CN104539467B - A kind of terminal unit management system and management method based on cloud server - Google Patents

A kind of terminal unit management system and management method based on cloud server Download PDF

Info

Publication number
CN104539467B
CN104539467B CN201510032477.2A CN201510032477A CN104539467B CN 104539467 B CN104539467 B CN 104539467B CN 201510032477 A CN201510032477 A CN 201510032477A CN 104539467 B CN104539467 B CN 104539467B
Authority
CN
China
Prior art keywords
terminal device
cloud server
module
desktop
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510032477.2A
Other languages
Chinese (zh)
Other versions
CN104539467A (en
Inventor
何川
袁峰
李引
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Software Application Technology Guangzhou GZIS of CAS
Original Assignee
Institute of Software Application Technology Guangzhou GZIS of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Software Application Technology Guangzhou GZIS of CAS filed Critical Institute of Software Application Technology Guangzhou GZIS of CAS
Priority to CN201510032477.2A priority Critical patent/CN104539467B/en
Publication of CN104539467A publication Critical patent/CN104539467A/en
Application granted granted Critical
Publication of CN104539467B publication Critical patent/CN104539467B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of terminal unit management system and management method based on cloud server, the system comprises the instruction issuing modules for being set to cloud server, set on the instruction execution module and desktop customized module of terminal device, the desktop customized module replaces the original desktop of terminal device operating system using customized desktop, and the customized desktop is close with original desktop;Described instruction assigns module for assigning instruction to more than one specified terminal device by wireless network, and the instruction execution module of the terminal device executes described instruction by customized desktop.The present invention can be directed to different terminal devices, carry out the uniform security policies control of batch device, administrator is facilitated to check and count the state of each terminal device.

Description

A kind of terminal unit management system and management method based on cloud server
Technical field
The present invention relates to fields of communication technology, more particularly, to a kind of terminal unit management system based on cloud server And management method.
Background technique
Terminal device makes mobile communication terminal refer to that the computer equipment that can be used on the move, broad sense say packet Including mobile phone, notebook, tablet computer, POS machine includes even vehicle-mounted computer.But refers to mobile phone in most cases or have The smart phone and tablet computer of a variety of application functions.As network and technology are towards the hair in more and more broadband direction Exhibition, Mobile Communication Industry will move towards the real mobile message epoch.
With the rapid development of integrated circuit technique, terminal device has had powerful processing capacity, terminal device Become an integrated information processing platform from simple call tool.Modern terminal device has possessed extremely powerful Processing capacity (CPU frequency is already close to 2G), solidifies storage medium and the operating system as computer at memory, is one Complete superminicomputer system, can complete complicated processing task.Terminal device also possesses communication party very rich Formula, it can pass through GSM, CDMA, WCDMA, the wireless operators network communication such as EDGE, 3G;It can also be blue by WLAN It tooth and infrared is communicated.Terminal device not only can talk at present, takes pictures, listens to music, playing game, and may be implemented include Positioning, information processing, finger scan, identity card scanning, bar code scan, RFID scanning, IC card scanning and alcohol content detection Etc. function abundant, become mobile law enforcement, mobile office and the important tool of Mobile business.
The usually existing software for being directed to terminal device and equipment safety management, is being directed to based on terminal device exploitation The application of consumer.By installing mobile device management software in equipment, equipment and equipment safety are managed.City at present Common mobile phone safe software passes through professional antivirus engine on face, ensures that terminal device is invaded and harassed from virus.
Application No. is 201310125590.6, denomination of invention are as follows: the remote lock method of terminal, system, cloud server A kind of remote lock method of terminal is disclosed with the Chinese patent application of terminal, this method can be to avoid first terminal by again Brush machine resets password, guarantees that first terminal is not illegally used.This method can control first terminal from cloud, avoid for the first end End resets password by brush machine again, but cannot carry out others to terminal and be uniformly controlled, and is only capable of targetedly managing.
Application No. is 201310690101.1, denomination of invention are as follows: the Chinese patent Shen of the method for mobile phone remote safeguard protection A kind of method of telesecurity protection please be disclose, can be solved with remote lock user mobile phone terminal and remote destroying user data Certainly remote protecting problem implements thoroughly effective security protection.This method is by remote lock mobile phone terminal and destroys data, But it not can control mobile phone terminal, the management of centralization cannot be carried out to mobile phone terminal.
Summary of the invention
The purpose of the present invention is exactly overcome the deficiencies of the prior art and provide a kind of terminal device and is replaced using customized desktop Original system desktop and by sending instructions under server can realize that remote mode collect equipment to terminal device by customized desktop Middle security management and control configures the control method and system of uniform security policies.
In order to achieve the above object, it adopts the following technical scheme that
A kind of terminal unit management system based on cloud server, the instruction issuing mould including being set to cloud server Block, set on the instruction execution module and desktop customized module of terminal device, the desktop customized module is replaced using customized desktop The original desktop of terminal device operating system, the customized desktop are close with original desktop;Described instruction is assigned module and is used for Instruction is assigned to more than one specified terminal device by wireless network, it is fixed that the instruction execution module of the terminal device passes through Desktop processed executes described instruction.The not off-loadable of desktop customized module is realized by the customized desktop that terminal device can not exit, It enables cloud server complete controlling terminal equipment, and then realizes control function.
Further, described instruction assigns module for configuring unified security strategy, network connection, the white name of application program One of list or application program set-up mode or a variety of instructions, the instruction execution module of the terminal device is according to instruction execution Modify terminal device security strategy, modification network connection, more new application white list or the operation that application program is set.In cloud It holds in server, configured instruction is issued to terminal device and executed by administrator, realizes the control of remote batch security strategy.
Further, the cloud server includes application program detection control module, is used for through decompiling source code Or judge to be uploaded to the application program of cloud server according to application program black and white lists as malicious application or security application Program or unknown security application prevent malicious application from storing to cloud server;The terminal device is equipped with cloud Application program download module is held, the terminal device is only capable of answering by cloud application program download module from cloud server downloading Use program.Server prevents malicious application beyond the clouds, is only capable of downloading application program from cloud server, it is ensured that terminal device Using safe.
Further, the terminal device further includes information collection module, is used to record its network connection state, uses One of people, electricity, number of applications, application name, network flow, roaming state or hardware information or a variety of letters Breath, and it is uploaded to cloud server;The cloud server is equipped with assets management module, the letter that information collection module is collected Breath generates the information report of counterpart terminal equipment.By recording the various information of terminal device, different hardware can be distinguished and set It is standby, realize the certain management function of cloud server.
The terminal device further includes flow alarm function module, is used to judge whether its flow usage amount to be greater than preset threshold It is worth flow, if more than alarm.Flow alarm function module continues to monitor terminal device information report, just makees at regular intervals primary Judgement, effectively prevent super flow to cause user's economic loss.
Further, the cloud server is equipped with critical data library, is used for the critical data of storage terminal device;Institute Terminal device is stated equipped with critical data uploading module, is used to upload the critical data of terminal device to the key of cloud server Database;The terminal device is equipped with critical data download module, is used to download critical data from the critical data library.It closes Key data is automatically stored and replys the safety that can effectively guarantee data, prevents the data corruption of terminal device and loss Phenomenon.
Further, described instruction assign the instruction that module is assigned further include document issue, message or application program update Instruction, the instruction execution module of the terminal device is according to instruction execution profile download, reading message or more new application Operation.For enterprise application update, message transmission, particular document can a key download to terminal device, and settable document Downloading, reading permission etc..
A kind of terminal equipment managing method based on cloud server, comprising the following steps:
Desktop customized module set on terminal device replaces the original desktop of terminal device operating system using customized desktop, The customized desktop is close with original desktop;Set on cloud server instruction issuing module by wireless network to one with Upper terminal device assigns instruction;Instruction execution module set on terminal device executes described instruction by customized desktop.
Further, described instruction assign module by wireless network to more than one terminal device assign security strategy, Network connection, application program white list, application program set-up mode, document issue, one of message or application program update Or a variety of instructions, the instruction execution module of the terminal device modify terminal device security strategy, modification net according to instruction execution Network connection, setting application program, executes profile download, reading message or more new application at more new application white list Operation.
Further, the cloud server is uploaded to by decompiling source code or according to the judgement of application program black and white lists The application program of cloud server is malicious application or security application or unknown security application, prevents malice Application program is stored to cloud server;The terminal device records its network connection states, user, electricity, application program One of quantity, application name, network flow, roaming state or hardware information or much information, and generate terminal and set Standby information report, the terminal device information report upload to cloud server;The terminal device is according to terminal device information Report judges whether its flow usage amount is greater than preset threshold flow, if more than alarm.
Compared with prior art, the beneficial effects of the present invention are:
Existing terminal device and equipment safety management software can only be on the terminal device to mobile device and equipment safeties It is managed, cannot achieve remote mode and concentration security management and control is carried out to equipment.The present invention can be directed to different terminal devices, The uniform security policies control for carrying out batch device, facilitates administrator to check and count the state of each terminal device.
Detailed description of the invention
Fig. 1 is the structural block diagram of the terminal unit management system of the present invention based on cloud server;
Fig. 2 is another example structure block diagram of the terminal unit management system of the present invention based on cloud server.
Fig. 3 is the step flow chart of the terminal equipment managing method of the present invention based on cloud server.
Specific embodiment
Come that the present invention will be described in detail below in conjunction with attached drawing and specific implementation method, it is of the invention it is schematic implement and Illustrate for explaining the present invention, but not as a limitation of the invention.
The present invention be mainly based upon cloud server to terminal device safety effectively managed, to terminal device into Row centralized management.Terminal device can not limit its operating system used, using Android operation system or IOS operating system or Windows Phone operating system does not interfere with actual operation and application.By soft in installing terminal equipment client The security management and control to terminal device is completed in part and cloud server control.
As seen from Figure 1, system of the present invention includes terminal device and the big main body hardware of cloud server two.At end End equipment has instruction execution module and desktop customized module.Instruction execution module and desktop customized module can pass through software visitor The form at family end is realized, can be integrated two functional modules of software, or isolated software module.Desktop custom mold Block enables terminal device after powering automatically into customized desktop.Customized desktop can not exit in normal use process.Customization Desktop will apply workable for the original desktop of replacement system and toolbar etc..There are multiple split screens in customized desktop, can drag point Screen, functions, actual functional capability and the frame such as dragging uninstall are close with former desktop function frame.After customized desktop comes into force, user Operating terminal equipment, by clicking home key, the operation such as return key enters customized desktop main interface, not former back to system Raw desktop.
And customized desktop only shows the application program in the application program white list of cloud server configuration.Such as: cloud There are a white lists to be associated with the equipment, whitelisted content for server are as follows: QQ application, browser application, calendar application, electronics postal Part application, then customized desktop only shows this four applications, and mounted application is not shown in white list in other systems, fixed Desktop processed is not also shown.Customized desktop gets up the application hides in non-white list, and user also can not be otherwise Recall use.
When user is by some other means, using the application program of non-white list, then desktop interception can be customized.Example Such as: when terminal device connects computer by A client, the A client installed in terminal device can start automatically.Customized desktop is sentenced Disconnected A client is non-white list application, does not allow to start, and interception mechanism is applied in customized desktop starting, and pop-up prompt does not allow to make With non-white list application, and A client is forcibly closed, to guarantee that user can only use the effect applied in customized desktop.
Since customized desktop has covered the desktop of replacement system, has the function of original system desktop.Actually answering In, the corresponding cloud server of multiple terminal devices.When the instruction issuing module of cloud server sets several terminals For when assigning various instructions, instruction execution module executes the instruction assigned by customized desktop.Cloud server is realized to issue Instruction, issues security configuration mode and is controlled uniformly to terminal device.It, can be real in particular for the terminal unit management of enterprise Now all to enterprises or designated terminal equipment unified security control.
In Cloud Server, instruction issuing module is equivalent to a part of management software.Administrator can be by under instruction Various instructions are assigned up to module pair and its terminal device networked.Including configuring unified security strategy, be connected to the network, answer With one of program white list or application program set-up mode or a variety of instructions.Security strategy refers to for all with safe phase Movable set of rule is closed, there is different security strategies in each operating system.Unified peace is configured in Cloud Server After full strategy, terminal device will be reached under security strategy, institute is executed by customized desktop by the instruction execution module of terminal device Security strategy instruction is stated, may be implemented to carry out all terminal devices unified security management and control, does not have to each terminal device Manual configuration improves production efficiency, reduces cost of labor.Configuring security strategy includes that instruction execution module can pass through operating system The interface of offer forces terminal device to be arranged password, while terminal device can be escaped from prison letter at the first time after terminal device is escaped from prison Breath is uploaded to cloud server, reminds administrator by way of sending mail to cloud server.Similarly, network connection can also To assign.Such as specified some WIFI that connects illustrates to have exceeded the range when that can not connect, and does not allow at this time beyond its net Network coverage area using terminal equipment, can further controlling terminal equipment place to use.Server, which is set, beyond the clouds answers After program white list, by reaching each terminal device under networking unification, answering for each terminal device can be effectively updated With program white list, safety is further strengthened.Different functions is used according to different permissions in certain application programs.Pass through Server corresponding permission set by server beyond the clouds and be issued to these application programs by network beyond the clouds Specified or each terminal device, so that it may realize the synchronism of all terminal devices or section terminating equipment.For example, at certain Higher permission is temporarily opened in a little application programs, secret key required for opening higher permission is set by server beyond the clouds, By being uniformly issued to terminal device, the safety of terminal device user's bring secret key leakage can be directly given to avoid secret key Problem.
More functions may be implemented in instruction issuing module.The instruction assigned is sent to terminal device by instruction issuing module When, terminal device receives the instruction assigned, and executing includes profile download, reading message, more new application, modification terminal Device security policy, modification network connection, more new application white list or the operation that application program is set.For example, beyond the clouds Server uploads multiple documents, and the terminal device connecting with cloud server has unique identification code, can be with by identification code Distinguish different terminal devices.It directly executes document to several specified terminal devices in server beyond the clouds to issue, terminal Equipment receives send instructions under document after, instruction execution module next week of terminal device specified document issued.Reading message, Journey is applied in more new application, modification terminal device security strategy, modification network connection, more new application white list or setting The operation of sequence is identical with the principle that document issues, and does not repeat herein.
As shown in Fig. 2, cloud server further includes application program detection control in order to further ensure the safety of terminal device Molding block.Application program detection control module can judge that the application program for uploading to cloud server is by decompiling source code Which kind of application program.It may determine that application program is security application or malicious application journey according to existing decompiling source code Sequence or Unknown Applications.Application program detection control module can also judge to be uploaded to cloud according to application program black and white lists The application program of server is malicious application or security application or unknown security application.There is judgement to tie After fruit, application program detection control module deletes the malicious application storage for being uploaded to cloud server, prevents this from maliciously answering It is disseminated with program.In order to be further ensured that the safety of terminal device from enterprise's angle, terminal device does not allow outside downloading The application program in unknown source.By the way that cloud application program download module is arranged in terminal device and limits its loading source, enable eventually End equipment is only capable of to be further ensured that terminal from cloud server downloading application program by cloud application program download module The safety of equipment.In addition, after application program black and white lists are according to production in the prior art beyond the clouds server or external production It is uploaded to cloud server.After terminal device is connected to cloud server, terminal device downloads the black and white lists automatically.Only Application program in white list, terminal device just can be used, and be shown in customized desktop.If accessed in terminal device The application program of non-white list, customized desktop can intercept automatically and user is reminded not to be available non-white list application program, and move back Non- white list application program out.
Terminal device further includes information collection module, is used to record its network connection state, user, electricity, application One of program quantity, application name, network flow, roaming state or hardware information or much information, and be uploaded to Cloud server facilitates administrator to carry out asset of equipments and checks and count.Record the network connection state of terminal device, including note The network of record connection is GPRS or WIFI, and the WIFI title of connection is the information such as which.Pass through the current position of record terminal device It sets and determines if in roaming state.When the phonecard of the terminal device is some city or province or country, the terminal When equipment is carried into another city or province or country, it can be known whether by the coordinate on GPS in roaming State.Hardware information includes the information such as hardware configuration, mobile phone string number, model.Wherein, terminal device further includes flow alarm function mould Block, is used to judge whether its flow usage amount to be greater than preset threshold flow, if more than alarm.Flow alarm function module can unite Meter customer flow situation simultaneously alerts, and counting user state and alerts whether roaming, and the management of the terminal device of enterprise is effectively ensured.
The cloud server is equipped with critical data library, is used for the critical data of storage terminal device.Terminal device is set There is critical data uploading module, is used to upload the critical data of terminal device to the critical data library of cloud server.It is described Terminal device is equipped with critical data download module, is used to download critical data from the critical data library.For being necessary to ensure that For the enterprise of minimum downtime and maximum capacity, business continuance is most important, the backup of critical data and restores Indispensable role.Uploading module and download module are according to the automatic or manual triggering of actual demand.
Terminal device supports the protection of copy in violation of rules and regulations.Instruction execution module includes encryption unit, is used for external storage The data encryption feature of medium and built-in storage medium.By encryption unit to external storage medium or built-in storage medium Encryption, can prevent the leakage of data of terminal device.
By the modules built in terminal device, automatic running, connects cloud server and registers equipment after powering Information, and security management and control is carried out to its index according to the security strategy of cloud service end setting.It is real-time by information collection module Collecting device relevant information, such as location information, flow information.When the network of mobile device is obstructed, by the information of reading It is stored on the internal or external storage medium of terminal device.After being connected to network, wirelessly by all records Pass to cloud server.Cloud server can it is long-range under send instructions, include control instruction and policy instructions etc..If terminal device Not online, instruction sends instructions down offline cache to cloud server until terminal device connection cloud server immediately.Eventually After end equipment receives instruction, equipment safety control is carried out by the corresponding operation of instruction.
The step flow chart of terminal equipment managing method of the Fig. 3 based on cloud server, mainly comprises the steps that
S10: the desktop customized module of terminal device replaces the original desktop of terminal device operating system using customized desktop.
Desktop customized module enables terminal device after powering automatically into customized desktop.Customized desktop was used normally It can not be exited in journey.Customized desktop will apply workable for the original desktop of replacement system and toolbar etc..Have in customized desktop Multiple split screens can drag split screen, the functions such as dragging uninstall (actual functional capability is similar with former desktop function).Customized desktop comes into force Afterwards, user's operation terminal device, by clicking home key, the operation such as return key enters customized desktop main interface, does not return to The primary desktop of system, ensure that the safety of terminal device.
Further, in order to guarantee safety, customized desktop is only shown in the application program white list of cloud server configuration Application program.Such as: there are a white lists to be associated with the equipment, whitelisted content for cloud server are as follows: QQ application, browser are answered With, calendar application, e-mail applications, then customized desktop only shows this four applications, and mounted application is not in other systems It is shown in white list, is not also shown in customized desktop.Customized desktop gets up the application hides in non-white list, user Also use can not be recalled otherwise.
S20: the instruction issuing module of cloud server assigns instruction to more than one terminal device by wireless network.
Described instruction assigns module by the networks such as wireless network, including GPRS and WIFI under more than one terminal device Issued up to security strategy, network connection, application program white list, application program set-up mode, document, message or application program more One of new or a variety of instructions.The cloud server is by decompiling source code or according in the judgement of application program black and white lists The application program for reaching cloud server is malicious application or security application or unknown security application, is prevented Malicious application is stored to cloud server, prevents the malicious application from disseminating.Its network of the terminal device records connects It connects in state, user, electricity, number of applications, application name, network flow, roaming state or hardware information One or more information, and it is uploaded to cloud server.It is preset whether the terminal device is greater than according to its flow usage amount Threshold flow, if more than alarm.The statistics available customer flow situation of flow alarm function module simultaneously alerts, shape whether counting user roams State simultaneously alerts, and the management of the terminal device of enterprise is effectively ensured.
S30: the instruction execution module of terminal device executes described instruction by customized desktop.
The instruction execution module of terminal device modifies terminal device security strategy according to instruction execution, modification is connected to the network, More new application white list, the operation for setting application program, executing profile download, reading message or more new application.By In customized desktop always all instead of the former desktop of system, all instruction execution operations are all based on customized desktop and execute. For example, it is desired to close WIFI, then the instruction for closing WIFI is assigned in server beyond the clouds, after terminal device receives the instruction, Automatically WIFI is closed under customized desktop.
It is provided for the embodiments of the invention technical solution above to be described in detail, specific case used herein The principle and embodiment of the embodiment of the present invention are expounded, the explanation of above embodiments is only applicable to help to understand this The principle of inventive embodiments;At the same time, for those skilled in the art, according to an embodiment of the present invention, in specific embodiment party There will be changes in formula and application range, in conclusion the contents of this specification are not to be construed as limiting the invention.

Claims (7)

1. a kind of terminal unit management system based on cloud server characterized by comprising
Set on the instruction issuing module of cloud server;Described instruction assigns module for configuring unified security strategy, network Connection, application program white list, application program set-up mode, document issue, one of message or application program update or more Kind instruction;
Set on the instruction execution module and desktop customized module of terminal device;
The desktop customized module using customized desktop replace the original desktop of terminal device operating system, the customized desktop with Original desktop is close;The content of the customized desktop replacement includes the workable application of original desktop and toolbar;
Described instruction assigns module for assigning instruction, the terminal to more than one specified terminal device by wireless network The instruction execution module of equipment executes described instruction by customized desktop;Wherein, the instruction execution module root of the terminal device According to instruction execution modification terminal device security strategy, modification network connection, more new application white list, be arranged application program, Profile download, the operation for reading message or more new application.
2. the terminal unit management system according to claim 1 based on cloud server, it is characterised in that:
The cloud server includes application program detection control module, is used for by decompiling source code or according to application program Black and white lists judge to be uploaded to the application program of cloud server as malicious application or security application or unknown safety Property application program, prevent malicious application store to cloud server;
The terminal device is equipped with cloud application program download module, and the terminal device is only capable of downloading by cloud application program Module downloads application program from cloud server.
3. the terminal unit management system according to claim 1 based on cloud server, it is characterised in that:
The terminal device further includes information collection module, is used to record its network connection state, user, electricity, application One of program quantity, application name, network flow, roaming state or hardware information or much information, and be uploaded to Cloud server;The cloud server is equipped with assets management module, and the information that information collection module is collected, which generates, to be corresponded to The information report of terminal device.
4. the terminal unit management system according to claim 3 based on cloud server, it is characterised in that:
The terminal device further includes flow alarm function module, is used to judge whether its flow usage amount to be greater than preset threshold value stream Amount, if more than alarm.
5. the terminal unit management system according to claim 1 based on cloud server, it is characterised in that:
The cloud server is equipped with critical data library, is used for the critical data of storage terminal device;
The terminal device is equipped with critical data uploading module, is used to upload the critical data of terminal device to cloud server Critical data library;
The terminal device is equipped with critical data download module, is used to download critical data from the critical data library.
6. a kind of terminal equipment managing method based on cloud server, which comprises the following steps:
Desktop customized module set on terminal device replaces the original desktop of terminal device operating system using customized desktop, described Customized desktop is close with original desktop;The content of the customized desktop replacement includes the workable application of original desktop and tool Column;
Instruction issuing module set on cloud server assigns instruction to more than one terminal device by wireless network;Wherein, Described instruction assigns module and assigns security strategy, network connection, application program to more than one terminal device by wireless network White list, application program set-up mode, document issue, one of message or application program update or a variety of instructions;
Instruction execution module set on terminal device executes described instruction by customized desktop;Wherein, the finger of the terminal device Execution module is enabled to modify terminal device security strategy according to instruction execution, modification network connection, more new application white list, set The operation for setting application program, executing profile download, reading message or more new application.
7. the terminal equipment managing method according to claim 6 based on cloud server, which is characterized in that
The cloud server is uploaded to cloud server by decompiling source code or according to the judgement of application program black and white lists Application program is malicious application or security application or unknown security application, and malicious application is prevented to store To cloud server;
The terminal device records its network connection states, user, electricity, number of applications, application name, network One of flow, roaming state or hardware information or much information, and it is uploaded to cloud server;The terminal device according to Whether its flow usage amount is greater than preset threshold flow, if more than alarm.
CN201510032477.2A 2015-01-22 2015-01-22 A kind of terminal unit management system and management method based on cloud server Active CN104539467B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510032477.2A CN104539467B (en) 2015-01-22 2015-01-22 A kind of terminal unit management system and management method based on cloud server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510032477.2A CN104539467B (en) 2015-01-22 2015-01-22 A kind of terminal unit management system and management method based on cloud server

Publications (2)

Publication Number Publication Date
CN104539467A CN104539467A (en) 2015-04-22
CN104539467B true CN104539467B (en) 2019-01-08

Family

ID=52854936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510032477.2A Active CN104539467B (en) 2015-01-22 2015-01-22 A kind of terminal unit management system and management method based on cloud server

Country Status (1)

Country Link
CN (1) CN104539467B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104856807A (en) * 2015-04-29 2015-08-26 万凤伟 Intelligent first-aid kit and intelligent first-aid kit management system
CN106331288A (en) * 2015-06-24 2017-01-11 中兴通讯股份有限公司 Application processing method and device
CN105553720A (en) * 2015-12-15 2016-05-04 浪潮电子信息产业股份有限公司 Client and system with trusted operating environments
CN105760777B (en) * 2016-02-16 2018-07-17 上海斐讯数据通信技术有限公司 A kind of safety information management method and system based on intelligent platform
CN106155475A (en) * 2016-06-20 2016-11-23 乐视控股(北京)有限公司 The customized desktop method for pushing of intelligent terminal and system
CN106295320A (en) * 2016-08-05 2017-01-04 广州中国科学院软件应用技术研究所 A kind of android system customized desktop based on white list
CN106778231A (en) * 2016-12-22 2017-05-31 江苏神州信源系统工程有限公司 A kind of application security management method realized in Android system
CN106961450A (en) * 2017-05-24 2017-07-18 深信服科技股份有限公司 Safety defense method, terminal, cloud server and safety defense system
CN111049860A (en) * 2019-12-27 2020-04-21 郑州信大捷安信息技术股份有限公司 Remote equipment centralized management and control system and method
CN112087482B (en) * 2020-07-23 2021-06-29 上海琥崧智能科技股份有限公司 Method for managing multiple devices by using cloud system
CN114338805B (en) * 2021-12-29 2023-05-16 金卡智能集团股份有限公司 Data processing method and server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0853413A2 (en) * 1997-01-09 1998-07-15 Sun Microsystems Inc. Special purpose network server
CN103646215A (en) * 2013-12-23 2014-03-19 北京奇虎科技有限公司 Application installation control method, related system and related device
CN104123059A (en) * 2013-04-26 2014-10-29 华茂云天科技(北京)有限公司 Cloud computing management system based on web desktop system
CN104252374A (en) * 2014-10-17 2014-12-31 北京奇虎科技有限公司 Program control method and device on basis of architecture change

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0853413A2 (en) * 1997-01-09 1998-07-15 Sun Microsystems Inc. Special purpose network server
CN104123059A (en) * 2013-04-26 2014-10-29 华茂云天科技(北京)有限公司 Cloud computing management system based on web desktop system
CN103646215A (en) * 2013-12-23 2014-03-19 北京奇虎科技有限公司 Application installation control method, related system and related device
CN104252374A (en) * 2014-10-17 2014-12-31 北京奇虎科技有限公司 Program control method and device on basis of architecture change

Also Published As

Publication number Publication date
CN104539467A (en) 2015-04-22

Similar Documents

Publication Publication Date Title
CN104539467B (en) A kind of terminal unit management system and management method based on cloud server
US11575685B2 (en) User behavior profile including temporal detail corresponding to user interaction
US10986122B2 (en) Identifying and remediating phishing security weaknesses
CN103403669B (en) App is made to become safe method and the method preventing app damage equipment
US9402184B2 (en) Associating services to perimeters
CN103891242B (en) System and method for profile based filtering of outgoing information in a mobile environment
CN103299658A (en) Management of mobile applications
US20140164437A1 (en) Selective management of mobile device data in an enterprise environment
US20100299152A1 (en) Selective Management of Mobile Devices in an Enterprise Environment
EP3025229B1 (en) Data communications management
US11677696B2 (en) Architecture for performing action in a third-party service by an email client
CN110414258A (en) Document handling method and system, data processing method
CN101483658B (en) System and method for input content protection of browser
CN103716785A (en) Mobile Internet security service system
CN103413083A (en) Security defending system for single host
CN105894640A (en) Guest room door lock management method and device
CN107566375B (en) Access control method and device
CN112468409A (en) Access control method, device, computer equipment and storage medium
US20180205762A1 (en) Automatically securing data based on geolocation, network or device parameters
CN107315934A (en) Communication message processing method, mobile terminal and storage device
CN103607508B (en) The management method of a kind of authority, device and mobile phone terminal
CN107105103A (en) A kind of information solicitation method and information solicitation device
CN108307463A (en) mode switching method, system and access control system
US20190335325A1 (en) System and Process for Locking a Subscriber Identity Module (SIM) Card to a Wireless Device
CN105868622A (en) Method and device for controlling startup of application

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant