CN104539467B - A kind of terminal unit management system and management method based on cloud server - Google Patents
A kind of terminal unit management system and management method based on cloud server Download PDFInfo
- Publication number
- CN104539467B CN104539467B CN201510032477.2A CN201510032477A CN104539467B CN 104539467 B CN104539467 B CN 104539467B CN 201510032477 A CN201510032477 A CN 201510032477A CN 104539467 B CN104539467 B CN 104539467B
- Authority
- CN
- China
- Prior art keywords
- terminal device
- cloud server
- module
- desktop
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention relates to a kind of terminal unit management system and management method based on cloud server, the system comprises the instruction issuing modules for being set to cloud server, set on the instruction execution module and desktop customized module of terminal device, the desktop customized module replaces the original desktop of terminal device operating system using customized desktop, and the customized desktop is close with original desktop;Described instruction assigns module for assigning instruction to more than one specified terminal device by wireless network, and the instruction execution module of the terminal device executes described instruction by customized desktop.The present invention can be directed to different terminal devices, carry out the uniform security policies control of batch device, administrator is facilitated to check and count the state of each terminal device.
Description
Technical field
The present invention relates to fields of communication technology, more particularly, to a kind of terminal unit management system based on cloud server
And management method.
Background technique
Terminal device makes mobile communication terminal refer to that the computer equipment that can be used on the move, broad sense say packet
Including mobile phone, notebook, tablet computer, POS machine includes even vehicle-mounted computer.But refers to mobile phone in most cases or have
The smart phone and tablet computer of a variety of application functions.As network and technology are towards the hair in more and more broadband direction
Exhibition, Mobile Communication Industry will move towards the real mobile message epoch.
With the rapid development of integrated circuit technique, terminal device has had powerful processing capacity, terminal device
Become an integrated information processing platform from simple call tool.Modern terminal device has possessed extremely powerful
Processing capacity (CPU frequency is already close to 2G), solidifies storage medium and the operating system as computer at memory, is one
Complete superminicomputer system, can complete complicated processing task.Terminal device also possesses communication party very rich
Formula, it can pass through GSM, CDMA, WCDMA, the wireless operators network communication such as EDGE, 3G;It can also be blue by WLAN
It tooth and infrared is communicated.Terminal device not only can talk at present, takes pictures, listens to music, playing game, and may be implemented include
Positioning, information processing, finger scan, identity card scanning, bar code scan, RFID scanning, IC card scanning and alcohol content detection
Etc. function abundant, become mobile law enforcement, mobile office and the important tool of Mobile business.
The usually existing software for being directed to terminal device and equipment safety management, is being directed to based on terminal device exploitation
The application of consumer.By installing mobile device management software in equipment, equipment and equipment safety are managed.City at present
Common mobile phone safe software passes through professional antivirus engine on face, ensures that terminal device is invaded and harassed from virus.
Application No. is 201310125590.6, denomination of invention are as follows: the remote lock method of terminal, system, cloud server
A kind of remote lock method of terminal is disclosed with the Chinese patent application of terminal, this method can be to avoid first terminal by again
Brush machine resets password, guarantees that first terminal is not illegally used.This method can control first terminal from cloud, avoid for the first end
End resets password by brush machine again, but cannot carry out others to terminal and be uniformly controlled, and is only capable of targetedly managing.
Application No. is 201310690101.1, denomination of invention are as follows: the Chinese patent Shen of the method for mobile phone remote safeguard protection
A kind of method of telesecurity protection please be disclose, can be solved with remote lock user mobile phone terminal and remote destroying user data
Certainly remote protecting problem implements thoroughly effective security protection.This method is by remote lock mobile phone terminal and destroys data,
But it not can control mobile phone terminal, the management of centralization cannot be carried out to mobile phone terminal.
Summary of the invention
The purpose of the present invention is exactly overcome the deficiencies of the prior art and provide a kind of terminal device and is replaced using customized desktop
Original system desktop and by sending instructions under server can realize that remote mode collect equipment to terminal device by customized desktop
Middle security management and control configures the control method and system of uniform security policies.
In order to achieve the above object, it adopts the following technical scheme that
A kind of terminal unit management system based on cloud server, the instruction issuing mould including being set to cloud server
Block, set on the instruction execution module and desktop customized module of terminal device, the desktop customized module is replaced using customized desktop
The original desktop of terminal device operating system, the customized desktop are close with original desktop;Described instruction is assigned module and is used for
Instruction is assigned to more than one specified terminal device by wireless network, it is fixed that the instruction execution module of the terminal device passes through
Desktop processed executes described instruction.The not off-loadable of desktop customized module is realized by the customized desktop that terminal device can not exit,
It enables cloud server complete controlling terminal equipment, and then realizes control function.
Further, described instruction assigns module for configuring unified security strategy, network connection, the white name of application program
One of list or application program set-up mode or a variety of instructions, the instruction execution module of the terminal device is according to instruction execution
Modify terminal device security strategy, modification network connection, more new application white list or the operation that application program is set.In cloud
It holds in server, configured instruction is issued to terminal device and executed by administrator, realizes the control of remote batch security strategy.
Further, the cloud server includes application program detection control module, is used for through decompiling source code
Or judge to be uploaded to the application program of cloud server according to application program black and white lists as malicious application or security application
Program or unknown security application prevent malicious application from storing to cloud server;The terminal device is equipped with cloud
Application program download module is held, the terminal device is only capable of answering by cloud application program download module from cloud server downloading
Use program.Server prevents malicious application beyond the clouds, is only capable of downloading application program from cloud server, it is ensured that terminal device
Using safe.
Further, the terminal device further includes information collection module, is used to record its network connection state, uses
One of people, electricity, number of applications, application name, network flow, roaming state or hardware information or a variety of letters
Breath, and it is uploaded to cloud server;The cloud server is equipped with assets management module, the letter that information collection module is collected
Breath generates the information report of counterpart terminal equipment.By recording the various information of terminal device, different hardware can be distinguished and set
It is standby, realize the certain management function of cloud server.
The terminal device further includes flow alarm function module, is used to judge whether its flow usage amount to be greater than preset threshold
It is worth flow, if more than alarm.Flow alarm function module continues to monitor terminal device information report, just makees at regular intervals primary
Judgement, effectively prevent super flow to cause user's economic loss.
Further, the cloud server is equipped with critical data library, is used for the critical data of storage terminal device;Institute
Terminal device is stated equipped with critical data uploading module, is used to upload the critical data of terminal device to the key of cloud server
Database;The terminal device is equipped with critical data download module, is used to download critical data from the critical data library.It closes
Key data is automatically stored and replys the safety that can effectively guarantee data, prevents the data corruption of terminal device and loss
Phenomenon.
Further, described instruction assign the instruction that module is assigned further include document issue, message or application program update
Instruction, the instruction execution module of the terminal device is according to instruction execution profile download, reading message or more new application
Operation.For enterprise application update, message transmission, particular document can a key download to terminal device, and settable document
Downloading, reading permission etc..
A kind of terminal equipment managing method based on cloud server, comprising the following steps:
Desktop customized module set on terminal device replaces the original desktop of terminal device operating system using customized desktop,
The customized desktop is close with original desktop;Set on cloud server instruction issuing module by wireless network to one with
Upper terminal device assigns instruction;Instruction execution module set on terminal device executes described instruction by customized desktop.
Further, described instruction assign module by wireless network to more than one terminal device assign security strategy,
Network connection, application program white list, application program set-up mode, document issue, one of message or application program update
Or a variety of instructions, the instruction execution module of the terminal device modify terminal device security strategy, modification net according to instruction execution
Network connection, setting application program, executes profile download, reading message or more new application at more new application white list
Operation.
Further, the cloud server is uploaded to by decompiling source code or according to the judgement of application program black and white lists
The application program of cloud server is malicious application or security application or unknown security application, prevents malice
Application program is stored to cloud server;The terminal device records its network connection states, user, electricity, application program
One of quantity, application name, network flow, roaming state or hardware information or much information, and generate terminal and set
Standby information report, the terminal device information report upload to cloud server;The terminal device is according to terminal device information
Report judges whether its flow usage amount is greater than preset threshold flow, if more than alarm.
Compared with prior art, the beneficial effects of the present invention are:
Existing terminal device and equipment safety management software can only be on the terminal device to mobile device and equipment safeties
It is managed, cannot achieve remote mode and concentration security management and control is carried out to equipment.The present invention can be directed to different terminal devices,
The uniform security policies control for carrying out batch device, facilitates administrator to check and count the state of each terminal device.
Detailed description of the invention
Fig. 1 is the structural block diagram of the terminal unit management system of the present invention based on cloud server;
Fig. 2 is another example structure block diagram of the terminal unit management system of the present invention based on cloud server.
Fig. 3 is the step flow chart of the terminal equipment managing method of the present invention based on cloud server.
Specific embodiment
Come that the present invention will be described in detail below in conjunction with attached drawing and specific implementation method, it is of the invention it is schematic implement and
Illustrate for explaining the present invention, but not as a limitation of the invention.
The present invention be mainly based upon cloud server to terminal device safety effectively managed, to terminal device into
Row centralized management.Terminal device can not limit its operating system used, using Android operation system or IOS operating system or
Windows Phone operating system does not interfere with actual operation and application.By soft in installing terminal equipment client
The security management and control to terminal device is completed in part and cloud server control.
As seen from Figure 1, system of the present invention includes terminal device and the big main body hardware of cloud server two.At end
End equipment has instruction execution module and desktop customized module.Instruction execution module and desktop customized module can pass through software visitor
The form at family end is realized, can be integrated two functional modules of software, or isolated software module.Desktop custom mold
Block enables terminal device after powering automatically into customized desktop.Customized desktop can not exit in normal use process.Customization
Desktop will apply workable for the original desktop of replacement system and toolbar etc..There are multiple split screens in customized desktop, can drag point
Screen, functions, actual functional capability and the frame such as dragging uninstall are close with former desktop function frame.After customized desktop comes into force, user
Operating terminal equipment, by clicking home key, the operation such as return key enters customized desktop main interface, not former back to system
Raw desktop.
And customized desktop only shows the application program in the application program white list of cloud server configuration.Such as: cloud
There are a white lists to be associated with the equipment, whitelisted content for server are as follows: QQ application, browser application, calendar application, electronics postal
Part application, then customized desktop only shows this four applications, and mounted application is not shown in white list in other systems, fixed
Desktop processed is not also shown.Customized desktop gets up the application hides in non-white list, and user also can not be otherwise
Recall use.
When user is by some other means, using the application program of non-white list, then desktop interception can be customized.Example
Such as: when terminal device connects computer by A client, the A client installed in terminal device can start automatically.Customized desktop is sentenced
Disconnected A client is non-white list application, does not allow to start, and interception mechanism is applied in customized desktop starting, and pop-up prompt does not allow to make
With non-white list application, and A client is forcibly closed, to guarantee that user can only use the effect applied in customized desktop.
Since customized desktop has covered the desktop of replacement system, has the function of original system desktop.Actually answering
In, the corresponding cloud server of multiple terminal devices.When the instruction issuing module of cloud server sets several terminals
For when assigning various instructions, instruction execution module executes the instruction assigned by customized desktop.Cloud server is realized to issue
Instruction, issues security configuration mode and is controlled uniformly to terminal device.It, can be real in particular for the terminal unit management of enterprise
Now all to enterprises or designated terminal equipment unified security control.
In Cloud Server, instruction issuing module is equivalent to a part of management software.Administrator can be by under instruction
Various instructions are assigned up to module pair and its terminal device networked.Including configuring unified security strategy, be connected to the network, answer
With one of program white list or application program set-up mode or a variety of instructions.Security strategy refers to for all with safe phase
Movable set of rule is closed, there is different security strategies in each operating system.Unified peace is configured in Cloud Server
After full strategy, terminal device will be reached under security strategy, institute is executed by customized desktop by the instruction execution module of terminal device
Security strategy instruction is stated, may be implemented to carry out all terminal devices unified security management and control, does not have to each terminal device
Manual configuration improves production efficiency, reduces cost of labor.Configuring security strategy includes that instruction execution module can pass through operating system
The interface of offer forces terminal device to be arranged password, while terminal device can be escaped from prison letter at the first time after terminal device is escaped from prison
Breath is uploaded to cloud server, reminds administrator by way of sending mail to cloud server.Similarly, network connection can also
To assign.Such as specified some WIFI that connects illustrates to have exceeded the range when that can not connect, and does not allow at this time beyond its net
Network coverage area using terminal equipment, can further controlling terminal equipment place to use.Server, which is set, beyond the clouds answers
After program white list, by reaching each terminal device under networking unification, answering for each terminal device can be effectively updated
With program white list, safety is further strengthened.Different functions is used according to different permissions in certain application programs.Pass through
Server corresponding permission set by server beyond the clouds and be issued to these application programs by network beyond the clouds
Specified or each terminal device, so that it may realize the synchronism of all terminal devices or section terminating equipment.For example, at certain
Higher permission is temporarily opened in a little application programs, secret key required for opening higher permission is set by server beyond the clouds,
By being uniformly issued to terminal device, the safety of terminal device user's bring secret key leakage can be directly given to avoid secret key
Problem.
More functions may be implemented in instruction issuing module.The instruction assigned is sent to terminal device by instruction issuing module
When, terminal device receives the instruction assigned, and executing includes profile download, reading message, more new application, modification terminal
Device security policy, modification network connection, more new application white list or the operation that application program is set.For example, beyond the clouds
Server uploads multiple documents, and the terminal device connecting with cloud server has unique identification code, can be with by identification code
Distinguish different terminal devices.It directly executes document to several specified terminal devices in server beyond the clouds to issue, terminal
Equipment receives send instructions under document after, instruction execution module next week of terminal device specified document issued.Reading message,
Journey is applied in more new application, modification terminal device security strategy, modification network connection, more new application white list or setting
The operation of sequence is identical with the principle that document issues, and does not repeat herein.
As shown in Fig. 2, cloud server further includes application program detection control in order to further ensure the safety of terminal device
Molding block.Application program detection control module can judge that the application program for uploading to cloud server is by decompiling source code
Which kind of application program.It may determine that application program is security application or malicious application journey according to existing decompiling source code
Sequence or Unknown Applications.Application program detection control module can also judge to be uploaded to cloud according to application program black and white lists
The application program of server is malicious application or security application or unknown security application.There is judgement to tie
After fruit, application program detection control module deletes the malicious application storage for being uploaded to cloud server, prevents this from maliciously answering
It is disseminated with program.In order to be further ensured that the safety of terminal device from enterprise's angle, terminal device does not allow outside downloading
The application program in unknown source.By the way that cloud application program download module is arranged in terminal device and limits its loading source, enable eventually
End equipment is only capable of to be further ensured that terminal from cloud server downloading application program by cloud application program download module
The safety of equipment.In addition, after application program black and white lists are according to production in the prior art beyond the clouds server or external production
It is uploaded to cloud server.After terminal device is connected to cloud server, terminal device downloads the black and white lists automatically.Only
Application program in white list, terminal device just can be used, and be shown in customized desktop.If accessed in terminal device
The application program of non-white list, customized desktop can intercept automatically and user is reminded not to be available non-white list application program, and move back
Non- white list application program out.
Terminal device further includes information collection module, is used to record its network connection state, user, electricity, application
One of program quantity, application name, network flow, roaming state or hardware information or much information, and be uploaded to
Cloud server facilitates administrator to carry out asset of equipments and checks and count.Record the network connection state of terminal device, including note
The network of record connection is GPRS or WIFI, and the WIFI title of connection is the information such as which.Pass through the current position of record terminal device
It sets and determines if in roaming state.When the phonecard of the terminal device is some city or province or country, the terminal
When equipment is carried into another city or province or country, it can be known whether by the coordinate on GPS in roaming
State.Hardware information includes the information such as hardware configuration, mobile phone string number, model.Wherein, terminal device further includes flow alarm function mould
Block, is used to judge whether its flow usage amount to be greater than preset threshold flow, if more than alarm.Flow alarm function module can unite
Meter customer flow situation simultaneously alerts, and counting user state and alerts whether roaming, and the management of the terminal device of enterprise is effectively ensured.
The cloud server is equipped with critical data library, is used for the critical data of storage terminal device.Terminal device is set
There is critical data uploading module, is used to upload the critical data of terminal device to the critical data library of cloud server.It is described
Terminal device is equipped with critical data download module, is used to download critical data from the critical data library.For being necessary to ensure that
For the enterprise of minimum downtime and maximum capacity, business continuance is most important, the backup of critical data and restores
Indispensable role.Uploading module and download module are according to the automatic or manual triggering of actual demand.
Terminal device supports the protection of copy in violation of rules and regulations.Instruction execution module includes encryption unit, is used for external storage
The data encryption feature of medium and built-in storage medium.By encryption unit to external storage medium or built-in storage medium
Encryption, can prevent the leakage of data of terminal device.
By the modules built in terminal device, automatic running, connects cloud server and registers equipment after powering
Information, and security management and control is carried out to its index according to the security strategy of cloud service end setting.It is real-time by information collection module
Collecting device relevant information, such as location information, flow information.When the network of mobile device is obstructed, by the information of reading
It is stored on the internal or external storage medium of terminal device.After being connected to network, wirelessly by all records
Pass to cloud server.Cloud server can it is long-range under send instructions, include control instruction and policy instructions etc..If terminal device
Not online, instruction sends instructions down offline cache to cloud server until terminal device connection cloud server immediately.Eventually
After end equipment receives instruction, equipment safety control is carried out by the corresponding operation of instruction.
The step flow chart of terminal equipment managing method of the Fig. 3 based on cloud server, mainly comprises the steps that
S10: the desktop customized module of terminal device replaces the original desktop of terminal device operating system using customized desktop.
Desktop customized module enables terminal device after powering automatically into customized desktop.Customized desktop was used normally
It can not be exited in journey.Customized desktop will apply workable for the original desktop of replacement system and toolbar etc..Have in customized desktop
Multiple split screens can drag split screen, the functions such as dragging uninstall (actual functional capability is similar with former desktop function).Customized desktop comes into force
Afterwards, user's operation terminal device, by clicking home key, the operation such as return key enters customized desktop main interface, does not return to
The primary desktop of system, ensure that the safety of terminal device.
Further, in order to guarantee safety, customized desktop is only shown in the application program white list of cloud server configuration
Application program.Such as: there are a white lists to be associated with the equipment, whitelisted content for cloud server are as follows: QQ application, browser are answered
With, calendar application, e-mail applications, then customized desktop only shows this four applications, and mounted application is not in other systems
It is shown in white list, is not also shown in customized desktop.Customized desktop gets up the application hides in non-white list, user
Also use can not be recalled otherwise.
S20: the instruction issuing module of cloud server assigns instruction to more than one terminal device by wireless network.
Described instruction assigns module by the networks such as wireless network, including GPRS and WIFI under more than one terminal device
Issued up to security strategy, network connection, application program white list, application program set-up mode, document, message or application program more
One of new or a variety of instructions.The cloud server is by decompiling source code or according in the judgement of application program black and white lists
The application program for reaching cloud server is malicious application or security application or unknown security application, is prevented
Malicious application is stored to cloud server, prevents the malicious application from disseminating.Its network of the terminal device records connects
It connects in state, user, electricity, number of applications, application name, network flow, roaming state or hardware information
One or more information, and it is uploaded to cloud server.It is preset whether the terminal device is greater than according to its flow usage amount
Threshold flow, if more than alarm.The statistics available customer flow situation of flow alarm function module simultaneously alerts, shape whether counting user roams
State simultaneously alerts, and the management of the terminal device of enterprise is effectively ensured.
S30: the instruction execution module of terminal device executes described instruction by customized desktop.
The instruction execution module of terminal device modifies terminal device security strategy according to instruction execution, modification is connected to the network,
More new application white list, the operation for setting application program, executing profile download, reading message or more new application.By
In customized desktop always all instead of the former desktop of system, all instruction execution operations are all based on customized desktop and execute.
For example, it is desired to close WIFI, then the instruction for closing WIFI is assigned in server beyond the clouds, after terminal device receives the instruction,
Automatically WIFI is closed under customized desktop.
It is provided for the embodiments of the invention technical solution above to be described in detail, specific case used herein
The principle and embodiment of the embodiment of the present invention are expounded, the explanation of above embodiments is only applicable to help to understand this
The principle of inventive embodiments;At the same time, for those skilled in the art, according to an embodiment of the present invention, in specific embodiment party
There will be changes in formula and application range, in conclusion the contents of this specification are not to be construed as limiting the invention.
Claims (7)
1. a kind of terminal unit management system based on cloud server characterized by comprising
Set on the instruction issuing module of cloud server;Described instruction assigns module for configuring unified security strategy, network
Connection, application program white list, application program set-up mode, document issue, one of message or application program update or more
Kind instruction;
Set on the instruction execution module and desktop customized module of terminal device;
The desktop customized module using customized desktop replace the original desktop of terminal device operating system, the customized desktop with
Original desktop is close;The content of the customized desktop replacement includes the workable application of original desktop and toolbar;
Described instruction assigns module for assigning instruction, the terminal to more than one specified terminal device by wireless network
The instruction execution module of equipment executes described instruction by customized desktop;Wherein, the instruction execution module root of the terminal device
According to instruction execution modification terminal device security strategy, modification network connection, more new application white list, be arranged application program,
Profile download, the operation for reading message or more new application.
2. the terminal unit management system according to claim 1 based on cloud server, it is characterised in that:
The cloud server includes application program detection control module, is used for by decompiling source code or according to application program
Black and white lists judge to be uploaded to the application program of cloud server as malicious application or security application or unknown safety
Property application program, prevent malicious application store to cloud server;
The terminal device is equipped with cloud application program download module, and the terminal device is only capable of downloading by cloud application program
Module downloads application program from cloud server.
3. the terminal unit management system according to claim 1 based on cloud server, it is characterised in that:
The terminal device further includes information collection module, is used to record its network connection state, user, electricity, application
One of program quantity, application name, network flow, roaming state or hardware information or much information, and be uploaded to
Cloud server;The cloud server is equipped with assets management module, and the information that information collection module is collected, which generates, to be corresponded to
The information report of terminal device.
4. the terminal unit management system according to claim 3 based on cloud server, it is characterised in that:
The terminal device further includes flow alarm function module, is used to judge whether its flow usage amount to be greater than preset threshold value stream
Amount, if more than alarm.
5. the terminal unit management system according to claim 1 based on cloud server, it is characterised in that:
The cloud server is equipped with critical data library, is used for the critical data of storage terminal device;
The terminal device is equipped with critical data uploading module, is used to upload the critical data of terminal device to cloud server
Critical data library;
The terminal device is equipped with critical data download module, is used to download critical data from the critical data library.
6. a kind of terminal equipment managing method based on cloud server, which comprises the following steps:
Desktop customized module set on terminal device replaces the original desktop of terminal device operating system using customized desktop, described
Customized desktop is close with original desktop;The content of the customized desktop replacement includes the workable application of original desktop and tool
Column;
Instruction issuing module set on cloud server assigns instruction to more than one terminal device by wireless network;Wherein,
Described instruction assigns module and assigns security strategy, network connection, application program to more than one terminal device by wireless network
White list, application program set-up mode, document issue, one of message or application program update or a variety of instructions;
Instruction execution module set on terminal device executes described instruction by customized desktop;Wherein, the finger of the terminal device
Execution module is enabled to modify terminal device security strategy according to instruction execution, modification network connection, more new application white list, set
The operation for setting application program, executing profile download, reading message or more new application.
7. the terminal equipment managing method according to claim 6 based on cloud server, which is characterized in that
The cloud server is uploaded to cloud server by decompiling source code or according to the judgement of application program black and white lists
Application program is malicious application or security application or unknown security application, and malicious application is prevented to store
To cloud server;
The terminal device records its network connection states, user, electricity, number of applications, application name, network
One of flow, roaming state or hardware information or much information, and it is uploaded to cloud server;The terminal device according to
Whether its flow usage amount is greater than preset threshold flow, if more than alarm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510032477.2A CN104539467B (en) | 2015-01-22 | 2015-01-22 | A kind of terminal unit management system and management method based on cloud server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510032477.2A CN104539467B (en) | 2015-01-22 | 2015-01-22 | A kind of terminal unit management system and management method based on cloud server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104539467A CN104539467A (en) | 2015-04-22 |
CN104539467B true CN104539467B (en) | 2019-01-08 |
Family
ID=52854936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510032477.2A Active CN104539467B (en) | 2015-01-22 | 2015-01-22 | A kind of terminal unit management system and management method based on cloud server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104539467B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104856807A (en) * | 2015-04-29 | 2015-08-26 | 万凤伟 | Intelligent first-aid kit and intelligent first-aid kit management system |
CN106331288A (en) * | 2015-06-24 | 2017-01-11 | 中兴通讯股份有限公司 | Application processing method and device |
CN105553720A (en) * | 2015-12-15 | 2016-05-04 | 浪潮电子信息产业股份有限公司 | Client and system with trusted operating environments |
CN105760777B (en) * | 2016-02-16 | 2018-07-17 | 上海斐讯数据通信技术有限公司 | A kind of safety information management method and system based on intelligent platform |
CN106155475A (en) * | 2016-06-20 | 2016-11-23 | 乐视控股(北京)有限公司 | The customized desktop method for pushing of intelligent terminal and system |
CN106295320A (en) * | 2016-08-05 | 2017-01-04 | 广州中国科学院软件应用技术研究所 | A kind of android system customized desktop based on white list |
CN106778231A (en) * | 2016-12-22 | 2017-05-31 | 江苏神州信源系统工程有限公司 | A kind of application security management method realized in Android system |
CN106961450A (en) * | 2017-05-24 | 2017-07-18 | 深信服科技股份有限公司 | Safety defense method, terminal, cloud server and safety defense system |
CN111049860A (en) * | 2019-12-27 | 2020-04-21 | 郑州信大捷安信息技术股份有限公司 | Remote equipment centralized management and control system and method |
CN112087482B (en) * | 2020-07-23 | 2021-06-29 | 上海琥崧智能科技股份有限公司 | Method for managing multiple devices by using cloud system |
CN114338805B (en) * | 2021-12-29 | 2023-05-16 | 金卡智能集团股份有限公司 | Data processing method and server |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0853413A2 (en) * | 1997-01-09 | 1998-07-15 | Sun Microsystems Inc. | Special purpose network server |
CN103646215A (en) * | 2013-12-23 | 2014-03-19 | 北京奇虎科技有限公司 | Application installation control method, related system and related device |
CN104123059A (en) * | 2013-04-26 | 2014-10-29 | 华茂云天科技(北京)有限公司 | Cloud computing management system based on web desktop system |
CN104252374A (en) * | 2014-10-17 | 2014-12-31 | 北京奇虎科技有限公司 | Program control method and device on basis of architecture change |
-
2015
- 2015-01-22 CN CN201510032477.2A patent/CN104539467B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0853413A2 (en) * | 1997-01-09 | 1998-07-15 | Sun Microsystems Inc. | Special purpose network server |
CN104123059A (en) * | 2013-04-26 | 2014-10-29 | 华茂云天科技(北京)有限公司 | Cloud computing management system based on web desktop system |
CN103646215A (en) * | 2013-12-23 | 2014-03-19 | 北京奇虎科技有限公司 | Application installation control method, related system and related device |
CN104252374A (en) * | 2014-10-17 | 2014-12-31 | 北京奇虎科技有限公司 | Program control method and device on basis of architecture change |
Also Published As
Publication number | Publication date |
---|---|
CN104539467A (en) | 2015-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104539467B (en) | A kind of terminal unit management system and management method based on cloud server | |
US11575685B2 (en) | User behavior profile including temporal detail corresponding to user interaction | |
US10986122B2 (en) | Identifying and remediating phishing security weaknesses | |
CN103403669B (en) | App is made to become safe method and the method preventing app damage equipment | |
US9402184B2 (en) | Associating services to perimeters | |
CN103891242B (en) | System and method for profile based filtering of outgoing information in a mobile environment | |
CN103299658A (en) | Management of mobile applications | |
US20140164437A1 (en) | Selective management of mobile device data in an enterprise environment | |
US20100299152A1 (en) | Selective Management of Mobile Devices in an Enterprise Environment | |
EP3025229B1 (en) | Data communications management | |
US11677696B2 (en) | Architecture for performing action in a third-party service by an email client | |
CN110414258A (en) | Document handling method and system, data processing method | |
CN101483658B (en) | System and method for input content protection of browser | |
CN103716785A (en) | Mobile Internet security service system | |
CN103413083A (en) | Security defending system for single host | |
CN105894640A (en) | Guest room door lock management method and device | |
CN107566375B (en) | Access control method and device | |
CN112468409A (en) | Access control method, device, computer equipment and storage medium | |
US20180205762A1 (en) | Automatically securing data based on geolocation, network or device parameters | |
CN107315934A (en) | Communication message processing method, mobile terminal and storage device | |
CN103607508B (en) | The management method of a kind of authority, device and mobile phone terminal | |
CN107105103A (en) | A kind of information solicitation method and information solicitation device | |
CN108307463A (en) | mode switching method, system and access control system | |
US20190335325A1 (en) | System and Process for Locking a Subscriber Identity Module (SIM) Card to a Wireless Device | |
CN105868622A (en) | Method and device for controlling startup of application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |