CN110366164B - Method for remotely controlling terminal, server, terminal and computing equipment - Google Patents

Method for remotely controlling terminal, server, terminal and computing equipment Download PDF

Info

Publication number
CN110366164B
CN110366164B CN201910641651.1A CN201910641651A CN110366164B CN 110366164 B CN110366164 B CN 110366164B CN 201910641651 A CN201910641651 A CN 201910641651A CN 110366164 B CN110366164 B CN 110366164B
Authority
CN
China
Prior art keywords
terminal
network locking
information
locking information
data set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910641651.1A
Other languages
Chinese (zh)
Other versions
CN110366164A (en
Inventor
汤付康
程涛
张森林
马学军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fise Technology Holding Co ltd
Original Assignee
Shenzhen Fise Technology Holding Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fise Technology Holding Co ltd filed Critical Shenzhen Fise Technology Holding Co ltd
Priority to CN201910641651.1A priority Critical patent/CN110366164B/en
Publication of CN110366164A publication Critical patent/CN110366164A/en
Application granted granted Critical
Publication of CN110366164B publication Critical patent/CN110366164B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention is suitable for the technical field of computers, and provides a method for remotely controlling a terminal, which comprises the following steps: acquiring equipment information of a terminal; matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information; and sending the network locking information to the terminal, wherein the network locking information is used for indicating the terminal to adjust the current use permission. Network locking information of the terminal is matched from a pre-configured network locking information database based on equipment information of the terminal, and the network locking information is sent to the terminal, so that flexibility of a network locking mode and network locking time is achieved, and flexibility of use of a network locking function is improved. In addition, the invention also provides a server, a terminal, a computing device and a storage medium.

Description

Method for remotely controlling terminal, server, terminal and computing equipment
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a method for remotely controlling a terminal, a server, a terminal, a computing device and a storage medium.
Background
The traditional network locking function is mainly reflected in limiting the user terminal to use the Subscriber Identity Module (SIM) card of other operators. In some countries, where the relevant laws allow the existence of a network-locking function while limiting the time of retention of the network-locking function, the operator must unlock the expired terminal when the time for the user to use the terminal reaches the time stipulated by the laws.
At present, with the maturity and wide commercial use of mobile communication technology, competition among different operators is intensified, and operators usually provide marketing modes such as installment payment, first payment, and the like for maintaining customers. Meanwhile, in order to maintain the benefits of the operators, the operators want to limit the use rights of the users through remote locking and unlocking. However, the locking mode and the locking time in the current network locking use process are fixed, which cannot meet the requirement of service development of operators and improve the flexibility of network locking function use.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, a server, a terminal, a computing device, and a storage medium for remotely controlling a terminal, so as to solve the problem in the prior art that both the network locking mode and the network locking time are fixed, implement remote locking and unlocking, and improve flexibility of use of the network locking function.
A first aspect of an embodiment of the present invention provides a method for remotely controlling a terminal, where the method is used for a server and includes:
acquiring equipment information of a terminal;
matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information;
and sending the network locking information to the terminal, wherein the network locking information is used for indicating the terminal to adjust the current use permission.
Optionally, the device information includes a device model, a client identification module number, and an international terminal identification code;
the matching of the network locking information of the terminal from a pre-configured network locking information database based on the equipment information comprises:
traversing a pre-configured network locking information database based on the equipment model to acquire a first data set matched with the equipment model;
inquiring the number of the client identification module from the first data set to obtain a second data set containing the number of the client identification module;
and generating the network locking information based on the state information of the client identification module number and the international terminal identification code contained in the second data set.
Optionally, before the matching network locking information of the terminal from a pre-configured network locking information database based on the device information, the method includes:
configuring the network locking information database based on the equipment information of the terminal;
and updating the network locking information database according to the state information of the number of the client identification module.
Optionally, the network locking information includes a blacklist of terminal functions for locking the terminal or a white list of terminal functions normally used;
the generating the network locking information based on the state information of the customer identification module number and the international terminal identification code contained in the second data set comprises:
if the state information of the number of the client identification module identifies the activation state and the international terminal identification code contained in the second data set is matched with the international terminal identification code of the terminal, generating a white list for normally using the terminal function;
and if the state information of the client identification module number identifies a locking state or the international terminal identification code contained in the second data set is not matched with the international terminal identification code of the terminal, generating a blacklist for locking the terminal function.
A second aspect of an embodiment of the present invention provides a method for remotely controlling a terminal, where the method is used for the terminal and includes:
receiving network locking information sent by a server; the network locking information is obtained by the server through matching from a pre-configured network locking information database based on the equipment information of the terminal;
and adjusting the current use permission based on the network locking information.
Optionally, the adjusting the current usage right based on the network locking information includes:
if the network locking information is a white list which normally uses the terminal functions of the terminal, enabling the terminal functions in the white list to be in an activated state;
and if the network locking information is a blacklist for locking the terminal function, enabling the terminal function in the blacklist to enter a machine locking state.
A third aspect of an embodiment of the present invention provides a server, including:
the acquisition module is used for acquiring the equipment information of the terminal;
the matching module is used for matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information;
and the sending module is used for sending the network locking information to the terminal, and the network locking information is used for indicating the terminal to adjust the current use permission.
A fourth aspect of the present invention provides a server comprising:
the acquisition module is used for acquiring the equipment information of the terminal;
the matching module is used for matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information;
and the sending module is used for sending the network locking information to the terminal, and the network locking information is used for indicating the terminal to adjust the current use permission.
A fifth aspect of the present invention provides a terminal, including: the receiving module is used for receiving the network locking information sent by the server; the network locking information is obtained by the server through matching from a pre-configured network locking information database based on the equipment information of the terminal;
and the adjusting module is used for adjusting the current use permission based on the network locking information.
A sixth aspect of the present invention provides a computing device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the method for remotely controlling a terminal as described in any of the above embodiments when executing the computer program.
A seventh aspect of the embodiments of the present invention provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the method for remotely controlling a terminal according to any one of the above embodiments.
Compared with the prior art, the embodiment of the invention has the following beneficial effects: acquiring equipment information of a terminal; matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information;
and sending the network locking information to the terminal, wherein the network locking information is used for indicating the terminal to adjust the current use permission. Network locking information of the terminal is matched from a pre-configured network locking information database based on equipment information of the terminal, and the network locking information is sent to the terminal, so that flexibility of a network locking mode and network locking time is achieved, and flexibility of use of a network locking function is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of an implementation of a method for remotely controlling a terminal according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating an embodiment of S102 in FIG. 1;
fig. 3 is a flowchart of an embodiment of S1023 in fig. 2;
fig. 4 is a flowchart of a method for remotely controlling a terminal according to a second embodiment of the present invention;
fig. 5 is a flowchart of an implementation of a method for remotely controlling a terminal according to a third embodiment of the present invention;
FIG. 6 is a flowchart illustrating an embodiment of S502 in FIG. 5;
FIG. 7 is a functional block diagram of a server provided by the present invention;
fig. 8 is a functional block diagram of a terminal provided by the present invention;
FIG. 9 is a schematic diagram of a computing device provided by the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples. As shown in fig. 1, it is a flowchart of an implementation of a method for remotely controlling a terminal according to a first embodiment of the present invention, and an execution subject of this embodiment is a server. The details are as follows:
s101, acquiring equipment information of the terminal.
Generally, after an operator or an equipment manufacturer binds a customer identification module with an international terminal identification code, a network locking function of a terminal is set; in the embodiment of the present disclosure, remotely controlling the terminal means remotely controlling the network locking function of the terminal, for example, remotely locking or unlocking. Specifically, remote locking or unlocking is realized according to the device information of the terminal, and thus, the device information of the terminal is first acquired. Specifically, in the embodiment of the present disclosure, the terminal includes, but is not limited to, a Mobile device such as a Mobile phone and a pad that can communicate, and the device information of the terminal includes, but is not limited to, a device model, a subscriber Identity module (SIM card) number, an International Mobile Equipment Identity (IMEI), and the like.
And S102, matching the network locking information of the terminal from a pre-configured network locking information database based on the equipment information.
Specifically, in this embodiment, the network locking information of the terminal includes status information of the number of the subscriber identity module and a bound international terminal identity, and the status information of the number of the subscriber identity module is determined to determine whether the number of the subscriber identity module needs to be locked, and then the bound international terminal identity determines a corresponding locking code or unlocking code. In this embodiment, a network locking information database is preconfigured, wherein the network locking information database is preconfigured based on the device information of the terminal, and is continuously updated according to the status information of the number of the subscriber identity module. Therefore, the network locking information of the terminal can be matched from a pre-configured network locking information database based on the equipment information.
Specifically, as shown in fig. 2, it is a flowchart of the specific implementation of S102 in fig. 1. As shown in fig. 2, S102 includes:
and S1021, traversing a pre-configured network locking information database based on the equipment model, and acquiring a first data set matched with the equipment model.
It can be understood that the same operator may sell many types of terminals at the same time, and each type of terminal is different, so that when the server configures the network locking information database in advance, the server needs to group the terminals according to the types of the terminals, the server allocates a data table to each group of types of terminals, and the types of devices in the same data table are the same, thereby forming a first data set.
S1022, query the number of the subscriber identity module from the first data set, and obtain a second data set including the number of the subscriber identity module.
In the process of a pre-configured network locking information database, after a first data set is determined based on the model of the terminal equipment, and after the terminal equipment is sold, a subscriber identity module number (SIM card number) of the terminal equipment is recorded into the corresponding first data set, so that a second data set is obtained. When network locking information is determined, the second number set containing the number of the customer identification module can be obtained by inquiring the number of the customer identification module from the first data set.
And S1023, generating the network locking information based on the state information of the client identification module number and the international terminal identification code contained in the second data set.
The client identification module number comprises an activation state and a locking state, and specifically, in the process of initial configuration of the network locking information data, the state information of the client identification module number is the locking state. When the subscriber completes the activation registration based on the registration information provided by the operator, the subscriber identity module number is in an activated state, and at this time, the state information of the subscriber identity module number needs to be updated in the network locking information database. Further, after the number of the client identification module is activated for use, the data sent by the number of the client identification module is received, and the international terminal identification code corresponding to the terminal is entered. Specifically, in this embodiment, the network locking information includes a blacklist of terminal functions for locking the terminal or a white list of terminal functions normally used.
Specifically, as shown in fig. 3, it is a flowchart of the specific implementation of S1023 in fig. 2. As can be seen from fig. 3, S1023 includes:
s301, if the state information of the customer identification module number identifies the activation state and the international terminal identification code contained in the second data set is matched with the international terminal identification code of the terminal, a white list for normally using the terminal function is generated.
Generally, the customer identification module number and the international terminal identification code of the same terminal are bound together, and the international terminal identification code of each terminal is unique and is not changed, so that it is determined whether a terminal has a right to use the customer identification module number by verifying whether the international terminal identification code of the terminal corresponding to the customer identification module number matches the international terminal identification code pre-configured in the network locking information database.
S302, if the state information of the subscriber identity module number identifies a locked state, or the international terminal identity included in the second data set is not matched with the international terminal identity of the terminal, generating a blacklist for locking the terminal function.
Generally, when restricting the terminal usage right, it is necessary to selectively restrict part of the terminal functions according to the requirements provided by the operator, for example, the operator may select a social application to be placed under the flag, and does not perform the restriction of the usage right. It will be appreciated that the terminal functions included in the white list and the black list may be selected by different operators.
S103, sending the network locking information to the terminal, wherein the network locking information is used for indicating the terminal to adjust the current use permission.
Specifically, the network locking information is converted into a format which can be sent by a webpage, such as a josn format or an html format, and sent to the terminal.
As can be seen from the foregoing embodiments, the method for remotely controlling a terminal according to the present invention includes: acquiring equipment information of a terminal; matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information; and sending the network locking information to the terminal, wherein the network locking information is used for indicating the terminal to adjust the current use permission. Network locking information of the terminal is matched from a pre-configured network locking information database based on equipment information of the terminal, and the network locking information is sent to the terminal, so that flexibility of a network locking mode and network locking time is achieved, and flexibility of use of a network locking function is improved.
Specifically, as shown in fig. 4, it is a flowchart of an implementation of a method for remotely controlling a terminal according to a second embodiment of the present invention, and compared with the embodiment shown in fig. 1, this embodiment has the same implementation processes as S101 and S404-S405 as S102-S103, except that S402-S403 are included before S404, specifically, the implementation processes of S402-S403 are as follows.
S402, configuring the network locking information database based on the terminal equipment information.
Specifically, in this embodiment, the device information of the terminal includes a device model, a client identification module number, and an international terminal identification code, and in the process of configuring the network locking information database, a storage array corresponding to the network locking information database is first established according to the device model, each group includes a data table, and then, after the client identification module number is sold with the terminal, the client identification module number is input into the corresponding data table, and when data of the client identification module number is received, the international terminal identification code of the terminal corresponding to the client identification module number is input into the data table, so as to complete configuration of the network locking information database.
And S403, updating the network locking information database according to the state information of the number of the client identification module.
As can be seen from the foregoing embodiments, the method for remotely controlling a terminal according to the present invention includes: acquiring equipment information of a terminal; matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information; and sending the network locking information to the terminal, wherein the network locking information is used for indicating the terminal to adjust the current use permission. Network locking information of the terminal is matched from a pre-configured network locking information database based on equipment information of the terminal, and the network locking information is sent to the terminal, so that flexibility of a network locking mode and network locking time is achieved, and flexibility of use of a network locking function is improved.
Fig. 5 is a flowchart of an implementation of a method for remotely controlling a terminal according to a third embodiment of the present invention, where an execution subject of this embodiment is a terminal. The details are as follows:
s501, receiving network locking information sent by a server; and the network locking information is obtained by matching the server from a pre-configured network locking information database based on the equipment information of the terminal.
S502, adjusting the current use authority based on the network locking information.
Specifically, after receiving network locking information sent by a server, a terminal generates a locking interface for locking a terminal function according to the network locking information, or starts a currently locked terminal function according to the network locking information. Specifically, the locking interface includes at least one first display frame and at least one second control frame, the first display frame is used for displaying a terminal function for prompting a user to lock, and the second control frame is used for storing a client terminal which is normally used.
Fig. 6 is a flowchart of an implementation of S502 in fig. 5, and as can be seen from fig. 6, S502 includes:
s5021, if the network locking information is a white list that normally uses the terminal function of the terminal, enabling the terminal function in the white list to be in an activated state.
And S5022, if the network locking information is a blacklist for locking the terminal function, enabling the terminal function in the blacklist to enter a locking state.
As can be seen from the above analysis, the method for remotely controlling a terminal according to the present invention includes: receiving network locking information sent by a server; and the network locking information is obtained by matching the server from a pre-configured network locking information database based on the equipment information of the terminal. And adjusting the current use permission based on the network locking information. By receiving the network locking information sent by the server and adjusting the current use permission, the flexibility of the network locking mode and the network locking time is realized, so that the flexibility of the network locking function use is improved.
Fig. 7 is a functional module diagram of a server provided by the present invention. As shown in fig. 7, the server 7 of this embodiment includes: an acquisition module 710, a matching module 720, and a sending module 730. Wherein the content of the first and second substances,
the obtaining module 710 is configured to obtain device information of the terminal.
A matching module 720, configured to match the network locking information of the terminal from a network locking information database configured in advance based on the device information.
A sending module 730, configured to send the network locking information to the terminal, where the network locking information is used to instruct the terminal to adjust the current usage right.
Preferably, the device information includes a device model, a subscriber identity module number, and an international terminal identity; a matching module 720, comprising:
and the first acquisition unit is used for traversing a pre-configured network locking information database based on the equipment model to acquire a first data set matched with the equipment model.
A second obtaining unit, configured to query the client identification module number from the first data set, and obtain a second data set including the client identification module number.
And the generating unit is used for generating the network locking information based on the state information of the client identification module number and the international terminal identification code contained in the second data set.
Preferably, the method further comprises the following steps:
the configuration unit is used for configuring the network locking information database based on the equipment information of the terminal;
and the updating unit is used for updating the network locking information database according to the state information of the number of the client identification module.
Preferably, the network locking information includes a blacklist of terminal functions for locking the terminal or a white list of terminal functions normally used; a generation unit comprising:
and the first generation subunit is configured to generate a white list for normally using the terminal function if the state information of the subscriber identity module number identifies an activation state and an international terminal identity included in the second data set matches the international terminal identity of the terminal.
And the second generation subunit is configured to generate a blacklist for locking the terminal function if the state information of the subscriber identity module number identifies a locked state, or if the international terminal identity included in the second data set is not matched with the international terminal identity of the terminal.
Fig. 8 is a functional module diagram of the terminal provided by the present invention. As shown in fig. 8, the terminal 8 provided in the present embodiment includes: a receiving module 810 and an adjusting module 820. Wherein the content of the first and second substances,
a receiving module 810, configured to receive network locking information sent by a server; and the network locking information is obtained by matching the server from a pre-configured network locking information database based on the equipment information of the terminal.
An adjusting module 820, configured to adjust the current usage right based on the network locking information.
Preferably, the adjusting module 820 includes:
and the activation unit is used for enabling the terminal function in the white list to be in an activated state if the network locking information is the white list which normally uses the terminal function of the terminal.
And the locking unit is used for enabling the terminal functions in the blacklist to enter a locking state if the network locking information is the blacklist for locking the terminal functions.
Fig. 9 is a schematic diagram of a computing device provided by a fourth embodiment of the invention. As shown in fig. 9, the computing device 9 of this embodiment includes: a processor 90, a memory 91 and a computer program 92 stored in the memory 91 and executable on the processor 90, such as a program of a remote control terminal. The steps in the various remote control terminal method embodiments described above, such as steps 101 to 103 shown in fig. 1, or steps 501 to 502 shown in fig. 5, are implemented when the computer program 92 is executed by the processor 90.
Illustratively, the computer program 92 may be partitioned into one or more modules/units that are stored in the memory 91 and executed by the processor 90 to implement the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 92 in the computing device 9. For example, the computer program 92 may be divided into an acquisition module, a matching module, and a transmission module (module in the virtual device), each of which functions specifically as follows:
the acquisition module is used for acquiring the equipment information of the terminal;
the matching module is used for matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information;
and the sending module is used for sending the network locking information to the terminal, and the network locking information is used for indicating the terminal to adjust the current use permission.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of communication units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (9)

1. A method for remotely controlling a terminal, for use in a server, comprising:
acquiring equipment information of a terminal;
matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information;
the network locking information is sent to the terminal and used for indicating the terminal to adjust the current use permission;
the equipment information comprises an equipment model, a client identification module number and an international terminal identification code;
the matching of the network locking information of the terminal from a pre-configured network locking information database based on the equipment information comprises:
traversing a pre-configured network locking information database based on the equipment model to acquire a first data set matched with the equipment model;
inquiring the number of the client identification module from the first data set to obtain a second data set containing the number of the client identification module;
and generating the network locking information based on the state information of the client identification module number and the international terminal identification code contained in the second data set.
2. The method of claim 1, wherein before the matching network locking information of the terminal from a pre-configured network locking information database based on the device information, the method comprises:
configuring the network locking information database based on the equipment information of the terminal;
and updating the network locking information database according to the state information of the number of the client identification module.
3. The method of remotely controlling a terminal as claimed in claim 1, wherein the network locking information includes a blacklist of terminal functions for which the terminal is locked or a whitelist of terminal functions normally used;
the generating the network locking information based on the state information of the customer identification module number and the international terminal identification code contained in the second data set comprises:
if the state information of the number of the client identification module identifies the activation state and the international terminal identification code contained in the second data set is matched with the international terminal identification code of the terminal, generating a white list for normally using the terminal function;
and if the state information of the client identification module number identifies a locking state or the international terminal identification code contained in the second data set is not matched with the international terminal identification code of the terminal, generating a blacklist for locking the terminal function.
4. A method for remotely controlling a terminal, the method comprising:
receiving network locking information sent by a server; the network locking information is obtained by matching the server from a pre-configured network locking information database based on the equipment information of the terminal, wherein the equipment information comprises an equipment model, a client identification module number and an international terminal identification code;
adjusting the current use permission based on the network locking information;
the matching of the server from a pre-configured network locking information database based on the device information of the terminal to obtain the network locking information comprises the following steps:
traversing a pre-configured network locking information database based on the equipment model to acquire a first data set matched with the equipment model;
inquiring the number of the client identification module from the first data set to obtain a second data set containing the number of the client identification module;
and generating the network locking information based on the state information of the client identification module number and the international terminal identification code contained in the second data set.
5. The method of remotely controlling a terminal as claimed in claim 4, wherein said adjusting the current usage right based on said network locking information comprises:
if the network locking information is a white list which normally uses the terminal functions of the terminal, enabling the terminal functions in the white list to be in an activated state;
and if the network locking information is a blacklist for locking the terminal function, enabling the terminal function in the blacklist to enter a machine locking state.
6. A server, comprising:
the terminal comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring equipment information of the terminal, and the equipment information comprises an equipment model, a client identification module number and an international terminal identification code;
the matching module is used for matching network locking information of the terminal from a pre-configured network locking information database based on the equipment information;
the sending module is used for sending the network locking information to the terminal, and the network locking information is used for indicating the terminal to adjust the current use permission;
the matching module includes:
the first acquisition unit is used for traversing a pre-configured network locking information database based on the equipment model to acquire a first data set matched with the equipment model;
a second obtaining unit, configured to query the client identification module number from the first data set, and obtain a second data set including the client identification module number;
and the generating unit is used for generating the network locking information based on the state information of the client identification module number and the international terminal identification code contained in the second data set.
7. A terminal, comprising:
the receiving module is used for receiving the network locking information sent by the server; the network locking information is obtained by matching the server from a pre-configured network locking information database based on the equipment information of the terminal, wherein the equipment information comprises an equipment model, a client identification module number and an international terminal identification code;
the adjusting module is used for adjusting the current use permission based on the network locking information;
the matching of the server from a pre-configured network locking information database based on the device information of the terminal to obtain the network locking information comprises the following steps:
traversing a pre-configured network locking information database based on the equipment model to acquire a first data set matched with the equipment model;
inquiring the number of the client identification module from the first data set to obtain a second data set containing the number of the client identification module;
and generating the network locking information based on the state information of the client identification module number and the international terminal identification code contained in the second data set.
8. A computing device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method of remotely controlling a terminal according to any of claims 1 to 3 when executing the computer program.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method of remotely controlling a terminal according to any one of claims 1 to 3.
CN201910641651.1A 2019-07-16 2019-07-16 Method for remotely controlling terminal, server, terminal and computing equipment Active CN110366164B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910641651.1A CN110366164B (en) 2019-07-16 2019-07-16 Method for remotely controlling terminal, server, terminal and computing equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910641651.1A CN110366164B (en) 2019-07-16 2019-07-16 Method for remotely controlling terminal, server, terminal and computing equipment

Publications (2)

Publication Number Publication Date
CN110366164A CN110366164A (en) 2019-10-22
CN110366164B true CN110366164B (en) 2022-04-22

Family

ID=68220027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910641651.1A Active CN110366164B (en) 2019-07-16 2019-07-16 Method for remotely controlling terminal, server, terminal and computing equipment

Country Status (1)

Country Link
CN (1) CN110366164B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938873B (en) * 2020-07-14 2024-04-16 宇龙计算机通信科技(深圳)有限公司 Network card locking method and device, storage medium and terminal
CN114006808A (en) * 2021-10-08 2022-02-01 中移(杭州)信息技术有限公司 Equipment network locking method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742483A (en) * 2009-12-16 2010-06-16 中兴通讯股份有限公司 Method and system for unlocking locked network of terminal
CN102131182A (en) * 2011-03-14 2011-07-20 中兴通讯股份有限公司 Network locking method and device for mobile terminal
CN106470407A (en) * 2015-08-19 2017-03-01 中国移动通信集团辽宁有限公司沈阳分公司 The method and system that locking/unlocking controls is locked to SIM by data SMS

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742483A (en) * 2009-12-16 2010-06-16 中兴通讯股份有限公司 Method and system for unlocking locked network of terminal
CN102131182A (en) * 2011-03-14 2011-07-20 中兴通讯股份有限公司 Network locking method and device for mobile terminal
CN106470407A (en) * 2015-08-19 2017-03-01 中国移动通信集团辽宁有限公司沈阳分公司 The method and system that locking/unlocking controls is locked to SIM by data SMS

Also Published As

Publication number Publication date
CN110366164A (en) 2019-10-22

Similar Documents

Publication Publication Date Title
US9854431B2 (en) Method, apparatus, and system of distributing data of virtual subscriber identity module
CN109981619A (en) Data capture method, device, medium and electronic equipment
EP3337219B1 (en) Carrier configuration processing method, device and system, and computer storage medium
CN105812479B (en) Request method and device and acquisition method and device for use permission
CN110730153A (en) Account configuration method, device and system of cloud equipment and data processing method
US11206534B2 (en) Method and apparatus for managing bundles of smart secure platform
EP3386167B1 (en) Cloud operation interface sharing method, related device and system
CN104093139A (en) Aerial card-writing method, server and smart card
CN102855539A (en) Information management apparatus and method, and information management apparatus and method
CN105337974A (en) Account authorization method, account login method, account authorization device and client end
CN111163467B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN110366164B (en) Method for remotely controlling terminal, server, terminal and computing equipment
CN106713315B (en) Login method and device of plug-in application program
CN109558710B (en) User login method, device, system and storage medium
CN109150864B (en) Anti-cheating method and device based on secondary authentication
CN106453282B (en) Control method and system of ATM equipment
CN108882344B (en) Network access method, device and system of wireless equipment
CN109842482B (en) Information synchronization method, system and terminal equipment
CN111132131A (en) Number copying method, terminal and storage medium
CN111131324A (en) Login method and device of business system, storage medium and electronic device
CN107396319B (en) A kind of method of wireless network authentication, equipment, storage medium and terminal reclaimer
CN115510496A (en) Database access control method and related device
CN113055254B (en) Address configuration method, device, access server and storage medium
CN113709849A (en) Network access method and device of equipment to be accessed to network, storage medium and electronic device
CN115362700A (en) Method and apparatus for managing events of intelligent security platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant