CN103188213B - server and network interaction control method - Google Patents

server and network interaction control method Download PDF

Info

Publication number
CN103188213B
CN103188213B CN201110446549.XA CN201110446549A CN103188213B CN 103188213 B CN103188213 B CN 103188213B CN 201110446549 A CN201110446549 A CN 201110446549A CN 103188213 B CN103188213 B CN 103188213B
Authority
CN
China
Prior art keywords
data
application program
receiving terminal
terminal
transmitting terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110446549.XA
Other languages
Chinese (zh)
Other versions
CN103188213A (en
Inventor
洪济宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201110446549.XA priority Critical patent/CN103188213B/en
Publication of CN103188213A publication Critical patent/CN103188213A/en
Application granted granted Critical
Publication of CN103188213B publication Critical patent/CN103188213B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a kind of server and a kind of network interaction control method, wherein, server comprises: data acquisition module, when needing between different devices to carry out transfer of data, obtains the data that transmitting terminal sends; Analysis and Control module, according to pre-defined rule to described data analysis, and judges whether described data to be sent to receiving terminal according to analysis result.In this technical scheme, user can arrange rule flexibly, and effectively controlling which data can upload or download, and which data cannot be uploaded or download, and meets user simultaneously and transmits the needs of data and the safety of user data.This server can be cloud server.

Description

Server and network interaction control method
Technical field
The present invention relates to moving communicating field, in particular to a kind of server and a kind of network interaction control method.
Background technology
In current cell phone system, mostly provide the control of authority to application.For android system, the method for existing control application access data network is only generally list the list of application with network access authority, selects whether forbid application access data network for user.Write the rules of competence by iptables assembly (changing the rules of competence for additions and deletions) to netfilter assembly (comprising the rules of competence), reach the object controlling online.
At present, mobile phone only can list the application with network access authority according to permissions list but for this application specific information as whether accessed contact person, whether automatically read/send short messages etc. do not have other to describe, for application specifically upload/Download Info content is also unclear.
And user self is to its uncomprehending application, often cannot know whether and forbid its accesses network, and, user allow accesses network some when being applied in the critical data uploading some particular type, as contact person, note etc., cannot to these data analysis, user also cannot stop transmitting procedure, can cause no small loss like this to user.
Therefore, need a kind of control program for mobile phone terminal accesses network newly, can ensure that mobile phone terminal is in the process of accesses network, the critical data in mobile phone can not be uploaded, also the harmfulness data affecting mobile phone and use can not be downloaded, meanwhile, needing the relevant information of automatic acquisition different application, allowing this application program accesses network for judging whether.
Summary of the invention
Technical problem to be solved by this invention is, a kind of control program for mobile phone terminal accesses network is newly provided, can ensure that mobile phone terminal is in the process of accesses network, the critical data in mobile phone can not be uploaded, also the harmfulness data affecting mobile phone and use can not be downloaded, meanwhile, needing the relevant information of automatic acquisition different application, allowing this application program accesses network for judging whether.
In view of this, the invention provides a kind of server, comprising: data acquisition module, when needing between different devices to carry out transfer of data, obtain the data that transmitting terminal sends; Analysis and Control module, according to pre-defined rule to described data analysis, and judges whether described data to be sent to receiving terminal according to analysis result.In this technical scheme, user can arrange rule flexibly, and effectively controlling which data can upload or download, and which data cannot be uploaded or download, and meets user simultaneously and transmits the needs of data and the safety of user data.This server can be cloud server.
In technique scheme, preferably, whether data described in described analysis and Control module analysis are specific critical data in described transmitting terminal, and/or whether be the harmfulness data that the described receiving terminal of impact normally uses, and judge whether described data to be sent to described receiving terminal according to analysis result.In this technical scheme, ensure that the such as critical data such as address list, note both can not be supplied to other people by user, also can not download the harmfulness data of some such as rogue programs.
In technique scheme, preferably, described analysis and Control module described data be described critical data and/or described harmfulness data time, to described transmitting terminal and/or described receiving terminal request proof of identification, and when receiving the proof of identification of described transmitting terminal and institute/or described receiving terminal, described data are sent described receiving terminal.In this technical scheme, can judge exactly to upload or the operation of downloading data, whether send according to the wish of user, both ensure that the safety of information transmission, user can not be hindered again to transmit the needs of data.
In technique scheme, preferably, also comprise: information providing module, inquire in described transmitting terminal the application program sending and accept described data in described data and/or described receiving terminal, and by the relevant information of the described application program from different terminals, send to described transmitting terminal and/or described receiving terminal.In this technical scheme, the relevant information of different application can be collected, with for reference.
In technique scheme, preferably, the relevant information of described application program comprises: described application program carries out the record of specific operation, the priority assignation of described application program, the related commentary of described application program.In this technical scheme, specific operation can be the operation of access critical data, and priority assignation can comprise the priority assignation of accesses network, and related commentary can be the various comments of different user application programs.
The present invention also provides a kind of network interaction control method, comprising: step 202, when needing between different devices to carry out transfer of data, obtains the data that transmitting terminal sends; Step 204, according to pre-defined rule to described data analysis, and judges whether described data to be sent to receiving terminal according to analysis result.In this technical scheme, user can arrange rule flexibly, and effectively controlling which data can upload or download, and which data cannot be uploaded or download, and meets user simultaneously and transmits the needs of data and the safety of user data.
In technique scheme, preferably, described step 204 specifically comprises: whether analyze described data is specific critical data in described transmitting terminal, and/or whether be the harmfulness data that the described receiving terminal of impact normally uses, and judge whether described data to be sent to described receiving terminal according to analysis result.In this technical scheme, ensure that the such as critical data such as address list, note both can not be supplied to other people by user, also can not download the harmfulness data of some such as rogue programs.
In technique scheme, preferably, described step 204 also comprises: described data be described critical data and/or described harmfulness data time, to described transmitting terminal and/or described receiving terminal request proof of identification, and when receiving the proof of identification of described transmitting terminal and institute/or described receiving terminal, described data are sent described receiving terminal.In this technical scheme, can judge exactly to upload or the operation of downloading data, whether send according to the wish of user, both ensure that the safety of information transmission, user can not be hindered again to transmit the needs of data.
In technique scheme, preferably, also comprise: inquire in described transmitting terminal the application program sending and accept described data in described data and/or described receiving terminal, and by the relevant information of the described application program from different terminals, send to described transmitting terminal and/or described receiving terminal.In this technical scheme, the relevant information of different application can be collected, with for reference.
In technique scheme, preferably, the relevant information of described application program comprises: described application program carries out the record of specific operation, the priority assignation of described application program, the related commentary of described application program.In this technical scheme, specific operation can be the operation of access critical data, and priority assignation can comprise the priority assignation of accesses network, and related commentary can be the various comments of different user application programs.
By above technical scheme, a kind of server and a kind of network interaction control method can be realized, when application program uploads and downloads data, first beyond the clouds server carries out discriminatory analysis, prevent the critical data of application program upload user or download from can affect the data that user normally uses mobile phone, provide the use information of the application program that mobile phone is installed to user simultaneously, according to the control setting of different user for application program accesses network, the number of times of application program access mobile phone critical data, user is allowed better to judge whether to forbid application program accesses network.
Accompanying drawing explanation
Fig. 1 is the block diagram of server according to an embodiment of the invention;
Fig. 2 is the flow chart of network interaction control method according to an embodiment of the invention;
Fig. 3 is the schematic diagram of network interaction control method according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.
Set forth a lot of detail in the following description so that fully understand the present invention, but the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following public specific embodiment.
Fig. 1 is the block diagram of server according to an embodiment of the invention.
As shown in Figure 1, the invention provides a kind of server 100, comprising: data acquisition module 102, when needing between different devices to carry out transfer of data, obtain the data that transmitting terminal sends; Analysis and Control module 104, according to pre-defined rule to described data analysis, and judges whether described data to be sent to receiving terminal according to analysis result.In this technical scheme, user can arrange rule flexibly, and effectively controlling which data can upload or download, and which data cannot be uploaded or download, and meets user simultaneously and transmits the needs of data and the safety of user data.This server can be cloud server.
In technique scheme, whether described analysis and Control module 104 analyzes described data is specific critical data in described transmitting terminal, and/or whether be the harmfulness data that the described receiving terminal of impact normally uses, and judge whether described data to be sent to described receiving terminal according to analysis result.In this technical scheme, ensure that the such as critical data such as address list, note both can not be supplied to other people by user, also can not download the harmfulness data of some such as rogue programs.
In technique scheme, described analysis and Control module 104 described data be described critical data and/or described harmfulness data time, to described transmitting terminal and/or described receiving terminal request proof of identification, and when receiving the proof of identification of described transmitting terminal and institute/or described receiving terminal, described data are sent described receiving terminal.In this technical scheme, can judge exactly to upload or the operation of downloading data, whether send according to the wish of user, both ensure that the safety of information transmission, user can not be hindered again to transmit the needs of data.
In technique scheme, also comprise: information providing module 106, inquire in described transmitting terminal the application program sending and accept described data in described data and/or described receiving terminal, and by the relevant information of the described application program from different terminals, send to described transmitting terminal and/or described receiving terminal.In this technical scheme, the relevant information of different application can be collected, with for reference.
In technique scheme, the relevant information of described application program comprises: described application program carries out the record of specific operation, the priority assignation of described application program, the related commentary of described application program.In this technical scheme, specific operation can be the operation of access critical data, and priority assignation can comprise the priority assignation of accesses network, and related commentary can be the various comments of different user application programs.
Fig. 2 is the flow chart of network interaction control method according to an embodiment of the invention.
As shown in Figure 2, the present invention also provides a kind of network interaction control method, comprising: step 202, when needing between different devices to carry out transfer of data, obtains the data that transmitting terminal sends; Step 204, according to pre-defined rule to described data analysis, and judges whether described data to be sent to receiving terminal according to analysis result.In this technical scheme, user can arrange rule flexibly, and effectively controlling which data can upload or download, and which data cannot be uploaded or download, and meets user simultaneously and transmits the needs of data and the safety of user data.
In technique scheme, described step 204 specifically comprises: whether analyze described data is specific critical data in described transmitting terminal, and/or whether be the harmfulness data that the described receiving terminal of impact normally uses, and judge whether described data to be sent to described receiving terminal according to analysis result.In this technical scheme, ensure that the such as critical data such as address list, note both can not be supplied to other people by user, also can not download the harmfulness data of some such as rogue programs.
In technique scheme, described step 204 also comprises: described data be described critical data and/or described harmfulness data time, to described transmitting terminal and/or described receiving terminal request proof of identification, and when receiving the proof of identification of described transmitting terminal and institute/or described receiving terminal, described data are sent described receiving terminal.In this technical scheme, can judge exactly to upload or the operation of downloading data, whether send according to the wish of user, both ensure that the safety of information transmission, user can not be hindered again to transmit the needs of data.
In technique scheme, also comprise: inquire in described transmitting terminal the application program sending and accept described data in described data and/or described receiving terminal, and by the relevant information of the described application program from different terminals, send to described transmitting terminal and/or described receiving terminal.In this technical scheme, the relevant information of different application can be collected, with for reference.
In technique scheme, the relevant information of described application program comprises: described application program carries out the record of specific operation, the priority assignation of described application program, the related commentary of described application program.In this technical scheme, specific operation can be the operation of access critical data, and priority assignation can comprise the priority assignation of accesses network, and related commentary can be the various comments of different user application programs.
In one embodiment of the invention, by statistics and the analysis of cloud server, the critical data of user can be prevented to be uploaded on network, and the harmfulness data that can prevent from user terminal from automatically downloading affecting mobile phone terminal normally to use, as shown in Figure 3, this programme performing step is as follows:
One, the terminal of different user obtains unique identities proves, supposes that user terminal comprises terminal A and terminal B herein.
Two, when the user of (1) terminal A or terminal B forbids/allow application program accesses network, when this arranged preservation more than one day, unique sign that this applies by terminal A or terminal B is sent to cloud server and adds up;
(2) information such as the ratio of the Enable/Disable accesses network of Information Statistics application program that sends according to all terminals comprising terminal A and terminal B of cloud server and number of users, and by these information displaying in terminal A and terminal B;
(3) user of terminal A and terminal B can comment on this application, is sent to cloud server, after cloud server concentrates review information, is supplied to terminal A and terminal B, checks for user.
When certain application program access contact person three, in (1) terminal A or terminal B, transmission note, the access critical data such as note, access calendar, terminal A or terminal B records access times and sends to cloud server;
(2) data that send according to all user terminals of cloud server, add up the number of times that this application program accesses critical data average every day on every station terminal, and the user being supplied to terminal A and terminal B check.
Four, (1) is when the application program in terminal A (situation of terminal B is similar) sends data, first data are sent to cloud server, cloud server checks that whether these data are the critical data of terminal A, if be critical data, send message then to terminal A, reminding user uploads critical data, when user only has correct input unique identities to prove, cloud server could continue to upload data to data receiver, otherwise not uploading data;
(2) when the application program in terminal B (situation of terminal A is similar) will receive data, cloud server first receives data, analyze and judge whether these data can have influence on terminal B and normally work, and send message to terminal B, whether reminding user receives data, when user only has correct input unique identities to prove, high in the clouds could be continued a reception data and is sent to terminal B, otherwise not forwarding data.
In sum, by above technical scheme, a kind of server and a kind of network interaction control method can be realized, devise and be supplied to customer access network application details according to cloud server data analysis, select whether allow its accesses network for user, when application access network is forbidden in selection, be supplied to the information of this application program of cloud server, cloud server adds up the data that all users provide, can check that the user of how many this application program of use forbids this application access network thus, and for other user's references; Application programs can comment on, check for the user installing this application program; During application programs access other information of mobile phone, record access times, and be supplied to cloud server, add up the data that all users provide, check the number of times of other data of this application program average access every day for user; When application program uploading data, first be sent to cloud server analysis, if critical data, warning is sent to mobile phone terminal, user provides unique identities to prove just can upload, when application program downloading data, if data can jeopardize user, same transmission warning, user provides unique identities to prove to download.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. a server, is characterized in that, comprising:
Data acquisition module, when needing between different devices to carry out transfer of data, obtains the data that transmitting terminal sends;
Analysis and Control module, according to pre-defined rule to described data analysis, and judges whether described data to be sent to receiving terminal according to analysis result;
Information providing module, inquires in described transmitting terminal the application program sending and receive described data in described data and/or described receiving terminal, and by the relevant information of the described application program from different terminals, sends to described transmitting terminal and/or described receiving terminal.
2. server according to claim 1, it is characterized in that, whether data described in described analysis and Control module analysis are specific critical data in described transmitting terminal, and/or whether be the harmfulness data that the described receiving terminal of impact normally uses, and judge whether described data to be sent to described receiving terminal according to analysis result.
3. server according to claim 2, it is characterized in that, described analysis and Control module described data be described critical data and/or described harmfulness data time, to described transmitting terminal and/or described receiving terminal request proof of identification, and when receiving the proof of identification of described transmitting terminal and/or described receiving terminal, described data are sent described receiving terminal.
4. server according to claim 1, is characterized in that, the relevant information of described application program comprises:
Described application program carries out the record of specific operation, the priority assignation of described application program, the related commentary of described application program.
5. a network interaction control method, is characterized in that, comprising:
Step 202, when needing between different devices to carry out transfer of data, obtains the data that transmitting terminal sends;
Step 204, according to pre-defined rule to described data analysis, and judges whether described data to be sent to receiving terminal according to analysis result;
Step 206, inquires in described transmitting terminal the application program sending and receive described data in described data and/or described receiving terminal, and by the relevant information of the described application program from different terminals, sends to described transmitting terminal and/or described receiving terminal.
6. network interaction control method according to claim 5, is characterized in that, described step 204 specifically comprises:
Whether whether analyzing described data is specific critical data in described transmitting terminal, and/or be the harmfulness data that the described receiving terminal of impact normally uses, and judges whether described data to be sent to described receiving terminal according to analysis result.
7. network interaction control method according to claim 6, is characterized in that, described step 204 also comprises:
Described data be described critical data and/or described harmfulness data time, to described transmitting terminal and/or described receiving terminal request proof of identification, and when receiving the proof of identification of described transmitting terminal and/or described receiving terminal, described data are sent described receiving terminal.
8. network interaction control method according to claim 5, is characterized in that, the relevant information of described application program comprises:
Described application program carries out the record of specific operation, the priority assignation of described application program, the related commentary of described application program.
CN201110446549.XA 2011-12-28 2011-12-28 server and network interaction control method Active CN103188213B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110446549.XA CN103188213B (en) 2011-12-28 2011-12-28 server and network interaction control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110446549.XA CN103188213B (en) 2011-12-28 2011-12-28 server and network interaction control method

Publications (2)

Publication Number Publication Date
CN103188213A CN103188213A (en) 2013-07-03
CN103188213B true CN103188213B (en) 2016-04-06

Family

ID=48679182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110446549.XA Active CN103188213B (en) 2011-12-28 2011-12-28 server and network interaction control method

Country Status (1)

Country Link
CN (1) CN103188213B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471719A (en) * 2015-12-23 2016-04-06 武汉哒呤科技有限公司 Method for solving communication problems of chatting software under weak signals via cloud server storage technology
CN110557282A (en) * 2019-08-23 2019-12-10 北京浪潮数据技术有限公司 Server operation and maintenance management method, device and equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101505343A (en) * 2008-02-04 2009-08-12 深圳华为通信技术有限公司 Method, system and apparatus for implementing voice call
CN102200922A (en) * 2011-04-06 2011-09-28 宇龙计算机通信科技(深圳)有限公司 Application program installation method and terminal
CN102215229A (en) * 2011-06-01 2011-10-12 宇龙计算机通信科技(深圳)有限公司 Terminal and method for controlling application program to access exterior of terminal
CN102253858A (en) * 2011-06-27 2011-11-23 宇龙计算机通信科技(深圳)有限公司 Device and method for managing application programs

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080126471A1 (en) * 2006-09-19 2008-05-29 Samsung Electronics Co., Ltd. Method and apparatus for generating plurality of applications, and method and apparatus for processing application suitable for broadcasting receiving apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101505343A (en) * 2008-02-04 2009-08-12 深圳华为通信技术有限公司 Method, system and apparatus for implementing voice call
CN102200922A (en) * 2011-04-06 2011-09-28 宇龙计算机通信科技(深圳)有限公司 Application program installation method and terminal
CN102215229A (en) * 2011-06-01 2011-10-12 宇龙计算机通信科技(深圳)有限公司 Terminal and method for controlling application program to access exterior of terminal
CN102253858A (en) * 2011-06-27 2011-11-23 宇龙计算机通信科技(深圳)有限公司 Device and method for managing application programs

Also Published As

Publication number Publication date
CN103188213A (en) 2013-07-03

Similar Documents

Publication Publication Date Title
CN101185355B (en) Apparatus and methods for determining network access performance of a wireless device
KR101432230B1 (en) A system and method for registering network information strings
CN101194468B (en) Apparatus and process for universal diagnostic monitor module on a wireless device
CN102006588B (en) Method and system for monitoring network behavior of smart mobile phone
CN104125307A (en) Data flow sharing method and device
CN105359562B (en) Control device, control method, communication system, and computer-readable storage medium
CN103716781A (en) Card writing method, device and system for mobile terminal intelligent card
CN101437326A (en) Method and system to manage communications
CN104253869A (en) Blacklist sharing method, blacklist updating method, blacklist sharing device and blacklist updating device
CN108270827B (en) User location capability opening method and device
US10064045B2 (en) Subscription management
CN102104603A (en) Method, system and device for registering mobile terminal in WEB server
CN103188213B (en) server and network interaction control method
CN101180629B (en) For managing equipment and the method for content exchange on the wireless device
US9807197B2 (en) Real-time interaction in a communication network
CN102340493A (en) Access control method and gateway
CN102480722B (en) Sucking fee terminal identification method, apparatus and system thereof
CN107005864B (en) Method, apparatus and system for changing network based on received network information
CN102647514B (en) Information display method and device for non-screen wireless terminal
CN113055921B (en) Fault processing method and terminal
CN105094902A (en) System and method for controlling login state of application program
US10235525B2 (en) Application providing server, application setting terminal, application providing system, method of providing application, and program for application providing server
CN103944802A (en) Method and device for controlling mobile equipment to use Exchange mailbox
CN111356186B (en) Method and device for dynamically switching network of application programs of intelligent terminal
CN104521254A (en) Generating service request message to obtain wireless services using a minimal set of services that are designated for a roaming condition

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant