CN104158954B - Method and system for controlling mobile terminals - Google Patents
Method and system for controlling mobile terminals Download PDFInfo
- Publication number
- CN104158954B CN104158954B CN201410331170.8A CN201410331170A CN104158954B CN 104158954 B CN104158954 B CN 104158954B CN 201410331170 A CN201410331170 A CN 201410331170A CN 104158954 B CN104158954 B CN 104158954B
- Authority
- CN
- China
- Prior art keywords
- terminal
- authentication
- information
- password
- setting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000004458 analytical method Methods 0.000 claims description 11
- 238000004806 packaging method and process Methods 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 7
- 238000004891 communication Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims 1
- 238000005538 encapsulation Methods 0.000 claims 1
- 238000005516 engineering process Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a method and a system for controlling mobile terminals. The method comprises the following steps: information is set at the editing terminal of a local mobile terminal, and is packaged into a data packet to be sent to a far-end mobile terminal, wherein the information set at the terminal comprises authentication information and terminal limiting information; the far-end mobile terminal receives the data packet, and analyzes the data packet, so as to obtain the authentication information and the terminal limiting information; the far-end mobile terminal conducts authentication on the authentication information, and conducts limiting set according to the terminal limiting information after the authentication. According to the scheme, quick control of the far-end mobile terminal by the local mobile terminal can be realized, and the use safety is improved.
Description
Technical Field
The present invention relates to mobile communication technologies, and in particular, to a method and a system for controlling mobile terminals.
Background
With the development of society and the maturity of mobile communication technology, mobile terminals are becoming indispensable equipment in people's lives. Through the mobile terminal, people can get rid of the limitation of distance and carry out text, voice and video communication with people in any corner on the earth. The working efficiency of people is greatly improved, the life quality of people is improved, and a wide development space is provided for the production technology of the mobile terminal. Commonly used mobile terminals include mobile phones and the like.
The inventor finds out in practice that in specific applications, situations often occur in which limitation setting needs to be performed on the use functions of the remote mobile terminal. For example: when the mobile phone is in a company, the call authority of the remote mobile phone needs to be limited after the mobile phone returns home, so that the mobile phone is prevented from being used improperly. For another example, when the mobile phone is left at home, and is going to work or go out, the settings of the call authority, the game function, and the like of the remote mobile phone need to be limited to prevent the excessive use of children.
The need is further met if the function limit setting of a remotely located mobile terminal can be implemented, but currently there is no feasible technique.
Disclosure of Invention
The invention provides a method for controlling mobile terminals, which can realize the rapid control of a remote mobile terminal through a local mobile terminal and improve the use safety.
The invention provides a system for controlling mobile terminals, which can realize the rapid control of a remote mobile terminal through a local mobile terminal and improve the use safety.
A method for controlling between mobile terminals, the method comprising:
the local mobile terminal edits terminal setting information, encapsulates the terminal setting information into a data packet and sends the data packet to the remote mobile terminal, wherein the terminal setting information comprises authentication information and terminal limit information;
the remote mobile terminal receives the data packet and analyzes the data packet to obtain authentication information and terminal limit information;
and the remote mobile terminal authenticates the authentication information, and after the authentication is passed, the limit setting is carried out according to the terminal limit information.
Preferably, the authentication information includes a first password, and the authenticating the authentication information by the remote mobile terminal includes:
the remote mobile terminal extracts the pre-stored authentication password, judges whether the first password is the same as the authentication password, if so, passes the authentication, otherwise, fails the authentication.
Preferably, the terminal restriction information includes a designated dialing area and a second dialing password, and the performing restriction setting according to the terminal restriction information includes: setting the dialing permission password corresponding to the appointed dialing area as the second dialing password; or,
the terminal restriction information includes a designated dialing contact and a third dialing password, and the restriction setting according to the terminal restriction information includes: setting the dialing password corresponding to the appointed dialing contact person as the third dialing password; or,
the terminal restriction information includes a designated application program and a fourth access password, and the performing restriction setting according to the terminal restriction information includes: setting the access password corresponding to the specified application program as the fourth access password;
the terminal restriction information includes a designated application program, a first access time, and a fifth access password, and the performing restriction setting according to the terminal restriction information includes: and setting the access time of the specified application program as the first access time, and setting the access password corresponding to the first access time as the fifth access password.
Preferably, the designated dialing area is a short distance area or a long distance area.
Preferably, the sending the data packet to the remote mobile terminal includes: and sending the data packet to a remote mobile terminal by adopting a short message or multimedia message mode through a mobile network, or sending the data packet to the remote mobile terminal by adopting an instant communication mode through short-distance wireless WIFI connection or Bluetooth connection.
A system for controlling between mobile terminals comprises a local mobile terminal and a remote mobile terminal;
the local mobile terminal edits terminal setting information, encapsulates the terminal setting information into a data packet and sends the data packet to the remote mobile terminal, wherein the terminal setting information comprises authentication information and terminal restriction information;
the remote mobile terminal receives the data packet from the local mobile terminal and analyzes the data packet to obtain authentication information and terminal restriction information; and authenticating the authentication information, and after the authentication is passed, performing limit setting according to the terminal limit information.
Preferably, the local mobile terminal comprises an editing and packaging unit and a sending unit, and the remote mobile terminal comprises a receiving unit, an analysis unit, an authentication unit and a setting control unit;
the editing and packaging unit is used for editing the terminal setting information, packaging the terminal setting information into a data packet and sending the data packet to the sending unit;
the sending unit receives the data packet from the editing and packaging unit and sends the data packet to the remote mobile terminal;
the receiving unit receives the data packet from the sending unit and sends the data packet to the analysis unit;
the analysis unit receives the data packet from the receiving unit, analyzes the data packet to obtain authentication information and terminal restriction information, and sends the authentication information and the terminal restriction information to the authentication unit;
the authentication unit receives the authentication information and the terminal limit information from the analysis unit, authenticates the authentication information, and sends the terminal limit information to the setting control unit after the authentication is passed;
the setting control unit receives the terminal limiting information from the authentication unit and carries out limiting setting according to the terminal limiting information.
Preferably, the authentication information includes a first password, the authentication unit includes an authentication judgment subunit, receives the authentication information and the terminal restriction information from the parsing unit, extracts a pre-stored authentication password, judges whether the first password is the same as the authentication password, if so, sends the terminal restriction information to the setting control unit through authentication, otherwise, fails to authenticate, and does not send the terminal restriction information to the setting control unit.
Preferably, the terminal restriction information includes a designated dialing area and a second dialing password, and the setting control unit includes a first setting control subunit, and sets the dialing permission password corresponding to the designated dialing area as the second dialing password; or,
the terminal restriction information comprises an appointed dialing contact person and a third dialing password, the setting control unit comprises a second setting control subunit, and the dialing password corresponding to the appointed dialing contact person is set as the third dialing password; or,
the terminal restriction information comprises a first appointed application program and a fourth access password, and the setting control unit comprises a third setting control subunit and is used for setting the access password of the first appointed application program as the fourth access password; or,
the terminal restriction information includes a second specified application program, a first access time and a fifth access password, and the setting control unit includes a fourth setting control subunit, sets the access time of the second specified application program as the first access time, and sets the access password corresponding to the first access time as the fifth access password.
Preferably, the sending unit sends the data packet to the remote mobile terminal through a mobile network in a short message or multimedia message manner, or sends the data packet to the remote mobile terminal through a short-distance wireless WIFI connection or a bluetooth connection in an instant messaging manner.
According to the scheme, when the remote mobile terminal needs to be controlled, the local mobile terminal edits the terminal setting information, encapsulates the terminal setting information into the data packet and sends the data packet to the remote mobile terminal; and the far-end mobile terminal receives and analyzes the data packet to obtain authentication information and terminal limit information, authenticates the authentication information, and performs limit setting according to the terminal limit information after the authentication is passed. By adopting the scheme of the invention, the limit setting can be automatically completed by the remote mobile terminal only by editing the terminal setting information at the local mobile terminal and sending the encapsulated data packet to the remote mobile terminal; therefore, the remote mobile terminal can be rapidly controlled through the local mobile terminal, and the use safety is improved.
Drawings
FIG. 1 is a schematic flow chart of a method for controlling between mobile terminals according to the present invention;
fig. 2 is a schematic diagram of a system structure for controlling between mobile terminals according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the following embodiments and the accompanying drawings.
Based on the general application of mobile terminals, mobile terminals that are available for use can usually be found locally when needed; therefore, the method and the device adopt the local mobile terminal to control the remote mobile terminal.
Referring to fig. 1, a schematic flow chart of a method for controlling between mobile terminals according to the present invention includes the following steps:
step 101, a local mobile terminal edits terminal setting information, encapsulates the terminal setting information into a data packet and sends the data packet to a remote mobile terminal, wherein the terminal setting information comprises authentication information and terminal restriction information.
In order to realize the terminal control scheme provided by the invention, a limit setting function is added to the local mobile terminal, and a limit setting icon is added to the application directory; the user can click the restriction setting icon when needed, and enter the restriction setting function to edit the terminal setting information; then, the user can input the authentication information and the terminal restriction information according to the prompt.
The local mobile terminal acquires the authentication information and the terminal limit information input by the user and encapsulates the authentication information and the terminal limit information into a data packet. The data package can adopt the following format of local mobile terminal number + remote mobile terminal number + authentication information + terminal restriction information, and accordingly, after the remote mobile terminal receives the data packet, the data packet can be identified to be used for function restriction setting according to the format. The data package can also adopt the following format of 'function limit setting identification' + 'local mobile terminal number + remote mobile terminal number + authentication information + terminal limit information', accordingly, the remote mobile terminal receives the data packet, and the data packet can be identified for function limit setting according to the 'function limit setting identification' positioned in the packet head of the data packet.
The data packets are encapsulated and then sent to the remote mobile terminal, and various implementation manners are provided, which will be described in the following.
In a first way,
And sending the data packet to a remote mobile terminal by a mobile network in a short message or multimedia message mode. The method can be applied to the situation that the remote mobile terminal is far away and is inconvenient to carry out short-distance control, such as the situation that the mobile phone is in home and the user is in a work unit at present.
The second way,
And sending the data packet to a remote mobile terminal in an instant communication mode through short-distance Wireless (WIFI) connection or Bluetooth connection. This approach is applicable to situations where the remote mobile terminals are located at close distances, such as different locations in a building, or different rooms in a home, etc. Connection such as WIFI, Bluetooth and the like is pre-established between the local mobile terminal and the remote mobile terminal; if the Bluetooth connection is established, the interactive information between the local mobile terminal and the remote mobile terminal is transmitted and received through the Bluetooth units respectively arranged on the basis of the Bluetooth protocol.
The instant messaging mode comprises WeChat, qq, MSN and the like.
And 102, the far-end mobile terminal receives and analyzes the data packet to obtain authentication information and terminal restriction information.
The far-end mobile terminal receives the data packet, identifies the data packet for setting the function limit, and analyzes the authentication information and the terminal limit information.
And 103, the remote mobile terminal authenticates the authentication information, and after the authentication is passed, the limit setting is carried out according to the terminal limit information.
The authentication information is used to determine the authority set by the function restriction, and the content of the authentication information may be set as required, for example, a user name + a password, or may only include a password. Assuming that the authentication information only contains a password, here denoted by the first password; correspondingly, the step of authenticating the authentication information by the remote mobile terminal includes: the remote mobile terminal extracts the pre-stored authentication password, judges whether the first password is the same as the authentication password, if so, passes the authentication, otherwise, fails the authentication. The authentication password is preset by the user and stored in the remote mobile terminal.
The terminal restriction information is set according to the specific functions that the user needs to restrict, and includes various functions, such as a call dialing area, a contact dialing, an application access time, and the like. The following examples are given.
Example one, a call dialing area is restricted.
The terminal restriction information includes a designated dialing region and a second dialing password, and accordingly, the performing restriction setting according to the terminal restriction information in this step includes: and setting the dialing permission password corresponding to the appointed dialing area as the second dialing password.
And then, when the far-end mobile terminal carries out call dialing, judging a dialing area, if the dialing area is the appointed dialing area, prompting a user to input a password, and if the input password is not the second dialing password, refusing to dial. Therefore, the excessive use of the far-end mobile terminal is prevented, and the waste of telephone charge is avoided.
The designated dialing area may be embodied as a short-haul or long-haul area.
And example two, the limitation of calling the contact person is carried out.
The terminal restriction information includes a designated dialing contact and a third dialing password, and accordingly, the restriction setting according to the terminal restriction information in this step includes: and setting the dialing password corresponding to the appointed dialing contact person as the third dialing password.
After setting, when the far-end mobile terminal carries out call dialing, the judgment of dialing the contact person is carried out, if the designated dialing contact person is the designated dialing contact person, the user is prompted to input a password, and if the input password is not the third dialing password, dialing is refused.
And example three, limiting the access of the application program.
The terminal restriction information includes a designated application program and a fourth access password, and accordingly, performing restriction setting according to the terminal restriction information in this step includes: and setting the access password corresponding to the specified application program as the fourth access password.
After setting, when the remote mobile terminal accesses the application program according to the user operation, the access judgment is carried out, when the appointed application program is accessed, the user is prompted to input a password, and if the input password is not the fourth access password, the access is refused. In this way, excessive use of the remote mobile terminal is prevented, for example, in the case of a child operating the remote mobile terminal, network game play can be avoided.
And example four, limiting the access time of the application program.
The terminal restriction information includes a designated application program, a first access time, and a fifth access password, and accordingly, performing restriction setting according to the terminal restriction information in this step includes: and setting the access time of the specified application program as the first access time, and setting the access password corresponding to the first access time as the fifth access password.
After setting, the remote mobile terminal accesses the application program according to the operation of the user, if the specified application program is accessed and the access time reaches the first access time, the user is prompted to input a password, and if the input password is not the fifth access password, the user is refused to continue accessing.
In the invention, when the remote mobile terminal needs to be controlled, the local mobile terminal edits the terminal setting information, packages the terminal setting information into a data packet and sends the data packet to the remote mobile terminal; and the far-end mobile terminal receives and analyzes the data packet to obtain authentication information and terminal limit information, authenticates the authentication information, and performs limit setting according to the terminal limit information after the authentication is passed. By adopting the scheme of the invention, the limit setting can be automatically completed by the remote mobile terminal only by editing the terminal setting information at the local mobile terminal and sending the encapsulated data packet to the remote mobile terminal; therefore, the remote mobile terminal can be rapidly controlled through the local mobile terminal, and the use safety is improved.
Referring to fig. 2, a schematic diagram of a system structure for controlling between mobile terminals according to the present invention is shown, where the system includes a local mobile terminal and a remote mobile terminal;
the local mobile terminal edits terminal setting information, encapsulates the terminal setting information into a data packet and sends the data packet to the remote mobile terminal, wherein the terminal setting information comprises authentication information and terminal restriction information;
the remote mobile terminal receives the data packet from the local mobile terminal and analyzes the data packet to obtain authentication information and terminal restriction information; and authenticating the authentication information, and after the authentication is passed, performing limit setting according to the terminal limit information.
In order to realize the terminal control scheme provided by the invention, a limit setting function is added to the local mobile terminal, and a limit setting icon is added to the application directory; the user can click the restriction setting icon when needed, and enter the restriction setting function to edit the terminal setting information; then, the user can input the authentication information and the terminal restriction information according to the prompt.
The local mobile terminal acquires the authentication information and the terminal limit information input by the user and encapsulates the authentication information and the terminal limit information into a data packet. The data package can adopt the following format of local mobile terminal number + remote mobile terminal number + authentication information + terminal restriction information, and accordingly, after the remote mobile terminal receives the data packet, the data packet can be identified to be used for function restriction setting according to the format. The data package can also adopt the following format of 'function limit setting identification' + 'local mobile terminal number + remote mobile terminal number + authentication information + terminal limit information', accordingly, the remote mobile terminal receives the data packet, and the data packet can be identified for function limit setting according to the 'function limit setting identification' positioned in the packet head of the data packet.
Preferably, the local mobile terminal comprises an editing and packaging unit and a sending unit, and the remote mobile terminal comprises a receiving unit, an analysis unit, an authentication unit and a setting control unit;
the editing and packaging unit edits terminal setting information, packages the terminal setting information into a data packet and sends the data packet to the sending unit, and the terminal setting information comprises authentication information and terminal limitation information;
the sending unit receives the data packet from the editing and packaging unit and sends the data packet to the remote mobile terminal;
the receiving unit receives the data packet from the sending unit and sends the data packet to the analysis unit;
the analysis unit receives the data packet from the receiving unit, analyzes the data packet to obtain authentication information and terminal restriction information, and sends the authentication information and the terminal restriction information to the authentication unit;
the authentication unit receives the authentication information and the terminal limit information from the analysis unit, authenticates the authentication information, and sends the terminal limit information to the setting control unit after the authentication is passed;
the setting control unit receives the terminal limiting information from the authentication unit and carries out limiting setting according to the terminal limiting information.
Preferably, the authentication information includes a first password, the authentication unit includes an authentication judgment subunit, receives the authentication information and the terminal restriction information from the parsing unit, extracts a pre-stored authentication password, judges whether the first password is the same as the authentication password, if so, sends the terminal restriction information to the setting control unit through authentication, otherwise, fails to authenticate, and does not send the terminal restriction information to the setting control unit.
Preferably, the terminal restriction information includes a designated dialing area and a second dialing password, and the setting control unit includes a first setting control subunit, and sets the dialing permission password corresponding to the designated dialing area as the second dialing password; or,
the terminal restriction information comprises an appointed dialing contact person and a third dialing password, the setting control unit comprises a second setting control subunit, and the dialing password corresponding to the appointed dialing contact person is set as the third dialing password; or,
the terminal restriction information comprises a first appointed application program and a fourth access password, and the setting control unit comprises a third setting control subunit and is used for setting the access password of the first appointed application program as the fourth access password; or,
the terminal restriction information includes a second specified application program, a first access time and a fifth access password, and the setting control unit includes a fourth setting control subunit, sets the access time of the second specified application program as the first access time, and sets the access password corresponding to the first access time as the fifth access password.
Preferably, the sending unit sends the data packet to the remote mobile terminal through a mobile network in a short message or multimedia message manner, or sends the data packet to the remote mobile terminal through a short-distance wireless WIFI connection or a bluetooth connection in an instant messaging manner.
The remote mobile terminal and the local mobile terminal are used as mobile phones for explanation, and by adopting the scheme of the invention, any mobile phone can be used for controlling the remote mobile phone; the premise is that the authentication information and the terminal limit information are obtained, and the operation is convenient; the mobile phone terminal is particularly suitable for the situations that the mobile phone is lost at home or children play games and the like, the terminal function of the mobile phone terminal is limited, and the mobile phone terminal is convenient to control and has a safety function.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (9)
1. A method for controlling between mobile terminals, the method comprising:
the local mobile terminal edits terminal setting information, encapsulates the terminal setting information into a data packet and sends the data packet to the remote mobile terminal, wherein the terminal setting information comprises authentication information and terminal limit information;
the far-end mobile terminal receives the data packet and analyzes the data packet to obtain the authentication information and the terminal limit information;
the remote mobile terminal authenticates the authentication information, and after the authentication is passed, the remote mobile terminal performs limit setting according to the terminal limit information;
wherein, the authentication information includes a first password, and the authentication of the authentication information by the remote mobile terminal includes:
the remote mobile terminal extracts the pre-stored authentication password, judges whether the first password is the same as the authentication password, if so, passes the authentication, otherwise, fails the authentication.
2. The method of claim 1, wherein the terminal restriction information includes a designated dialing region and a second dialing password, and the performing restriction setting according to the terminal restriction information includes: setting the dialing permission password corresponding to the appointed dialing area as the second dialing password; or,
the terminal restriction information includes a designated dialing contact and a third dialing password, and the restriction setting according to the terminal restriction information includes: setting the dialing password corresponding to the appointed dialing contact person as the third dialing password; or,
the terminal restriction information includes a designated application program and a fourth access password, and the performing restriction setting according to the terminal restriction information includes: setting the access password corresponding to the specified application program as the fourth access password; or,
the terminal restriction information includes a designated application program, a first access time, and a fifth access password, and the performing restriction setting according to the terminal restriction information includes: and setting the access time of the specified application program as the first access time, and setting the access password corresponding to the first access time as the fifth access password.
3. The method of claim 2, wherein the designated dialing area is a short haul area or a long haul area.
4. The method according to any of claims 1 to 3, wherein said sending the data packet to the remote mobile terminal comprises: and sending the data packet to a remote mobile terminal by adopting a short message or multimedia message mode through a mobile network, or sending the data packet to the remote mobile terminal by adopting an instant communication mode through short-distance wireless WIFI connection or Bluetooth connection.
5. A system for controlling between mobile terminals is characterized in that the system comprises a local mobile terminal and a remote mobile terminal;
the local mobile terminal edits terminal setting information, encapsulates the terminal setting information into a data packet and sends the data packet to the remote mobile terminal, wherein the terminal setting information comprises authentication information and terminal restriction information;
the remote mobile terminal receives the data packet from the local mobile terminal and analyzes the data packet to obtain authentication information and terminal restriction information; authenticating the authentication information, and after the authentication is passed, carrying out limit setting according to the terminal limit information;
wherein, the authentication information includes a first password, and the authentication of the authentication information by the remote mobile terminal includes:
the remote mobile terminal extracts the pre-stored authentication password, judges whether the first password is the same as the authentication password, if so, passes the authentication, otherwise, fails the authentication.
6. The system of claim 5, wherein the local mobile terminal comprises an editing encapsulation unit and a transmission unit, and the remote mobile terminal comprises a receiving unit, a parsing unit, an authentication unit and a setting control unit;
the editing and packaging unit is used for editing the terminal setting information, packaging the terminal setting information into a data packet and sending the data packet to the sending unit;
the sending unit receives the data packet from the editing and packaging unit and sends the data packet to the remote mobile terminal;
the receiving unit receives the data packet from the sending unit and sends the data packet to the analysis unit;
the analysis unit receives the data packet from the receiving unit, analyzes the data packet to obtain authentication information and terminal restriction information, and sends the authentication information and the terminal restriction information to the authentication unit;
the authentication unit receives the authentication information and the terminal limit information from the analysis unit, authenticates the authentication information, and sends the terminal limit information to the setting control unit after the authentication is passed;
the setting control unit receives the terminal limiting information from the authentication unit and carries out limiting setting according to the terminal limiting information.
7. The system of claim 6, wherein the authentication unit comprises an authentication judgment subunit, which receives the authentication information and the terminal restriction information from the parsing unit, extracts a pre-stored authentication password, judges whether the first password is the same as the authentication password, if so, sends the terminal restriction information to the setting control unit through authentication, otherwise, does not send the terminal restriction information to the setting control unit if authentication fails.
8. The system of claim 6, wherein the terminal restriction information includes a designated dialing region and a second dialing password, and the setting control unit includes a first setting control subunit that sets the dialing permission password corresponding to the designated dialing region as the second dialing password; or,
the terminal restriction information comprises an appointed dialing contact person and a third dialing password, the setting control unit comprises a second setting control subunit, and the dialing password corresponding to the appointed dialing contact person is set as the third dialing password; or,
the terminal restriction information comprises a first appointed application program and a fourth access password, and the setting control unit comprises a third setting control subunit and is used for setting the access password of the first appointed application program as the fourth access password; or,
the terminal restriction information includes a second specified application program, a first access time and a fifth access password, and the setting control unit includes a fourth setting control subunit, sets the access time of the second specified application program as the first access time, and sets the access password corresponding to the first access time as the fifth access password.
9. The system according to any one of claims 6 to 8, wherein the sending unit sends the data packet to the remote mobile terminal through a mobile network by using a short message or a multimedia message, or sends the data packet to the remote mobile terminal through a short-range wireless WIFI connection or a Bluetooth connection by using an instant messaging method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410331170.8A CN104158954B (en) | 2014-07-11 | 2014-07-11 | Method and system for controlling mobile terminals |
TW104102819A TW201602804A (en) | 2014-07-11 | 2015-01-27 | Method and system for controling mobile terminals |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410331170.8A CN104158954B (en) | 2014-07-11 | 2014-07-11 | Method and system for controlling mobile terminals |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104158954A CN104158954A (en) | 2014-11-19 |
CN104158954B true CN104158954B (en) | 2017-01-25 |
Family
ID=51884357
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410331170.8A Expired - Fee Related CN104158954B (en) | 2014-07-11 | 2014-07-11 | Method and system for controlling mobile terminals |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104158954B (en) |
TW (1) | TW201602804A (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107451484A (en) * | 2016-05-30 | 2017-12-08 | 宇龙计算机通信科技(深圳)有限公司 | Access method, access mechanism and the terminal of private information |
CN108737627A (en) * | 2017-04-18 | 2018-11-02 | 江苏北弓智能科技有限公司 | One kind being based on smart mobile phone usage behavior monitoring warning system and method |
CN116112929A (en) * | 2018-07-13 | 2023-05-12 | 华为技术有限公司 | Access right control method of terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101765241A (en) * | 2010-01-21 | 2010-06-30 | 宇龙计算机通信科技(深圳)有限公司 | Controlled mobile terminal response method, device and mobile terminal |
CN101815116A (en) * | 2009-02-20 | 2010-08-25 | 中兴通讯股份有限公司 | Mobile telephone method and device based on multi-user |
CN102833712A (en) * | 2012-08-31 | 2012-12-19 | 北京小米科技有限责任公司 | Method, device, server and system for preventing information leakage and equipment |
CN103428370A (en) * | 2013-08-23 | 2013-12-04 | 上海华勤通讯技术有限公司 | Mobile phone and multi-user control method thereof |
-
2014
- 2014-07-11 CN CN201410331170.8A patent/CN104158954B/en not_active Expired - Fee Related
-
2015
- 2015-01-27 TW TW104102819A patent/TW201602804A/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101815116A (en) * | 2009-02-20 | 2010-08-25 | 中兴通讯股份有限公司 | Mobile telephone method and device based on multi-user |
CN101765241A (en) * | 2010-01-21 | 2010-06-30 | 宇龙计算机通信科技(深圳)有限公司 | Controlled mobile terminal response method, device and mobile terminal |
CN102833712A (en) * | 2012-08-31 | 2012-12-19 | 北京小米科技有限责任公司 | Method, device, server and system for preventing information leakage and equipment |
CN103428370A (en) * | 2013-08-23 | 2013-12-04 | 上海华勤通讯技术有限公司 | Mobile phone and multi-user control method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN104158954A (en) | 2014-11-19 |
TW201602804A (en) | 2016-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105813071B (en) | Traffic sharing method and device, and terminal | |
US10477030B2 (en) | LTE cellular mobile network access system and corresponding communication method | |
WO2015131689A1 (en) | Sensor code-pairing processing method, apparatus, network platform device, and internet of things gateway | |
CN105516964A (en) | Method and terminal for realizing remote control | |
CN106850703B (en) | Communication method based on social identity and server | |
CN104348977A (en) | Operating control method for mobile terminal, master terminal and slave terminal | |
CN103607706B (en) | NFC-technology based conversation method, NFC terminal and far-end server | |
CN110191378A (en) | A kind of intercommunication means of communication, device, system, storage medium and intercom | |
CN104158954B (en) | Method and system for controlling mobile terminals | |
CN111787496B (en) | Method and equipment for switching calls between mobile phones | |
CN104244373B (en) | A kind of method that wireless terminal adds wireless network | |
CN105578240A (en) | Television terminal interaction method and system | |
CN110493737B (en) | Method and device for establishing three-party call | |
CN102858028A (en) | Method and terminal for releasing controlled party in multiparty call | |
KR102493199B1 (en) | Systems, user devices, servers, computer program products and methods for providing access to mobile communication services | |
KR102399457B1 (en) | System for voice call service using distal assistance device, method thereof and non-transitory computer readable medium having computer program recorded thereon | |
CN107659833A (en) | A kind of method and device of set top box operations | |
KR102408355B1 (en) | Module for connecting remote call of mobile communication terminal and method for connecting remote call and the program stored in medium for executing the method, and system for connecting remote call | |
KR102399456B1 (en) | System for voice call service using distal assistance device, method thereof and non-transitory computer readable medium having computer program recorded thereon | |
CN106231589B (en) | method and device for hiding SSID broadcast based on Android system Soft AP | |
KR102402412B1 (en) | System for voice call service using distal assistance device, method thereof and non-transitory computer readable medium having computer program recorded thereon | |
CN103517217A (en) | Method and corresponding terminal for carrying out service control over trunking terminal | |
KR102150580B1 (en) | System for voice call service using distal assistance device, method thereof and non-transitory computer readable medium having computer program recorded thereon | |
KR102597423B1 (en) | Service system supporting voice call using digital assistant device, method thereof and non-transitory computer readable medium having computer program recorded thereon | |
KR102150578B1 (en) | System for voice call service using distal assistance device, method thereof and non-transitory computer readable medium having computer program recorded thereon |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170125 Termination date: 20210711 |