Description

A kind of approaches to IM
Technical field
The application relates to wireless communication technology field, particularly a kind of approaches to IM.
Background technology
Along with the extensive use of various electronic equipments, people's canned data in electronic equipment is more and more, and these information comprise: address list, schedule, task, picture, audio frequency, video, note etc.
For canned data in electronic equipment being managed to ,Ge manufacturer, proposed one after another solution separately, existing several typical technology have been carried out to brief description below.
Personal information manager (PIM, Personal Information Manager) be the software of a class for personal information is managed, typically have: Microsoft Outlook, Outlook Express, IBM Lotus Notes etc., these softwares can help the personal information such as its contact addresses of personal management (Contact), schedule (Calendar), task (Task) note (Note) and Email (Email).
NPS/Kies is that Samsung proposes Mobile phone software, and it is for using the user of Samsung equipment that several functions is provided, comprising: backup or transmission data, multimedia file management function etc.Kies also possesses following characteristic: synchronously picture, film, music, contact person etc., an and built-in Marketplace independently, user is synchronized on the mobile phone of oneself after can directly downloading software by Kies, and without using mobile phone login Marketplace; User can connect devices to Kies by Wi-Fi, and synchronizing content; During connection, Kies has new firmware version by automatically prompting user; Can be on Kies add easily and editing equipment contact person, meanwhile, synchronize contact person with Outlook, Google or Yahoo etc.; Can set up music playlist and be synchronized to equipment; Can transmit photo and video to computer.
ITunes is a Digital Media play-back application, is a free application software for Mac and PC, can management and playback digital music and video.It can also download to the new application software of buying of user on this user all equipment and computer automatically.
Summary of the invention
The application provides several approaches to IMs, to realize by a terminal, the information in another terminal is managed.
A kind of approaches to IM that the application provides, comprising:
First terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for the information of authorizing the second terminal to be stored in high in the clouds to first terminal, manages;
The second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed;
The second terminal is uploaded to high in the clouds by the information of the first terminal after management;
If the information of first terminal is upgraded before and after management, the information of first terminal from high in the clouds receives the renewal of this terminal.
Preferably, if the information of first terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds at first terminal before, the method may further include:
First terminal receives update notification from high in the clouds, and points out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, sends download request to high in the clouds.
The another kind of approaches to IM that the application provides, comprising:
First terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for asking the second terminal to this authorization terminal, the information of the second terminal to be managed;
The second terminal receives described authorization requests from high in the clouds, confirm, and the information of this terminal is uploaded to high in the clouds to high in the clouds return authorization;
First terminal receives the information of the second terminal from high in the clouds, and described information is managed;
First terminal is uploaded to high in the clouds by the information of the second terminal after management;
If the information of the second terminal is upgraded before and after management, the information of the second terminal from high in the clouds receives the renewal of this terminal.
Preferably, if the information of the second terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds in the second terminal before, the method may further include:
The second terminal receives update notification from high in the clouds, and points out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, sends download request to high in the clouds.
The application also provides a kind of approaches to IM, comprising:
First terminal arranges password beyond the clouds, and the information that this password is stored in high in the clouds for the terminal of authorizing by described password authentication to first terminal manages;
The second terminal sends authorization requests to high in the clouds, carries unique identification and the password of first terminal in this authorization requests, for the information of asking high in the clouds, to this authorization terminal, first terminal is stored in to high in the clouds, manages;
If the password in described authorization requests is identical with the password that the first equipment arranges beyond the clouds, the second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed;
The second terminal is uploaded to high in the clouds by the information of the first terminal after management.
Preferably, after the second terminal is uploaded to high in the clouds by the information of the first terminal after management, may further include:
If the information of first terminal is upgraded before and after management, first terminal receives update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, if the renewal indication of user's input detected, to high in the clouds, send download request, and the information from high in the clouds receives the renewal of this terminal; If the refusal of user's input detected, upgrade indication, to high in the clouds, send refusal updating message.
As seen from the above technical solution, the approaches to IM that the application provides, by a server is set beyond the clouds, a platform for exchange of information is beyond the clouds provided, and make a terminal through mandate in the situation that, by the information in another terminal of high in the clouds telemanagement, realized by a terminal information in another terminal has been managed, making personal information management no longer be confined to me manages the information in my electronic equipment, this has not only solved the problem that in different terminals, personal information is managed mutually, facilitated the information sharing between terminal simultaneously.
Accompanying drawing explanation
Fig. 1 is the preferably schematic flow sheet of approaches to IM of the application's the first;
Fig. 2 is the preferably schematic flow sheet of approaches to IM of the application's the second;
Fig. 3 is the third schematic flow sheet of approaches to IM preferably of the application.
Embodiment
For making the application's object, technical scheme and advantage clearer, referring to the accompanying drawing embodiment that develops simultaneously, the application is described in further detail.
Present inventor finds by the analysis to prior art: adopt prior art, PIM for example, can manage the contents such as phone directory in my electronic equipment and note, but, only be confined to me the information in my electronic equipment is managed, can not access or manage the information in other people electronic equipment.
For this reason, the application proposes a kind of approaches to IM, and its main thought is: a server is set beyond the clouds, a platform for exchange of information is beyond the clouds provided, a terminal is through mandate in the situation that, by the information in another terminal of high in the clouds telemanagement.
Based on above-mentioned main thought, the application provides three kinds of preferably approaches to IMs, is described in detail respectively below.
Fig. 1 is the preferably schematic flow sheet of approaches to IM of the application's the first, and this flow process comprises:
Step 101: first terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for the information of authorizing the second terminal to be stored in high in the clouds to first terminal, manage.
Step 102: the second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed.
Step 103: the second terminal is uploaded to high in the clouds by the information of the first terminal after management.
Step 104: if the information of first terminal is upgraded before and after management, the information of first terminal from high in the clouds receives the renewal of this terminal.
In above-mentioned steps 104, if the information of first terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds at first terminal before, first terminal can also receive update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, to high in the clouds, send download request, then, the information from high in the clouds receives the renewal of this terminal.
Below by a concrete application scenarios to the first shown in Fig. 1 preferably approaches to IM be illustrated.Application scenarios is: user A is used terminal A, and user B is used terminal B, and the user A information that initiatively authorized user B is stored in high in the clouds to terminal A manages.
Method shown in application drawing 1 arranges a cloud help menu in terminal A.User A enters the phone number of input terminal B after cloud help menu, then click " mandate " option, terminal A will detect number and the click of user A to " mandate " option of the terminal B of user A input, and to high in the clouds, sends accordingly the authorization requests of the number that carries terminal B.When terminal A initiates authorization requests to high in the clouds, acquiescence uploads to high in the clouds by the information of terminal A before this, and these information comprise: associated person information, picture, video, schedule, memorandum, voice, video etc.
High in the clouds receives that after the authorization requests of A initiation, the information that terminal A is stored in to high in the clouds is handed down to terminal B, now, has two sets of data in terminal B, and a set of is the data of terminal A, and a set of is the data of terminal B.In order to prevent information confusion and misoperation, can pass through Sandboxing (also referred to as sandbox technology), the data of terminal A are downloaded in sandbox, then edit.
After having edited, terminal B uploads to high in the clouds by the information of terminal A, high in the clouds compares the information of the amended terminal A of terminal B and the information of the terminal A storing before, if there is renewal, store the information after upgrading in high in the clouds, and issue update notification to terminal A, if do not upgraded, without issuing.Terminal A receives after update notification, can point out user A, and the option of " synchronously " and " asynchronous " is provided to user A.If user A selects " synchronously ", terminal A sends download request to high in the clouds, can will download to terminal A through the amended all the elements of terminal B; If user A selects " asynchronous ", terminal A does not send download request to high in the clouds.
Fig. 2 is the preferably schematic flow sheet of approaches to IM of the application's the second, and this flow process comprises:
Step 201: first terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal, for asking the second terminal to this authorization terminal, the information of the second terminal to be managed in this authorization requests.
Step 202: the second terminal receives described authorization requests from high in the clouds, confirms to high in the clouds return authorization, and the information of this terminal is uploaded to high in the clouds.
Step 203: first terminal receives the information of the second terminal from high in the clouds, and described information is managed.
Step 204: first terminal is uploaded to high in the clouds by the information of the second terminal after management;
Step 205: if the information of the second terminal is upgraded before and after management, the information of the second terminal from high in the clouds receives the renewal of this terminal.
In above-mentioned steps 205, if the information of the second terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds in the second terminal before, the second terminal can also receive update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, to high in the clouds, send download request, then, the information from high in the clouds receives the renewal of this terminal.
Below by a concrete application scenarios to the second shown in Fig. 2 preferably approaches to IM be illustrated.Application scenarios is: user A is used terminal A, and user B is used terminal B, and user B initiates authorization requests, and the information that request is stored in high in the clouds to terminal A manages.For example: old man does not know the function that mobile phone has cloud to help, and now, old man's children can initiate the authorization requests that in old man's mobile phone, institute's canned data manages by mobile phone, to realize, institute's canned data in older mobile phone are managed.Particularly:
Method shown in application drawing 2 arranges a cloud help menu in terminal B.User B enters the phone number of input terminal A after cloud help menu, then click " request is authorized " option, terminal B will detect number and the click of user A to " request is authorized " option of the terminal A of user B input, and to high in the clouds, sends accordingly the authorization requests of the number that carries terminal A.Receive after the authorization requests of terminal B in high in the clouds, and this authorization requests is transmitted to terminal A, and terminal A will point out to user A, and the option of " agreeing to authorize " and " disagreeing with mandate " is provided.If terminal A detects user A and selects " agreeing to authorize ", to high in the clouds return authorization, confirm, subsequently, the information of high in the clouds automatic acquisition terminal A is also handed down to B.
After the information of terminal B editor terminal A, upload to high in the clouds, high in the clouds compares the information of the amended terminal A of terminal B and the information of the terminal A storing before, if there is renewal, store the information after upgrading in high in the clouds, and issue update notification to terminal A, if do not upgraded, without issuing.Terminal A receives after update notification, points out user A, and the option of " synchronously " and " asynchronous " is provided to user A.If user A selects " synchronously ", terminal A sends download request to high in the clouds, can will download to terminal A through the amended all the elements of terminal B; If user A selects " asynchronous ", terminal A does not send download request to high in the clouds.
According to the method, user A only need click and determine that the content that (being once to determine terminal B to authorize, is once to determine the information after upgrading to carry out synchronously) just can upgrade children stores in the mobile phone of oneself for twice on terminal A.
Fig. 3 is the third schematic flow sheet of approaches to IM preferably of the application, and this flow process comprises:
Step 301: first terminal arranges password beyond the clouds, the information that this password is stored in high in the clouds for the terminal of authorizing by described password authentication to first terminal manages.
Step 302: the second terminal sends authorization requests to high in the clouds, carries unique identification and the password of first terminal in this authorization requests, for the information of asking high in the clouds, to this authorization terminal, first terminal is stored in to high in the clouds, manage.
Step 303: if the password in described authorization requests is identical with the password that the first equipment arranges beyond the clouds, the second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed.
Step 304: the second terminal is uploaded to high in the clouds by the information of the first terminal after management.
After step 304, can also comprise step 305: if the information of first terminal is upgraded before and after management, first terminal can also receive update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, if the renewal indication of user's input detected, to high in the clouds, send download request, and the information from high in the clouds receives the renewal of this terminal; If the refusal of user's input detected, upgrade indication, to high in the clouds, send refusal updating message.
When concrete application, user A and user B can arrange mutually a password beyond the clouds, for the other side, access at any time the information in own terminal.
In the application, the information of terminal is managed and is comprised: to the various information such as the address list of terminal, schedule, task, picture, audio frequency, video, note increase, the operation such as modification, deletion.
Present techniques scheme can be applied to any terminal equipment that possesses communication function.
The approaches to IM that the application proposes can be used for, to the information management in the mobile phones such as the unfamiliar the elderly of cell-phone function, child, also can be used for information sharing between young man.Especially the elderly, children have bought mobile phone to old man sometimes, and due to too high-end, UI application is too fancy, and the elderly can not use, and by present techniques scheme, children can edit the information such as address list by own terminal help old man.
The foregoing is only the application's preferred embodiment, not in order to limit the application, all within the application's spirit and principle, any modification of making, be equal to replacement, improvement etc., within all should being included in the scope of the application's protection.

Claims (6)

1. an approaches to IM, is characterized in that, comprising:
First terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for the information of authorizing the second terminal to be stored in high in the clouds to first terminal, manages;
The second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed;
The second terminal is uploaded to high in the clouds by the information of the first terminal after management;
If the information of first terminal is upgraded before and after management, the information of first terminal from high in the clouds receives the renewal of this terminal.
2. method according to claim 1, is characterized in that:
If the information of first terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds at first terminal before, the method further comprises:
First terminal receives update notification from high in the clouds, and points out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, sends download request to high in the clouds.
3. an approaches to IM, is characterized in that, comprising:
First terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for asking the second terminal to this authorization terminal, the information of the second terminal to be managed;
The second terminal receives described authorization requests from high in the clouds, confirm, and the information of this terminal is uploaded to high in the clouds to high in the clouds return authorization;
First terminal receives the information of the second terminal from high in the clouds, and described information is managed;
First terminal is uploaded to high in the clouds by the information of the second terminal after management;
If the information of the second terminal is upgraded before and after management, the information of the second terminal from high in the clouds receives the renewal of this terminal.
4. method according to claim 3, is characterized in that:
If the information of the second terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds in the second terminal before, the method further comprises:
The second terminal receives update notification from high in the clouds, and points out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, sends download request to high in the clouds.
5. an approaches to IM, is characterized in that, comprising:
First terminal arranges password beyond the clouds, and the information that this password is stored in high in the clouds for the terminal of authorizing by described password authentication to first terminal manages;
The second terminal sends authorization requests to high in the clouds, carries unique identification and the password of first terminal in this authorization requests, for the information of asking high in the clouds, to this authorization terminal, first terminal is stored in to high in the clouds, manages;
If the password in described authorization requests is identical with the password that the first equipment arranges beyond the clouds, the second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed;
The second terminal is uploaded to high in the clouds by the information of the first terminal after management.
6. method according to claim 5, is characterized in that, after the second terminal is uploaded to high in the clouds by the information of the first terminal after management, further comprises:
If the information of first terminal is upgraded before and after management, first terminal receives update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, if the renewal indication of user's input detected, to high in the clouds, send download request, and the information from high in the clouds receives the renewal of this terminal; If the refusal of user's input detected, upgrade indication, to high in the clouds, send refusal updating message.
CN201210294881.3A 2012-08-17 2012-08-17 Information management method and equipment Active CN103595752B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210294881.3A CN103595752B (en) 2012-08-17 2012-08-17 Information management method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210294881.3A CN103595752B (en) 2012-08-17 2012-08-17 Information management method and equipment

Publications (2)

Publication Number Publication Date
CN103595752A true CN103595752A (en) 2014-02-19
CN103595752B CN103595752B (en) 2021-03-16

Family

ID=50085734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210294881.3A Active CN103595752B (en) 2012-08-17 2012-08-17 Information management method and equipment

Country Status (1)

Country Link
CN (1) CN103595752B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905569A (en) * 2014-04-28 2014-07-02 深圳市康凯斯信息技术有限公司 Senior citizen mobile phone remote control method and system
WO2015184924A1 (en) * 2014-11-13 2015-12-10 中兴通讯股份有限公司 Method for implementing remote assistance between terminals, service assistance server and device
CN106028314A (en) * 2016-04-26 2016-10-12 广东小天才科技有限公司 Method and device for adding contact to white list

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1635733A (en) * 2004-12-20 2005-07-06 丁力 A method of user authentication for data storage of electronic visiting card data center
CN1870771A (en) * 2005-10-21 2006-11-29 华为技术有限公司 Method for sharing storage space of mobile terminal and its system
CN101009573A (en) * 2006-01-25 2007-08-01 乐金电子(中国)研究开发中心有限公司 The method for managing and sharing of the mobile communication terminal utilizing the GPRS technology
CN101247338A (en) * 2008-03-18 2008-08-20 宇龙计算机通信科技(深圳)有限公司 Authorization method and system for mutual accesses to shared data between mobile terminals
CN101674314A (en) * 2009-10-23 2010-03-17 深圳华为通信技术有限公司 Information sharing method, data server and terminal
US7703142B1 (en) * 2004-05-06 2010-04-20 Sprint Communications Company L.P. Software license authorization system
US20120210315A1 (en) * 2006-06-08 2012-08-16 Vivek Kapadekar Device management in a network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7703142B1 (en) * 2004-05-06 2010-04-20 Sprint Communications Company L.P. Software license authorization system
CN1635733A (en) * 2004-12-20 2005-07-06 丁力 A method of user authentication for data storage of electronic visiting card data center
CN1870771A (en) * 2005-10-21 2006-11-29 华为技术有限公司 Method for sharing storage space of mobile terminal and its system
CN101009573A (en) * 2006-01-25 2007-08-01 乐金电子(中国)研究开发中心有限公司 The method for managing and sharing of the mobile communication terminal utilizing the GPRS technology
US20120210315A1 (en) * 2006-06-08 2012-08-16 Vivek Kapadekar Device management in a network
CN101247338A (en) * 2008-03-18 2008-08-20 宇龙计算机通信科技(深圳)有限公司 Authorization method and system for mutual accesses to shared data between mobile terminals
CN101674314A (en) * 2009-10-23 2010-03-17 深圳华为通信技术有限公司 Information sharing method, data server and terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905569A (en) * 2014-04-28 2014-07-02 深圳市康凯斯信息技术有限公司 Senior citizen mobile phone remote control method and system
WO2015184924A1 (en) * 2014-11-13 2015-12-10 中兴通讯股份有限公司 Method for implementing remote assistance between terminals, service assistance server and device
CN106028314A (en) * 2016-04-26 2016-10-12 广东小天才科技有限公司 Method and device for adding contact to white list
CN106028314B (en) * 2016-04-26 2020-03-24 广东小天才科技有限公司 Method and device for adding contact person to white list

Also Published As

Publication number Publication date
CN103595752B (en) 2021-03-16

Similar Documents

Publication Publication Date Title
US10992781B2 (en) Method, user equipment, server, and apparatus for implementing information sharing
US10938818B2 (en) One step security system in a network storage system
US7920856B2 (en) Method and system for hosted mobile management service architecture
CN104137587B (en) A kind of method and terminal device for sending, receiving user data
KR101854365B1 (en) SYSTEM AND METHOD FOR MANAGING Social Network Service ACCOUNT BASED ON PHONE NUMBER
US11163466B2 (en) Data migration synchronization process using a manifest from a source device to a new destination device
CN103946845A (en) Client application file access
CN105431816A (en) Synchronizing device association data among computing devices
CN107209678A (en) System and method for the adaptive clone of mobile device
CN103595752A (en) Information management method
US9516095B2 (en) Data management system and method for displaying data
CN104125250A (en) System and method for pushing communication terminal configuration file
EP3018594A1 (en) Network system and control method
TWI531910B (en) Data management method, computer program product and managing server
TWI602066B (en) Method and system for automatically downloading program
CN105378654A (en) Service profile maintenance
KR101189854B1 (en) Server, Method, and Recording Medium for downloading Application corresponding to Operating System
KR20130117509A (en) A method and a server for managing information of a portable terminal, and the portable terminal therefor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant