CN101599949A - Can upgrade the method for a restriction list of a controlled end by a remote-control device - Google Patents

Can upgrade the method for a restriction list of a controlled end by a remote-control device Download PDF

Info

Publication number
CN101599949A
CN101599949A CNA2008101000130A CN200810100013A CN101599949A CN 101599949 A CN101599949 A CN 101599949A CN A2008101000130 A CNA2008101000130 A CN A2008101000130A CN 200810100013 A CN200810100013 A CN 200810100013A CN 101599949 A CN101599949 A CN 101599949A
Authority
CN
China
Prior art keywords
remote
control device
file
list
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008101000130A
Other languages
Chinese (zh)
Inventor
陈泽民
陈伟升
向荣
盖瑞爱尔赛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acer Inc
Original Assignee
Acer Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acer Inc filed Critical Acer Inc
Priority to CNA2008101000130A priority Critical patent/CN101599949A/en
Publication of CN101599949A publication Critical patent/CN101599949A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The present invention is about upgrading the method for a restriction list of a controlled end by a remote-control device.Increase or reduce the method for at least one member on the restriction list of a controlled end by a remote-control device, comprise at first and add this restriction list in this remote-control device editor desire, or desire at least one member's of on this restriction list, deleting data, again by a binding program that is installed on this remote-control device, link this remote-control device address, one control password, and this at least one member's data are a binding file, transmit this binding file to this controlled end by this remote-control device, this controlled end is by this binding file of identification program identification that is installed on this controlled end, and data that automatically will this at least one member add in this restriction list, or delete on this restriction list certainly.

Description

Can upgrade the method for a restriction list of a controlled end by a remote-control device
Technical field
The present invention relates to a kind of method that can upgrade a restriction list of a controlled end by a remote-control device, especially relate to a kind of method that can increase or reduce the member of restriction on the list of a controlled end by a remote-control device.
Background technology
In the current society of information explosion, the spam every day that gets around on the network is many people's mailbox abrim.The content of spam embraces a wide spectrum of ideas, some is the spam of promotion item, some is that the hacker sends the spam that has virus, desires to make addressee's systemic breakdown, some is the spam that disgusting beaver shot was sent, had in the porn site, and some is the spam of advertising internet dating, love of one night taking place again.Therefore sound not enough teenager and the children of some physical and mental development are subjected to luring of these spams or web site contents, and many unluckily things can take place.Many father and mother disturb in order to protect children not to be subjected to these, utilize some software engineerings now, by network and extraneous contact, carry out some monitoring and restriction for children.For example limit children and can only receive the Email that the coordinator sent that father and mother approve, or can only carry out instant messaging, or can only browse website that father and mother approve or the like with the coordinator that father and mother are approved.Also some people has the spam of virus in unlatching in addition, or browses after some website, and the thing of computer poisoning, systemic breakdown takes place.By the above incident that emerges in an endless stream, the website that filtering electronic mail or restriction are browsed in society now, is very essential.And in the software engineering of today, filtering electronic mail or the technology that browses web sites are very general, for example by setting up the mode of password authentification, or set up mode of so-called blacklist, white list or the like.Some needs these technology manually to set, and some is built in the operating system or outlook of Microsoft in then, needs regular online to upgrade.If the mode that adopts online to upgrade, the time one is of a specified duration, and it is very huge that database will become; If by manually upgrading, suffer from the supervisor again and must be in person on controlled person's computer or mobile phone, set very inconvenience.
For instance,, for example only allow these children to receive the Email that the coordinator on the coordinator's list that is located at its email accounts is transmitted, please refer to Fig. 1 and Fig. 2 if father and mother's desire is monitored minor children's Email.Fig. 1 is coordinator's list 11 of these children's email accounts, and Fig. 2 is these children's e-mail box 22.By among Fig. 2 as can be seen in the addressee casket 21 of mailbox 22 all Emails all sent by the coordinator in coordinator's list 11 of Fig. 1.In the mailbox 22, the Email that people on other non-coordinator's list sends, all deletions, or (for example a spam data folder 23 (spam folder) stores among Fig. 2 to be sent to another data folder earlier, after father and mother browse, to be sent to these children's addressee casket 21, deletion or carry out other processing by father and mother's decision again.Typical one is monitored, can only be accepted the reception flow process of the Email that the member sends on coordinator's list 11, and as shown in Figure 3, its step-by-step procedures is as follows:
Step 10: set up binding and login this user's number of the account with a mail server.
Step 20: user's account number cipher of login is proved to be successful.
Step 30: require to receive Email.
Step 40: receive Email and check its sender's email accounts.
Step 50: filter the Email of being received, if email accounts with member in coordinator's list 11 of sender's email accounts comparison user number of the account of the Email received identical, then advances to step 60, if inequality, then advance to step 70.
Step 60: the addressee casket 21 of this Email being sent into this user.
Step 70: this Email is sent into the spam data folder 23 in this user's the mailbox.
But when father and mother leave home outside, for example go on business, this father and mother's desire increases or deletes a coordinator (or several coordinator) on coordinator's list 11 of email accounts of own children, but can't on children's computer, set this coordinator's (or several coordinator) related data in person, with existing prior art, there is no proposition how by increase on the remote-control device or coordinator's list 11 of deletion children email accounts on this coordinator's (or several coordinator) method.Therefore the present invention proposes the method that can upgrade the restriction list of a controlled end by a remote-control device, to solve the awkward situation that technology was faced now.
Summary of the invention
The present invention discloses a kind of method that can upgrade a restriction list of a controlled end by a remote-control device, is included in and edits the data that desire adds at least one member of this restriction list on this remote-control device; According to this at least one member's data,, produce one and link file by the binding program on this remote-control device; This remote-control device transmits this binding file to this controlled end; One identification program identification of this controlled end should link file; And this controlled termination is subjected to this binding file, and captures this at least one member's data by this binding file, and data that again will this at least one member add in this restriction list.
The present invention also discloses a kind of method that can upgrade a restriction list of a controlled end by a remote-control device, is included on this remote-control device editor desires at least one member of deleting in this restriction list data; According to this at least one member's data,, produce one and link file by the binding program on this remote-control device; This remote-control device transmits this binding file to this controlled end; One identification program identification of this controlled end should link file; And this controlled termination is subjected to this binding file, and captures this at least one member's data by this binding file, and data that again will this at least one member are deleted in this restriction list.
Description of drawings
Fig. 1 is coordinator's list of the children's that paint according to conventional art email accounts.
Fig. 2 is received Email in the children's that paint according to conventional art the e-mail box.
Fig. 3 is a reception flow chart of being monitored, can only accept the Email that the member sends on coordinator's list.
Fig. 4 is the figure of an electronic business card of the present invention (V card).
Fig. 5 is the schematic diagram of the binding information that file comprised of the present invention.
Fig. 6 is the method flow diagram of an email accounts coordinator list that the computer of painting according to one embodiment of the invention that passes through a monitoring client upgrades the email accounts of a controlled end.
The reference numeral explanation
10,20,30,40,50,60,70,100,110,
Step
120,130,140,150
Embodiment
The invention provides a kind of method that can upgrade a restriction list of a controlled end by a remote-control device, the supervisor does not need to set on the computer of controlled end in person, can be by transmitting the mode of Email or news in brief etc., with at least one member's data that institute's desire adds this restriction list or deletes in this restriction list certainly, automatically add this restriction list or delete in this restriction list certainly.The present invention can be applicable to monitoring client and controlled end is computer or mobile phone, the restriction list is coordinator's list of an Email, a mobile phone or an instant messaging, or be one group and allow the website list browsed, and the binding file that is transmitted is the situation of an Email or a mobile phone news in brief.Following embodiment will be computer with monitoring client (father and mother's end) and controlled end (children's end), and the binding file that is transmitted is an Email, the restriction list is that coordinator's list of this children's email accounts is an example, is method provided by the present invention, does a detailed description.
Method provided by the present invention can provide when father and mother leave home outside, for example go on business, but this father and mother's desire increases or the way when deleting on coordinator's list of email accounts of own children at least one coordinator of (refer again to Fig. 1 11).Prerequisite of the present invention is that the email accounts of monitoring client (father and mother's end) must add on email accounts coordinator's list 11 of controlled end (children's end).At first father and mother need on the computer of father and mother's ends (monitoring client), edit the contact data that this name (or several) desire adds (or desire deletion), these data comprise the projects such as name, phone, email accounts, instant messaging number of the account and address that this name (or several) desire adds the coordinator of (or desire deletion).The coordinator's of each desire adding (or desire deletion) data store in the mode of an electronic business card (V card).Please refer to Fig. 4, Fig. 4 paints the figure that is an electronic business card (V card) 5.Electronic business card 5 comprises this coordinator's a name 4, one e-mail addresses 3, and an instant messaging number of the account 2.Then these father and mother only need utilize a binding software that is installed in father and mother's ends (monitoring client), the data that link this coordinator, the address of father and mother's end, and one control password, produce one and link file (in the present embodiment this link file be to have the Email of special format), transmit this Email and hold to children with special format.Please refer to Fig. 5, Fig. 5 is the schematic diagram of the information that this binding file 6 (Email) comprised.This binding file 6 comprises an electronic business card 5, a control password 7, and a supervisor address 8.Control password 7 be that supervisor (father and mother) controls password by set one group, is used for identification to transmit whether this binding file 6 (Email) person is the supervisor; And should the binding program can be a resident program or a non-resident program, and should the binding program can be to set up father and mother's data in coordinator's list 11 time, setting parenthood be a supervisor.This binding file 6 can be carried this electronic business card 5 (V card) file secretly in the mode of carrying file secretly, or wholely comprises this business card file 5, supervisor address 8 with one, and the mode of the file of a control password 7 is sent to children's end.
When this binding file 6 (Email) is sent to these children's ends (controlled end), desire adds at least one coordinator on coordinator's list 11 of email accounts of controlled end or at least one coordinator's of desiring to delete on this coordinator's list 11 special format through an identification program identification this bindings file 6 (Email) that is installed in children end (controlled end) having of being that monitoring client sent, then controlled end be automatic pick-up this have the data of this coordinator in the Email of special format, add coordinator's list 11, or deletion in coordinator's list 11.It promptly is whether comparison control password 7 is the set control password of supervisor (father and mother) that this identification program is compared this special format, whether the transfer address 8 of this binding file 6 is supervisor's address, and the address of wherein controlling password and this monitoring client is collectively referred to as golden key (key).If do not meet this special format, then controlled end is considered as the Email that the member sent on coordinator's list 11 with this Email, and sends in the addressee casket 21 of controlled end.The identification program of monitoring client can be a resident program or a non-resident program.If a resident program, then controlled end need not opened addressee casket 21, and system promptly can the automatic reception Email; In case system receives the Email with this special format, this coordinator's of meeting automatic pick-up of system data add coordinator's list 11, or deletion in coordinator's list 11.If this identification program is not a resident program, then must wait until controlled end unlatching addressee casket 21, and after clicking transmission/reception Email, system just can receive Email; In case system receives the Email with this special format, the data that system equally can this coordinator of automatic pick-up add coordinator's list, or delete in coordinator's list.
Please refer to Fig. 6, what Fig. 6 was present embodiment upgrades the method flow diagram of coordinator's list of the email accounts of a controlled end by a monitoring computers.It is as follows that it comprises step:
Step 100: Computerized Editing one desire of monitoring client increases or this or several coordinators' of deletion data from an email accounts coordinator list 11 of controlled end.
Step 110: be installed on a binding program of monitoring client, link this coordinator's data 5, the address 8 of monitoring client, and a control password 7 produce one and link file 6.
Step 120: the computer of monitoring client transmits the computer of this binding file 6 to controlled end.
Step 130: controlled end computer is debated by an identification program and is known this binding file 6.If this binding file 6 meets a special format, then advance to step 140, if not, then advance to step 150.
Step 140: controlled end captures the data of this or several coordinators in this binding file, and adds in email accounts coordinator's list 11 of controlled end.
Step 150: transmit the addressee casket 21 of this binding file to controlled end.
Please note: be the effect of the monitoring of guaranteeing this practice; the data folder of all associated all must be encrypted thereupon; for example coordinator's list 11 of controlled end needs encipherment protection; and increase, member's function also need be encrypted (also or the input of V card need encrypt) in deletion or the editor coordinator's list 11; avoiding children or arbitrary other non-supervisor, initiatively go to delete, add or revise the member's data in this coordinator's list 11.The function of filtering electronic mail need be encrypted, and for example the sender of the email accounts filtering electronic mail of the member in the basis of design coordinator list 11 encrypts this function and can guarantee that this filter type can not changed by non-supervisor arbitrarily.The spam data folder need be encrypted, and goes central search or browse to have the Email that improper content, father and mother do not desire children's reception to avoid children.
Monitoring client (father and mother's end) is worked as in above embodiment description and controlled end (children's end) is a computer, the binding file that is transmitted is an Email, the restriction list is the situation of coordinator's list of these children's email accounts, but in fact the present invention can be applicable to when monitoring client (father and mother's end) and controlled end (children's end) respectively be the situation of a mobile phone or a computer.When controlled end (children's end) is one when having the computer of 3G communication module, father and mother not only can by transmit Email and increase or delete the Email coordinator list of controlled end (as Fig. 1 11) the member, also can be by transmitting the mode of news in brief, the member who increases or delete the Email coordinator list of controlled end.If controlled end is a mobile phone (for example a multimedia handset or an intelligent mobile phone) that can receive Email or carry out instant messaging, then monitoring client (father and mother's end) is the same can be by transmitting the mode of Email or transmission news in brief, the member who increases or delete the Email coordinator list of controlled end.If the news in brief that mobile phone passed of monitoring client, there is no the function of carrying file secretly, can only transmit the news in brief of normal words file, that is can't transmit this binding file, then link and add a label (TAG) in this news in brief, a control password, at least one coordinator member's who increases or reduce with institute's desire of special shape input (mode that for example separates every item number certificate) data with comma by the binding program that is installed on monitoring client of the present invention, and the telephone number of monitoring client, transmit this news in brief to controlled end.When controlled termination was received this news in brief, the special format of this news in brief of identification program identification of controlled end, but just at least one coordinator member's data in this news in brief of automatic pick-up added this coordinator's list or delete in this coordinator's list certainly.
Restriction list of the present invention is not limited only to an Email coordinator list of controlled end, also can be an instant messaging coordinator list of controlled end, the mobile phone contact roster of one controlled end, the restriction list that browses web sites of one controlled end, perhaps a controlled end is subscribed to the website restriction list of cyber journalism channel or blogger etc. by real simple association reporting system (RSS, ReallySimple Syndication).Monitoring client is the same to increase or deletes the data of member in coordinator's list controlled end mobile phone or instant messaging by transmitting Email or news in brief, or website or the website in the blogger list or the data of blogger of browsing or subscribing to that limit.Implementation method is identical generally, so repeat no more in this.
Generally speaking, by a binding program of monitoring client of the present invention and an identification program of controlled end, the supervisor transmits an Email or the news in brief with special format, just can increase or reduce the member on the controlled end one restriction list, specifically solved conventional art in filtering electronic mail or the technology that browses web sites, when manually upgrading the restriction list, the inconvenience that the supervisor who is run into non-be in person sets on controlled person's computer or mobile phone.
The above only is preferred embodiment of the present invention, and all equalizations of doing according to claim of the present invention change and modify, and all should belong to covering scope of the present invention.

Claims (26)

1. one kind can be upgraded the method that one of a controlled end limits list by a remote-control device, comprises:
Editor's desire adds at least one member's of this restriction list data on this remote-control device;
According to this at least one member's data,, produce one and link file by the binding program on this remote-control device;
This remote-control device transmits this binding file to this controlled end;
One identification program identification of this controlled end should link file; And
This controlled termination is subjected to this binding file, and captures this at least one member's data by this binding file, and data that again will this at least one member add in this restriction list.
2. the method for claim 1, wherein this remote-control device is a computer or a mobile phone.
3. the method for claim 1, wherein this controlled end is a computer or a mobile phone.
4. the method for claim 1, wherein this restriction list be an Email coordinator's list, coordinator's list of an instant messaging, mobile phone coordinator list, or a networking name of station list.
5. the method for claim 1 should the binding program be a resident program wherein.
6. the method for claim 1 should the binding program be a non-resident program wherein.
7. the method for claim 1, wherein this identification program is a resident program.
8. the method for claim 1, wherein this identification program is a non-resident program.
9. the method for claim 1, wherein this identification program should link file by form identification that identification should link file.
10. the method for claim 1, wherein this binding file is an Email, or a multimedia news in brief, this binding file comprises the address of this remote-control device, a control password and according to the formed file of this at least one member's data.
11. method as claimed in claim 10, wherein the address of this remote-control device is an email accounts, an instant messaging number of the account, or a telephone number.
12. the method for claim 1, wherein this binding file comprises the address and a text file news in brief of this remote-control device, comprises a label in this literal file news in brief, a control password and this at least one member's data.
13. method as claimed in claim 12, wherein the address of this remote-control device is a telephone number.
14. the method that can upgrade a restriction list of a controlled end by a remote-control device comprises:
Desire at least one member's of in this restriction list, deleting data editor on this remote-control device;
According to this at least one member's data,, produce one and link file by the binding program on this remote-control device;
This remote-control device transmits this binding file to this controlled end;
One identification program identification of this controlled end should link file; And
This controlled termination is subjected to this binding file, and captures this at least one member's data by this binding file, and data that again will this at least one member are deleted in this restriction list.
15. method as claimed in claim 14, wherein this remote-control device is a computer or a mobile phone.
16. method as claimed in claim 14, wherein this controlled end is a computer or a mobile phone.
17. method as claimed in claim 14, wherein this restriction list be an Email coordinator's list, coordinator's list of an instant messaging, mobile phone coordinator list, or a networking name of station list.
18. method as claimed in claim 14 should the binding program be a resident program wherein.
19. method as claimed in claim 14 should the binding program be a non-resident program wherein.
20. method as claimed in claim 14, wherein this identification program is a resident program.
21. method as claimed in claim 14, wherein this identification program is a non-resident program.
22. method as claimed in claim 14, wherein this identification program should link file by the form identification that identification should link file.
23. method as claimed in claim 14, wherein this binding file is an Email, or a multimedia news in brief, and this binding file comprises the address of this remote-control device, a control password and according to the formed file of this at least one member's data.
24. method as claimed in claim 23, wherein the address of this remote-control device is an email accounts, an instant messaging number of the account, or a telephone number.
25. method as claimed in claim 14, wherein this binding file comprises the address and a text file news in brief of this remote-control device, comprises a label in this literal file news in brief, a control password and this at least one member's data.
26. method as claimed in claim 25, wherein the address of this remote-control device is a telephone number.
CNA2008101000130A 2008-06-03 2008-06-03 Can upgrade the method for a restriction list of a controlled end by a remote-control device Pending CN101599949A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008101000130A CN101599949A (en) 2008-06-03 2008-06-03 Can upgrade the method for a restriction list of a controlled end by a remote-control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008101000130A CN101599949A (en) 2008-06-03 2008-06-03 Can upgrade the method for a restriction list of a controlled end by a remote-control device

Publications (1)

Publication Number Publication Date
CN101599949A true CN101599949A (en) 2009-12-09

Family

ID=41421198

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008101000130A Pending CN101599949A (en) 2008-06-03 2008-06-03 Can upgrade the method for a restriction list of a controlled end by a remote-control device

Country Status (1)

Country Link
CN (1) CN101599949A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984020A (en) * 2011-09-07 2013-03-20 天讯天网(福建)网络科技有限公司 Cloud-computation-based net surfing monitoring method and monitoring system and monitoring server

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984020A (en) * 2011-09-07 2013-03-20 天讯天网(福建)网络科技有限公司 Cloud-computation-based net surfing monitoring method and monitoring system and monitoring server

Similar Documents

Publication Publication Date Title
JP6026092B2 (en) Apparatus and method for managing content conversion in a wireless device
CN102193899B (en) System and method for the data of the multiple environment of management spanning
US20210028943A1 (en) Systems and methods of collaborative application on a private network
US10193844B1 (en) Secure cloud-based messaging and storage
CN101622837B (en) Sharing of media using contact data
CN103024061B (en) Network communication contact book shared system and method
US20140222478A1 (en) Method and system for creating and managing schedule on basis of social network
CN112967027B (en) Multi-tenant 5G message service platform and method based on cloud platform
WO2016177148A1 (en) Short message interception method and device
CN105357027A (en) Lightweight data service bus system based on large data
CN107133830A (en) A kind of method and system that electronic invoice is issued based on short message
CN101977362A (en) Short message group sending method and system
ATE511281T1 (en) SYSTEM AND METHOD FOR PROCESSING MESSAGES
JP2017045464A (en) Social networking service method and system
CN101098338A (en) Method for implementing multimedia information content protection
Vacas‑Soriano Recent developments in temporary employment: Employment growth, wages and transitions
CN101599949A (en) Can upgrade the method for a restriction list of a controlled end by a remote-control device
NL2011857C2 (en) Secure single sign-on exchange of electronic data.
CN102325096A (en) Method for realizing communication content life management, terminal thereof and system thereof
US20080176587A1 (en) System and a method for sending digital content to a mobile device
CN106850980B (en) The method for cleaning and mobile terminal of Email attachment in a kind of mobile terminal
CN102130921A (en) Method and system for realizing two paths of voice communication based on webpage
CN102598009B (en) A kind of method for filter information and device
Woolley Political operatives are targeting propaganda by location
TWI433510B (en) Electronic mail sending system and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20091209