CN103595752A - Information management method - Google Patents
Information management method Download PDFInfo
- Publication number
- CN103595752A CN103595752A CN201210294881.3A CN201210294881A CN103595752A CN 103595752 A CN103595752 A CN 103595752A CN 201210294881 A CN201210294881 A CN 201210294881A CN 103595752 A CN103595752 A CN 103595752A
- Authority
- CN
- China
- Prior art keywords
- terminal
- clouds
- information
- renewal
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses an information management method. The method comprises: a first terminal sends an authorization request to a cloud end, wherein the authorization request carries the only identification of a second terminal for authorizing the second terminal to manage the information stored in the cloud end by the first terminal; the second terminal receives the information stored in the cloud end by the first terminal from the cloud end and manages the information; the second terminal uploads the managed information of the first terminal to the cloud end; and if the information of the first terminal is updated before and after the management, the first terminal receives updated information of the terminal from the cloud end. The invention also discloses another two information management methods. By applying the technical scheme disclosed by the invention, the information of one terminal can be managed by another terminal.
Description
Technical field
The application relates to wireless communication technology field, particularly a kind of approaches to IM.
Background technology
Along with the extensive use of various electronic equipments, people's canned data in electronic equipment is more and more, and these information comprise: address list, schedule, task, picture, audio frequency, video, note etc.
For canned data in electronic equipment being managed to ,Ge manufacturer, proposed one after another solution separately, existing several typical technology have been carried out to brief description below.
Personal information manager (PIM, Personal Information Manager) be the software of a class for personal information is managed, typically have: Microsoft Outlook, Outlook Express, IBM Lotus Notes etc., these softwares can help the personal information such as its contact addresses of personal management (Contact), schedule (Calendar), task (Task) note (Note) and Email (Email).
NPS/Kies is that Samsung proposes Mobile phone software, and it is for using the user of Samsung equipment that several functions is provided, comprising: backup or transmission data, multimedia file management function etc.Kies also possesses following characteristic: synchronously picture, film, music, contact person etc., an and built-in Marketplace independently, user is synchronized on the mobile phone of oneself after can directly downloading software by Kies, and without using mobile phone login Marketplace; User can connect devices to Kies by Wi-Fi, and synchronizing content; During connection, Kies has new firmware version by automatically prompting user; Can be on Kies add easily and editing equipment contact person, meanwhile, synchronize contact person with Outlook, Google or Yahoo etc.; Can set up music playlist and be synchronized to equipment; Can transmit photo and video to computer.
ITunes is a Digital Media play-back application, is a free application software for Mac and PC, can management and playback digital music and video.It can also download to the new application software of buying of user on this user all equipment and computer automatically.
Summary of the invention
The application provides several approaches to IMs, to realize by a terminal, the information in another terminal is managed.
A kind of approaches to IM that the application provides, comprising:
First terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for the information of authorizing the second terminal to be stored in high in the clouds to first terminal, manages;
The second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed;
The second terminal is uploaded to high in the clouds by the information of the first terminal after management;
If the information of first terminal is upgraded before and after management, the information of first terminal from high in the clouds receives the renewal of this terminal.
Preferably, if the information of first terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds at first terminal before, the method may further include:
First terminal receives update notification from high in the clouds, and points out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, sends download request to high in the clouds.
The another kind of approaches to IM that the application provides, comprising:
First terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for asking the second terminal to this authorization terminal, the information of the second terminal to be managed;
The second terminal receives described authorization requests from high in the clouds, confirm, and the information of this terminal is uploaded to high in the clouds to high in the clouds return authorization;
First terminal receives the information of the second terminal from high in the clouds, and described information is managed;
First terminal is uploaded to high in the clouds by the information of the second terminal after management;
If the information of the second terminal is upgraded before and after management, the information of the second terminal from high in the clouds receives the renewal of this terminal.
Preferably, if the information of the second terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds in the second terminal before, the method may further include:
The second terminal receives update notification from high in the clouds, and points out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, sends download request to high in the clouds.
The application also provides a kind of approaches to IM, comprising:
First terminal arranges password beyond the clouds, and the information that this password is stored in high in the clouds for the terminal of authorizing by described password authentication to first terminal manages;
The second terminal sends authorization requests to high in the clouds, carries unique identification and the password of first terminal in this authorization requests, for the information of asking high in the clouds, to this authorization terminal, first terminal is stored in to high in the clouds, manages;
If the password in described authorization requests is identical with the password that the first equipment arranges beyond the clouds, the second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed;
The second terminal is uploaded to high in the clouds by the information of the first terminal after management.
Preferably, after the second terminal is uploaded to high in the clouds by the information of the first terminal after management, may further include:
If the information of first terminal is upgraded before and after management, first terminal receives update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, if the renewal indication of user's input detected, to high in the clouds, send download request, and the information from high in the clouds receives the renewal of this terminal; If the refusal of user's input detected, upgrade indication, to high in the clouds, send refusal updating message.
As seen from the above technical solution, the approaches to IM that the application provides, by a server is set beyond the clouds, a platform for exchange of information is beyond the clouds provided, and make a terminal through mandate in the situation that, by the information in another terminal of high in the clouds telemanagement, realized by a terminal information in another terminal has been managed, making personal information management no longer be confined to me manages the information in my electronic equipment, this has not only solved the problem that in different terminals, personal information is managed mutually, facilitated the information sharing between terminal simultaneously.
Accompanying drawing explanation
Fig. 1 is the preferably schematic flow sheet of approaches to IM of the application's the first;
Fig. 2 is the preferably schematic flow sheet of approaches to IM of the application's the second;
Fig. 3 is the third schematic flow sheet of approaches to IM preferably of the application.
Embodiment
For making the application's object, technical scheme and advantage clearer, referring to the accompanying drawing embodiment that develops simultaneously, the application is described in further detail.
Present inventor finds by the analysis to prior art: adopt prior art, PIM for example, can manage the contents such as phone directory in my electronic equipment and note, but, only be confined to me the information in my electronic equipment is managed, can not access or manage the information in other people electronic equipment.
For this reason, the application proposes a kind of approaches to IM, and its main thought is: a server is set beyond the clouds, a platform for exchange of information is beyond the clouds provided, a terminal is through mandate in the situation that, by the information in another terminal of high in the clouds telemanagement.
Based on above-mentioned main thought, the application provides three kinds of preferably approaches to IMs, is described in detail respectively below.
Fig. 1 is the preferably schematic flow sheet of approaches to IM of the application's the first, and this flow process comprises:
Step 101: first terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for the information of authorizing the second terminal to be stored in high in the clouds to first terminal, manage.
Step 102: the second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed.
Step 103: the second terminal is uploaded to high in the clouds by the information of the first terminal after management.
Step 104: if the information of first terminal is upgraded before and after management, the information of first terminal from high in the clouds receives the renewal of this terminal.
In above-mentioned steps 104, if the information of first terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds at first terminal before, first terminal can also receive update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, to high in the clouds, send download request, then, the information from high in the clouds receives the renewal of this terminal.
Below by a concrete application scenarios to the first shown in Fig. 1 preferably approaches to IM be illustrated.Application scenarios is: user A is used terminal A, and user B is used terminal B, and the user A information that initiatively authorized user B is stored in high in the clouds to terminal A manages.
Method shown in application drawing 1 arranges a cloud help menu in terminal A.User A enters the phone number of input terminal B after cloud help menu, then click " mandate " option, terminal A will detect number and the click of user A to " mandate " option of the terminal B of user A input, and to high in the clouds, sends accordingly the authorization requests of the number that carries terminal B.When terminal A initiates authorization requests to high in the clouds, acquiescence uploads to high in the clouds by the information of terminal A before this, and these information comprise: associated person information, picture, video, schedule, memorandum, voice, video etc.
High in the clouds receives that after the authorization requests of A initiation, the information that terminal A is stored in to high in the clouds is handed down to terminal B, now, has two sets of data in terminal B, and a set of is the data of terminal A, and a set of is the data of terminal B.In order to prevent information confusion and misoperation, can pass through Sandboxing (also referred to as sandbox technology), the data of terminal A are downloaded in sandbox, then edit.
After having edited, terminal B uploads to high in the clouds by the information of terminal A, high in the clouds compares the information of the amended terminal A of terminal B and the information of the terminal A storing before, if there is renewal, store the information after upgrading in high in the clouds, and issue update notification to terminal A, if do not upgraded, without issuing.Terminal A receives after update notification, can point out user A, and the option of " synchronously " and " asynchronous " is provided to user A.If user A selects " synchronously ", terminal A sends download request to high in the clouds, can will download to terminal A through the amended all the elements of terminal B; If user A selects " asynchronous ", terminal A does not send download request to high in the clouds.
Fig. 2 is the preferably schematic flow sheet of approaches to IM of the application's the second, and this flow process comprises:
Step 201: first terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal, for asking the second terminal to this authorization terminal, the information of the second terminal to be managed in this authorization requests.
Step 202: the second terminal receives described authorization requests from high in the clouds, confirms to high in the clouds return authorization, and the information of this terminal is uploaded to high in the clouds.
Step 203: first terminal receives the information of the second terminal from high in the clouds, and described information is managed.
Step 204: first terminal is uploaded to high in the clouds by the information of the second terminal after management;
Step 205: if the information of the second terminal is upgraded before and after management, the information of the second terminal from high in the clouds receives the renewal of this terminal.
In above-mentioned steps 205, if the information of the second terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds in the second terminal before, the second terminal can also receive update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, to high in the clouds, send download request, then, the information from high in the clouds receives the renewal of this terminal.
Below by a concrete application scenarios to the second shown in Fig. 2 preferably approaches to IM be illustrated.Application scenarios is: user A is used terminal A, and user B is used terminal B, and user B initiates authorization requests, and the information that request is stored in high in the clouds to terminal A manages.For example: old man does not know the function that mobile phone has cloud to help, and now, old man's children can initiate the authorization requests that in old man's mobile phone, institute's canned data manages by mobile phone, to realize, institute's canned data in older mobile phone are managed.Particularly:
Method shown in application drawing 2 arranges a cloud help menu in terminal B.User B enters the phone number of input terminal A after cloud help menu, then click " request is authorized " option, terminal B will detect number and the click of user A to " request is authorized " option of the terminal A of user B input, and to high in the clouds, sends accordingly the authorization requests of the number that carries terminal A.Receive after the authorization requests of terminal B in high in the clouds, and this authorization requests is transmitted to terminal A, and terminal A will point out to user A, and the option of " agreeing to authorize " and " disagreeing with mandate " is provided.If terminal A detects user A and selects " agreeing to authorize ", to high in the clouds return authorization, confirm, subsequently, the information of high in the clouds automatic acquisition terminal A is also handed down to B.
After the information of terminal B editor terminal A, upload to high in the clouds, high in the clouds compares the information of the amended terminal A of terminal B and the information of the terminal A storing before, if there is renewal, store the information after upgrading in high in the clouds, and issue update notification to terminal A, if do not upgraded, without issuing.Terminal A receives after update notification, points out user A, and the option of " synchronously " and " asynchronous " is provided to user A.If user A selects " synchronously ", terminal A sends download request to high in the clouds, can will download to terminal A through the amended all the elements of terminal B; If user A selects " asynchronous ", terminal A does not send download request to high in the clouds.
According to the method, user A only need click and determine that the content that (being once to determine terminal B to authorize, is once to determine the information after upgrading to carry out synchronously) just can upgrade children stores in the mobile phone of oneself for twice on terminal A.
Fig. 3 is the third schematic flow sheet of approaches to IM preferably of the application, and this flow process comprises:
Step 301: first terminal arranges password beyond the clouds, the information that this password is stored in high in the clouds for the terminal of authorizing by described password authentication to first terminal manages.
Step 302: the second terminal sends authorization requests to high in the clouds, carries unique identification and the password of first terminal in this authorization requests, for the information of asking high in the clouds, to this authorization terminal, first terminal is stored in to high in the clouds, manage.
Step 303: if the password in described authorization requests is identical with the password that the first equipment arranges beyond the clouds, the second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed.
Step 304: the second terminal is uploaded to high in the clouds by the information of the first terminal after management.
After step 304, can also comprise step 305: if the information of first terminal is upgraded before and after management, first terminal can also receive update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, if the renewal indication of user's input detected, to high in the clouds, send download request, and the information from high in the clouds receives the renewal of this terminal; If the refusal of user's input detected, upgrade indication, to high in the clouds, send refusal updating message.
When concrete application, user A and user B can arrange mutually a password beyond the clouds, for the other side, access at any time the information in own terminal.
In the application, the information of terminal is managed and is comprised: to the various information such as the address list of terminal, schedule, task, picture, audio frequency, video, note increase, the operation such as modification, deletion.
Present techniques scheme can be applied to any terminal equipment that possesses communication function.
The approaches to IM that the application proposes can be used for, to the information management in the mobile phones such as the unfamiliar the elderly of cell-phone function, child, also can be used for information sharing between young man.Especially the elderly, children have bought mobile phone to old man sometimes, and due to too high-end, UI application is too fancy, and the elderly can not use, and by present techniques scheme, children can edit the information such as address list by own terminal help old man.
The foregoing is only the application's preferred embodiment, not in order to limit the application, all within the application's spirit and principle, any modification of making, be equal to replacement, improvement etc., within all should being included in the scope of the application's protection.
Claims (6)
1. an approaches to IM, is characterized in that, comprising:
First terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for the information of authorizing the second terminal to be stored in high in the clouds to first terminal, manages;
The second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed;
The second terminal is uploaded to high in the clouds by the information of the first terminal after management;
If the information of first terminal is upgraded before and after management, the information of first terminal from high in the clouds receives the renewal of this terminal.
2. method according to claim 1, is characterized in that:
If the information of first terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds at first terminal before, the method further comprises:
First terminal receives update notification from high in the clouds, and points out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, sends download request to high in the clouds.
3. an approaches to IM, is characterized in that, comprising:
First terminal sends authorization requests to high in the clouds, carries the unique identification of the second terminal in this authorization requests, for asking the second terminal to this authorization terminal, the information of the second terminal to be managed;
The second terminal receives described authorization requests from high in the clouds, confirm, and the information of this terminal is uploaded to high in the clouds to high in the clouds return authorization;
First terminal receives the information of the second terminal from high in the clouds, and described information is managed;
First terminal is uploaded to high in the clouds by the information of the second terminal after management;
If the information of the second terminal is upgraded before and after management, the information of the second terminal from high in the clouds receives the renewal of this terminal.
4. method according to claim 3, is characterized in that:
If the information of the second terminal is upgraded before and after management, receive the information the renewal of this terminal from high in the clouds in the second terminal before, the method further comprises:
The second terminal receives update notification from high in the clouds, and points out the information after the renewal that there is this terminal in high in the clouds to user, after the renewal indication that user's input detected, sends download request to high in the clouds.
5. an approaches to IM, is characterized in that, comprising:
First terminal arranges password beyond the clouds, and the information that this password is stored in high in the clouds for the terminal of authorizing by described password authentication to first terminal manages;
The second terminal sends authorization requests to high in the clouds, carries unique identification and the password of first terminal in this authorization requests, for the information of asking high in the clouds, to this authorization terminal, first terminal is stored in to high in the clouds, manages;
If the password in described authorization requests is identical with the password that the first equipment arranges beyond the clouds, the second terminal receives first terminal and is stored in the information in high in the clouds from high in the clouds, and described information is managed;
The second terminal is uploaded to high in the clouds by the information of the first terminal after management.
6. method according to claim 5, is characterized in that, after the second terminal is uploaded to high in the clouds by the information of the first terminal after management, further comprises:
If the information of first terminal is upgraded before and after management, first terminal receives update notification from high in the clouds, and point out the information after the renewal that there is this terminal in high in the clouds to user, if the renewal indication of user's input detected, to high in the clouds, send download request, and the information from high in the clouds receives the renewal of this terminal; If the refusal of user's input detected, upgrade indication, to high in the clouds, send refusal updating message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210294881.3A CN103595752B (en) | 2012-08-17 | 2012-08-17 | Information management method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210294881.3A CN103595752B (en) | 2012-08-17 | 2012-08-17 | Information management method and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103595752A true CN103595752A (en) | 2014-02-19 |
CN103595752B CN103595752B (en) | 2021-03-16 |
Family
ID=50085734
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210294881.3A Active CN103595752B (en) | 2012-08-17 | 2012-08-17 | Information management method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103595752B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905569A (en) * | 2014-04-28 | 2014-07-02 | 深圳市康凯斯信息技术有限公司 | Senior citizen mobile phone remote control method and system |
WO2015184924A1 (en) * | 2014-11-13 | 2015-12-10 | 中兴通讯股份有限公司 | Method for implementing remote assistance between terminals, service assistance server and device |
CN106028314A (en) * | 2016-04-26 | 2016-10-12 | 广东小天才科技有限公司 | Method and device for adding contact to white list |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1635733A (en) * | 2004-12-20 | 2005-07-06 | 丁力 | A method of user authentication for data storage of electronic visiting card data center |
CN1870771A (en) * | 2005-10-21 | 2006-11-29 | 华为技术有限公司 | Method for sharing storage space of mobile terminal and its system |
CN101009573A (en) * | 2006-01-25 | 2007-08-01 | 乐金电子(中国)研究开发中心有限公司 | The method for managing and sharing of the mobile communication terminal utilizing the GPRS technology |
CN101247338A (en) * | 2008-03-18 | 2008-08-20 | 宇龙计算机通信科技(深圳)有限公司 | Authorization method and system for mutual accesses to shared data between mobile terminals |
CN101674314A (en) * | 2009-10-23 | 2010-03-17 | 深圳华为通信技术有限公司 | Information sharing method, data server and terminal |
US7703142B1 (en) * | 2004-05-06 | 2010-04-20 | Sprint Communications Company L.P. | Software license authorization system |
US20120210315A1 (en) * | 2006-06-08 | 2012-08-16 | Vivek Kapadekar | Device management in a network |
-
2012
- 2012-08-17 CN CN201210294881.3A patent/CN103595752B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7703142B1 (en) * | 2004-05-06 | 2010-04-20 | Sprint Communications Company L.P. | Software license authorization system |
CN1635733A (en) * | 2004-12-20 | 2005-07-06 | 丁力 | A method of user authentication for data storage of electronic visiting card data center |
CN1870771A (en) * | 2005-10-21 | 2006-11-29 | 华为技术有限公司 | Method for sharing storage space of mobile terminal and its system |
CN101009573A (en) * | 2006-01-25 | 2007-08-01 | 乐金电子(中国)研究开发中心有限公司 | The method for managing and sharing of the mobile communication terminal utilizing the GPRS technology |
US20120210315A1 (en) * | 2006-06-08 | 2012-08-16 | Vivek Kapadekar | Device management in a network |
CN101247338A (en) * | 2008-03-18 | 2008-08-20 | 宇龙计算机通信科技(深圳)有限公司 | Authorization method and system for mutual accesses to shared data between mobile terminals |
CN101674314A (en) * | 2009-10-23 | 2010-03-17 | 深圳华为通信技术有限公司 | Information sharing method, data server and terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905569A (en) * | 2014-04-28 | 2014-07-02 | 深圳市康凯斯信息技术有限公司 | Senior citizen mobile phone remote control method and system |
WO2015184924A1 (en) * | 2014-11-13 | 2015-12-10 | 中兴通讯股份有限公司 | Method for implementing remote assistance between terminals, service assistance server and device |
CN106028314A (en) * | 2016-04-26 | 2016-10-12 | 广东小天才科技有限公司 | Method and device for adding contact to white list |
CN106028314B (en) * | 2016-04-26 | 2020-03-24 | 广东小天才科技有限公司 | Method and device for adding contact person to white list |
Also Published As
Publication number | Publication date |
---|---|
CN103595752B (en) | 2021-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10992781B2 (en) | Method, user equipment, server, and apparatus for implementing information sharing | |
US10938818B2 (en) | One step security system in a network storage system | |
US7920856B2 (en) | Method and system for hosted mobile management service architecture | |
CN104137587B (en) | A kind of method and terminal device for sending, receiving user data | |
KR101854365B1 (en) | SYSTEM AND METHOD FOR MANAGING Social Network Service ACCOUNT BASED ON PHONE NUMBER | |
US11163466B2 (en) | Data migration synchronization process using a manifest from a source device to a new destination device | |
CN103946845A (en) | Client application file access | |
CN105431816A (en) | Synchronizing device association data among computing devices | |
CN107209678A (en) | System and method for the adaptive clone of mobile device | |
CN103595752A (en) | Information management method | |
US9516095B2 (en) | Data management system and method for displaying data | |
CN104125250A (en) | System and method for pushing communication terminal configuration file | |
EP3018594A1 (en) | Network system and control method | |
TWI531910B (en) | Data management method, computer program product and managing server | |
TWI602066B (en) | Method and system for automatically downloading program | |
CN105378654A (en) | Service profile maintenance | |
KR101189854B1 (en) | Server, Method, and Recording Medium for downloading Application corresponding to Operating System | |
KR20130117509A (en) | A method and a server for managing information of a portable terminal, and the portable terminal therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |