CN105334970A - Terminal application locking method and system as well as terminal - Google Patents

Terminal application locking method and system as well as terminal Download PDF

Info

Publication number
CN105334970A
CN105334970A CN201410397810.5A CN201410397810A CN105334970A CN 105334970 A CN105334970 A CN 105334970A CN 201410397810 A CN201410397810 A CN 201410397810A CN 105334970 A CN105334970 A CN 105334970A
Authority
CN
China
Prior art keywords
terminal
instruction
application program
corresponding application
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201410397810.5A
Other languages
Chinese (zh)
Inventor
党松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410397810.5A priority Critical patent/CN105334970A/en
Priority to PCT/CN2014/089078 priority patent/WO2016023269A1/en
Publication of CN105334970A publication Critical patent/CN105334970A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a terminal application locking method. The method comprises the following steps: obtaining correlated information of application programs on a second terminal by a first terminal; and when the first terminal determines to lock a corresponding application program currently running on the second terminal according to the obtained correlated information, sending an instruction indicating locking the corresponding application program to the second terminal, wherein the instruction indicating locking the corresponding application program is used for locking the corresponding application program by the second terminal. The invention furthermore discloses a terminal and a terminal application locking system.

Description

Method, system and terminal for locking terminal application
Technical Field
The present invention relates to terminal technologies, and in particular, to a method for locking a terminal application and a terminal.
Background
With the continuous popularization of smart phones, many parents purchase smart phones for their children. However, as the functions of the smart phone become more and more powerful, a lot of applications can be installed and run, and the self-control ability of the child is poor, so that parents can worry about the fact that the child may influence learning due to joy and even enter the wrong way. If parents can conveniently monitor the use condition of the mobile phone of the child and remotely terminate the application program used by the child at any time, the worry of the parents about the use of the intelligent terminal by the child can be effectively reduced.
At present, no solution exists for monitoring the usage of the mobile phone and controlling the application program in use at any time.
Disclosure of Invention
In order to solve the existing technical problem, embodiments of the present invention provide a method, a system, and a terminal for locking a terminal application.
The embodiment of the invention provides a method for locking terminal application, which comprises the following steps:
the method comprises the steps that a first terminal obtains relevant information of an application program on a second terminal;
the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information; the instruction for locking the corresponding application is used for locking the corresponding application by the second terminal.
In the above scheme, the acquiring, by the first terminal, the relevant information of the application program on the second terminal includes:
the first terminal sends a monitoring instruction to the second terminal;
and the first terminal receives the relevant information of the application program on the second terminal fed back by the second terminal.
In the foregoing solution, before the first terminal acquires the relevant information of the application program on the second terminal, the method further includes:
the first terminal sets monitoring of the second terminal.
In the foregoing solution, the setting, by the first terminal, of monitoring the second terminal includes:
the first terminal sends a matching instruction containing self identification information and a matching instruction password to the second terminal;
the first terminal receives a matching instruction which is fed back by the second terminal after the second terminal determines that the received matching instruction is legal and contains the second terminal identification information and the instruction matching password;
and the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password stored by the first terminal, and sets a monitoring binding identification.
In the above scheme, the method further comprises:
when the situation that the application program locked on the second terminal needs to be unlocked is determined, the first terminal sends an unlocking instruction to the second terminal; the unlocking instruction is used for unlocking the corresponding application program by the second terminal.
In the above scheme, the method further comprises:
when determining that the corresponding application program currently running on the second terminal needs to be alarmed, the first terminal sends an alarm instruction to the second terminal; and the alarm instruction is used for the second terminal to alarm the corresponding application program.
The embodiment of the invention also provides a method for locking the terminal application, which comprises the following steps:
the method comprises the steps that a first terminal obtains relevant information of an application program on a second terminal;
the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information;
and the second terminal locks the corresponding application program according to the received instruction for locking the corresponding application program.
In the above scheme, the acquiring, by the first terminal, the relevant information of the application program on the second terminal includes:
the first terminal sends a monitoring instruction to the second terminal;
and when the second terminal determines that the received monitoring instruction is legal, feeding back relevant information of the application program to the first terminal.
In the foregoing solution, before the first terminal acquires the relevant information of the application program on the second terminal, the method further includes:
the first terminal sets monitoring of the second terminal.
In the foregoing solution, the setting, by the first terminal, of monitoring the second terminal includes:
the first terminal sends a matching instruction containing self identification information and a matching instruction password to the second terminal;
when the second terminal determines that the received matching instruction is legal according to the first terminal identification information and the instruction matching password stored by the second terminal, the second terminal feeds back the matching instruction containing the self identification information and the matching instruction password to the first terminal, and sets a monitoring binding identifier;
and the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password stored by the first terminal, and sets a monitoring binding identification.
In the above scheme, the method further comprises:
when the situation that the application program locked on the second terminal needs to be unlocked is determined, the first terminal sends an unlocking instruction to the second terminal;
and the second terminal unlocks the corresponding application program according to the received unlocking instruction.
In the above scheme, the method further comprises:
when determining that the corresponding application program currently running on the second terminal needs to be alarmed, the first terminal sends an alarm instruction to the second terminal;
and the second terminal alarms the corresponding application program according to the received alarm instruction.
An embodiment of the present invention further provides a terminal, including: an acquisition unit and a transmission unit; wherein,
the acquisition unit is used for acquiring relevant information of an application program on the monitored terminal;
the sending unit is configured to send an instruction for locking the corresponding application program to the monitored terminal when it is determined that the corresponding application program currently running on the monitored terminal needs to be locked according to the acquired related information; the instruction for locking the corresponding application program is used for locking the corresponding application program by the monitored terminal.
In the foregoing solution, the obtaining unit includes: the device comprises a first sending module and a first receiving module; wherein,
the first sending module is used for sending a monitoring instruction to the monitored terminal;
the first receiving module is configured to receive the relevant information of the application program on the monitored terminal, which is fed back by the monitored terminal.
In the above scheme, the terminal further includes a setting unit, configured to set monitoring of the monitored terminal.
In the foregoing aspect, the setting unit includes: the second sending module, the second receiving module and the determining module; wherein,
the second sending module is used for sending a matching instruction containing the identification information of the terminal where the second sending module is located and a matching instruction password to the monitored terminal;
the second receiving module is used for receiving a matching instruction which is fed back by the monitored terminal after the matching instruction which is determined to be received by the monitored terminal is legal and contains the identification information of the monitored terminal and the instruction matching password;
and the determining module is used for determining that the received matching instruction is legal according to the self-stored identification information of the monitored terminal and the instruction matching password and setting a monitoring binding identification.
In the above scheme, the sending unit is further configured to send an unlocking instruction to the monitored terminal when it is determined that the application program locked on the monitored terminal needs to be unlocked; and the unlocking instruction is used for unlocking the corresponding application program by the monitored terminal.
In the above scheme, the sending unit is further configured to send an alarm instruction to the monitored terminal when it is determined that an alarm needs to be performed on a corresponding application currently running on the monitored terminal; and the alarm instruction is used for the monitored terminal to alarm the corresponding application program.
The embodiment of the invention also provides a system for locking the terminal application, which comprises the following steps: a first terminal and a second terminal; wherein,
the first terminal is used for acquiring related information of an application program on the second terminal; according to the acquired related information, when the corresponding application program which is currently operated on the second terminal needs to be locked, an instruction for locking the corresponding application program is sent to the second terminal;
and the second terminal is used for locking the corresponding application program according to the received instruction for locking the corresponding application program.
In the above scheme, the first terminal is specifically configured to send a monitoring instruction to the second terminal; receiving the relevant information fed back by the second terminal;
and the second terminal is used for feeding back the relevant information of the application program to the first terminal when the received monitoring instruction is determined to be legal.
In the above scheme, the first terminal is further configured to set monitoring of the second terminal.
In the foregoing scheme, the first terminal is specifically configured to: sending a matching instruction containing self identification information and a matching instruction password to the second terminal; determining that the received matching instruction is legal according to the second terminal identification information and the instruction matching password stored by the terminal, and setting a monitoring binding identification;
and the second terminal is used for feeding back a matching instruction containing the self identification information and the matching instruction password to the first terminal and setting a monitoring binding identifier when the received matching instruction is determined to be legal according to the self-stored first terminal identification information and the instruction matching password.
In the above scheme, the first terminal is further configured to send an unlocking instruction to the second terminal when it is determined that the application program locked on the second terminal needs to be unlocked;
and the second terminal is also used for unlocking the corresponding application program according to the received unlocking instruction.
In the above scheme, the first terminal is further configured to send an alarm instruction to the second terminal when it is determined that an alarm needs to be performed on a corresponding application currently running on the second terminal;
and the second terminal is also used for alarming the corresponding application program according to the received alarm instruction.
In the above scheme, the number of the second terminals is more than one.
According to the method, the system and the terminal for locking the terminal application, provided by the embodiment of the invention, the first terminal acquires the relevant information of the application program on the second terminal; the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information; and the second terminal locks the corresponding application program according to the received instruction for locking the corresponding application program, so that the application program running on the second terminal can be monitored in real time, and the application program in use can be controlled at any time.
Drawings
In the drawings, which are not necessarily drawn to scale, like reference numerals may describe similar components in different views. Like reference numerals having different letter suffixes may represent different examples of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed herein.
FIG. 1 is a flowchart illustrating a method for locking a terminal application according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for locking a terminal application according to a second embodiment of the present invention;
FIG. 3 is a flowchart illustrating a third method for setting monitoring according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of a method for monitoring, locking/unlocking a terminal application program according to a fourth embodiment of the present invention;
FIG. 5 is a schematic diagram of a structure of a four-terminal according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a five-terminal according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a system for locking a terminal application according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
In various embodiments of the invention: the method comprises the steps that a first terminal obtains relevant information of an application program on a second terminal; the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information; and the second terminal locks the corresponding application program according to the received instruction for locking the corresponding application program.
Example one
The method for locking the terminal application in the embodiment, as shown in fig. 1, includes the following steps:
step 101: the method comprises the steps that a first terminal obtains relevant information of an application program on a second terminal;
here, the specific implementation of this step may include:
the first terminal sends a monitoring instruction to the second terminal;
and the first terminal receives the relevant information of the application program on the second terminal fed back by the second terminal.
Wherein the related information may include: the second terminal installs an application program list, an application state, a currently running application program, running long information of the running application program and the like.
The related information may be related information of all current applications on the second terminal, or may be related information of a part of current applications on the second terminal; in actual application, the related information of all current applications or part of current applications can be determined according to needs.
Before performing this step, the method may further include:
the first terminal sets monitoring of the second terminal;
specifically, the first terminal sends a matching instruction containing self identification information and a matching instruction password to the second terminal;
the first terminal receives a matching instruction which is fed back by the second terminal after the second terminal determines that the received matching instruction is legal and contains the second terminal identification information and the instruction matching password;
and the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password stored by the first terminal, and sets a monitoring binding identification.
Here, the identification information may be a mobile subscriber ISDN/PSTN code (MSISDN, mobile subscriber international ISDN/PSTNNumber); the setting of the monitoring binding identifier indicates that the first terminal monitors the second terminal, and the monitoring binding identifier can be set to True in actual application.
Step 102: the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information; the instruction for locking the corresponding application is used for locking the corresponding application by the second terminal.
Here, the determining that the corresponding application currently running on the second terminal needs to be locked refers to: and receiving an instruction of locking the corresponding application program by the user of the first terminal.
The method may further comprise:
when the situation that the application program locked on the second terminal needs to be unlocked is determined, the first terminal sends an unlocking instruction to the second terminal; the unlocking instruction is used for unlocking the corresponding application program by the second terminal.
Here, the determining that the locked application on the second terminal needs to be unlocked includes: and receiving an unlocking instruction of the user of the first terminal.
The method may further comprise:
when determining that the corresponding application program currently running on the second terminal needs to be alarmed, the first terminal sends an alarm instruction to the second terminal; and the alarm instruction is used for the second terminal to alarm the corresponding application program.
Wherein, the determining that the corresponding application program currently running on the second terminal needs to be warned is: and receiving an alarm instruction of the user of the first terminal.
In practical application, the number of the second terminals may be more than one, in other words, the first terminal may control a plurality of the second terminals; and when the number of the second terminals is more than two, the first terminal executes the operation on each second terminal respectively.
According to the method for locking the terminal application, provided by the embodiment of the invention, the first terminal acquires the related information of the application program on the second terminal; and the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information, so that the second terminal locks the corresponding application program according to the received instruction for locking the corresponding application program.
When the situation that the application program locked on the second terminal needs to be unlocked is determined, the first terminal sends an unlocking instruction to the second terminal, so that the second terminal unlocks the corresponding application program according to the received unlocking instruction; in addition, when determining that the corresponding application program currently running on the second terminal needs to be alarmed, the first terminal sends an alarm instruction to the second terminal so that the second terminal alarms the corresponding application program according to the received alarm instruction, and therefore the application program on the second terminal can be further and effectively controlled.
Example two
The method for locking the terminal application in the embodiment, as shown in fig. 2, includes the following steps:
step 201: the method comprises the steps that a first terminal obtains relevant information of an application program on a second terminal;
here, the specific implementation of this step may include:
the first terminal sends a monitoring instruction to the second terminal;
and when the second terminal determines that the received monitoring instruction is legal, feeding back relevant information of the application program to the first terminal.
Wherein the related information may include: the second terminal installs an application program list, an application state, a currently running application program, running long information of the running application program and the like.
The related information may be related information of all current applications on the second terminal, or may be related information of a part of current applications on the second terminal; in actual application, the related information of all current applications or part of current applications can be determined according to needs.
Before performing this step, the method may further include:
the first terminal sets monitoring of the second terminal;
specifically, the first terminal sends a matching instruction containing self identification information and a matching instruction password to the second terminal;
when the second terminal determines that the received matching instruction is legal according to the first terminal identification information and the instruction matching password stored by the second terminal, the second terminal feeds back the matching instruction containing the self identification information and the matching instruction password to the first terminal, and sets a monitoring binding identifier;
and the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password stored by the first terminal, and sets a monitoring binding identification.
Here, the identification information may be an MSISDN; the setting of the monitoring binding identifier indicates that the first terminal monitors the second terminal, and the monitoring binding identifier can be set to True in actual application.
Step 202: the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information;
here, the determining that the corresponding application currently running on the second terminal needs to be locked refers to: and receiving an instruction of locking the corresponding application program by the user of the first terminal.
Step 203: and the second terminal locks the corresponding application program according to the received instruction for locking the corresponding application program.
Here, before performing the present step, the method may further include: and when the second terminal determines the received instruction for locking the corresponding application program, locking the corresponding application program according to the received instruction for locking the corresponding application program.
The specific implementation of the received instruction for locking the corresponding application program, which is determined by the second terminal to be legal, is completely the same as the specific implementation of the instruction for determining that the matching instruction is legal, and is not repeated.
The method may further comprise:
when the situation that the application program locked on the second terminal needs to be unlocked is determined, the first terminal sends an unlocking instruction to the second terminal;
and the second terminal unlocks the corresponding application program according to the received unlocking instruction.
Wherein, determining that the application program locked on the second terminal needs to be unlocked means: and receiving an unlocking instruction of the user of the first terminal.
Correspondingly, before the second terminal unlocks the corresponding application program according to the received unlocking instruction, the method may further include: and when the second terminal determines that the received unlocking instruction is legal, unlocking the corresponding application program according to the received unlocking instruction.
Here, the specific implementation of the second terminal determining that the received unlocking instruction is legal is completely the same as the specific implementation of determining that the matching instruction is legal, and is not described in detail again.
The method may further comprise:
when determining that the corresponding application program currently running on the second terminal needs to be alarmed, the first terminal sends an alarm instruction to the second terminal;
and the second terminal alarms the corresponding application program according to the received alarm instruction.
Before the second terminal alarms the corresponding application program according to the received alarm instruction, the method may further include:
when the second terminal determines that the received alarm instruction is legal, the second terminal alarms the corresponding application program according to the received alarm instruction;
here, the specific implementation of the second terminal determining that the received alarm instruction is legal is completely the same as the specific implementation of determining that the matching instruction is legal, and is not described in detail again.
In practical application, the number of the second terminals may be more than one, in other words, the first terminal may control a plurality of the second terminals; and when the number of the second terminals is more than two, the first terminal executes the operation on each second terminal respectively.
According to the method for locking the terminal application, provided by the embodiment of the invention, the first terminal acquires the related information of the application program on the second terminal; the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information; and the second terminal locks the corresponding application program according to the received instruction for locking the corresponding application program, so that the application program running on the second terminal can be monitored in real time, and the application program in use can be controlled at any time.
When the situation that the application program locked on the second terminal needs to be unlocked is determined, the first terminal sends an unlocking instruction to the second terminal; the second terminal unlocks the corresponding application program according to the received unlocking instruction; in addition, when determining that the corresponding application program currently running on the second terminal needs to be alarmed, the first terminal sends an alarm instruction to the second terminal; and the second terminal alarms the corresponding application program according to the received alarm instruction, so that the application program on the second terminal can be further and effectively controlled.
And the second terminal judges the advanced validity of the received various instructions, so that the received instructions can be ensured to be effective instructions, and errors are avoided.
EXAMPLE III
The application scenario of this embodiment is as follows: the terminal A monitors the terminal B; before monitoring, firstly, it is necessary to set the terminal a to monitor the terminal B, and this method for setting the terminal a to set the terminal B to monitor includes the following steps as shown in fig. 3:
step 301: a monitoring program on a terminal A receives a user name and a password input by a user;
here, after the user opens the monitoring program on the terminal a, the user enters a user name and a password.
Step 302: the monitoring program checks the user name and the password, displays a program main interface to the user after the user name and the password are checked successfully, and then executes the step 303;
here, if the user name and password check fails, the process returns to step 301, and the user is prompted to re-enter the user name and password.
Step 303: a locking program on the terminal B receives a user name and a password input by the user;
here, after the user opens the lock program on the terminal B, the user inputs a user name and a password to log in.
The user name and the password input by the user on the terminal B may be the same as or different from the user name and the password input by the user on the terminal a. Both are set and maintained by the user.
Step 304: the locking program checks the user name and the password, displays a program main interface to the user after the user name and the password are successfully checked, and then executes step 305;
here, if the user name and password check fails, the process returns to step 303 to prompt the user to re-input the user name and password.
In practical application, the steps 301 to 302 and the steps 303 to 304 are executed without any sequence.
Step 305: setting identification information of the terminal A in the locking program, setting a command matching password from the terminal A, and then executing step 306;
here, the identification information of the terminal a may be: MSISDN information, etc.;
after the instruction matching password from the terminal A is set, only the instruction which comes from the terminal A and carries the correct instruction matching password is identified by the locking program of the terminal B, so that the aim of preventing the terminal B from being monitored by an illegal user is fulfilled.
The setting is completed and the terminal B is withdrawn.
Step 306: setting identification information of the terminal B in the monitoring program, and setting an instruction matching password matched with the instruction matching password in the step 305;
here, the identification information of the terminal B may be: MSISDN information, etc.
And exiting the setting of the terminal A after the setting is finished.
In practice, steps 305 and 306 are executed without any sequence.
Step 307: the terminal A sends a matching instruction to the terminal B through the monitoring program;
here, the matching instruction carries the identification information of the terminal a and the instruction matching password.
Step 308: after receiving the matching instruction of the terminal A, the locking program of the terminal B analyzes and judges the validity of the matching instruction, if the matching instruction is legal, the monitoring binding identifier is set to True, and a success message is sent to the terminal A;
here, the matching instruction is legal indicating that the monitoring setting has succeeded; if illegal, it is directly discarded.
The response means.
Step 309: after receiving the success message of the terminal B, the monitoring program of the terminal A analyzes the success message and judges the legality, if the message is legal, the successful binding result is displayed to the user, and the monitoring binding identifier of the terminal B is set to True;
here, if illegal, it is directly discarded.
At this point, the monitoring setting of the terminal a to the terminal B is completed.
Example four
In this embodiment, how the terminal a monitors, locks/unlocks the application program of the terminal B is described based on the monitoring setting of the terminal a to the terminal B in the second embodiment. The method for monitoring, locking/unlocking the terminal application program in the embodiment, as shown in fig. 4, includes the following steps:
step 401: a user logs in a monitoring program installed in a terminal A through the terminal A, selects a set monitoring terminal B, and sends a monitoring instruction to the terminal B through the monitoring program;
here, the specific implementation of the login process is completely the same as steps 201 to 202 in the second embodiment, and is not described here again.
Step 402: after receiving the monitoring instruction of the terminal A, the locking program of the terminal B analyzes the monitoring instruction and judges the legality of the monitoring instruction, and if the instruction is legal, the locking program sends a message containing an application program list installed by the local machine, an application state, the currently running application program and running long information of the currently running application program to the terminal A;
step 403: after receiving the feedback of the terminal B, the monitoring program of the terminal A analyzes the received message and judges the legality, and if the received message is legal, the result is displayed to the user; when the user determines that the application program currently executed by the terminal B does not conform to the specification, sending an alarm message or an instruction for forcibly ending and locking the current application program to the terminal B through the monitoring program of the terminal A;
here, the user can know the running condition of the application program on the terminal B by checking the feedback result of the terminal B; when it is found that the application currently executed by terminal B is not compliant, for example an application currently running a game, and runs for more than 1 hour, the user may send a warning message to terminal B or directly send an instruction to force the end and lock the current application.
Step 404: after receiving the instruction of the terminal A, the terminal B analyzes the received instruction and verifies the validity, if the received instruction is legal, the terminal B executes the instruction according to the instruction information, and then the step 405 is executed;
here, if the alert message of the terminal a is received, a pop-up message is forcibly displayed to the user of the terminal B. If an instruction of forcibly ending and locking the terminal A is received, forcibly ending and locking the currently running application program; after the currently running application is locked, the currently running application cannot be run any more until the currently running application is unlocked.
Step 405: the monitoring program of the terminal A sends a locking releasing instruction to the terminal B;
here, when the user of the terminal a and the user of the terminal B are in sufficient communication after the application is locked and the user of the terminal a thinks that the application locked by the terminal B can be unlocked, the user of the terminal a can log in the monitoring program of the terminal a and send an instruction for unlocking to the terminal B through the monitoring program of the terminal a.
Step 406: and after receiving the unlocking instruction of the terminal A, the locking program of the terminal B analyzes the received instruction and judges the legality, if the received instruction is legal, the unlocking processing is carried out on the application program which requires unlocking in the received instruction, and the current processing flow is ended.
Here, the locked application can be normally operated after the lock is released.
In practical application, as shown in fig. 5, the terminal a includes a monitoring program unit, where the monitoring program unit includes:
an authentication module: the identity verification is used for the terminal A user;
a communication module: for communicating with terminal B;
an information processing module: the method is used for generating and packaging a control instruction, generating and packaging a warning message, analyzing feedback information of the terminal B and the like;
a judging module: the method is used for judging the validity of the feedback information from the terminal B;
a display module: the man-machine interaction display is used for monitoring the program;
setting a module: settings for user information, settings for a monitored terminal, and the like;
a storage module: the method is used for storing user setting information, storing query results, saving various states and data in program operation and the like.
The terminal B comprises a lock program unit, which comprises:
an authentication module: the identity verification is used for the terminal A user;
a communication module: for communicating with terminal a;
an information processing module: the system is used for analyzing a received control command of the terminal A, analyzing a warning message, generating and packaging feedback information of the terminal B and the like;
a judging module: the method is used for judging the validity of the control instruction from the terminal A;
a display module: a human-computer interaction display for locking the program;
setting a module: the method is used for setting user information, information setting of a monitoring terminal, setting of an instruction matching password and the like;
a storage module: the method is used for storing user setting information, monitoring binding state storage, saving various states and data in program operation and the like.
According to the scheme provided by the embodiment, the terminal A can know the use condition of the application program on the terminal B at any time, and when the application program currently executed by the terminal B does not meet the requirements of the terminal A, the terminal A can warn and stop the application program being executed by the terminal B at any time, so that the parent can monitor children and the worry of the parent on using the intelligent terminal is reduced.
EXAMPLE five
Based on the method provided by the first embodiment, the present embodiment provides a terminal, as shown in fig. 6, where the terminal includes: an acquisition unit 61 and a transmission unit 62; wherein,
the acquiring unit 61 is configured to acquire relevant information of an application program on a monitored terminal;
the sending unit 62 is configured to send an instruction for locking the corresponding application program to the monitored terminal when it is determined that the corresponding application program currently running on the monitored terminal needs to be locked according to the acquired related information; the instruction for locking the corresponding application program is used for locking the corresponding application program by the monitored terminal.
Wherein the obtaining unit 61 may further include: the device comprises a first sending module and a first receiving module; wherein,
the first sending module is used for sending a monitoring instruction to the monitored terminal;
the first receiving module is configured to receive the relevant information of the application program on the monitored terminal, which is fed back by the monitored terminal.
Here, the related information may include: the application program list installed by the monitored terminal, the application state, the application program currently running, the running long information of the running application program and the like.
The related information may be related information of all current applications on the monitored terminal, or related information of part of current applications on the monitored terminal; in actual application, the related information of all current applications or part of current applications can be determined according to needs.
The terminal may further include: a setting unit for setting monitoring of the monitored terminal;
wherein the setting unit may further include: the second sending module, the second receiving module and the determining module; wherein,
the second sending module is used for sending a matching instruction containing the identification information of the terminal where the second sending module is located and a matching instruction password to the monitored terminal;
the second receiving module is used for receiving a matching instruction which is fed back by the monitored terminal after the matching instruction which is determined to be received by the monitored terminal is legal and contains the identification information of the monitored terminal and the instruction matching password;
and the determining module is used for determining that the received matching instruction is legal according to the self-stored identification information of the monitored terminal and the instruction matching password and setting a monitoring binding identification.
Here, the identification information may be an MSISDN; the setting of the monitoring binding identifier indicates that the monitored terminal is monitored, and the monitoring binding identifier can be set to True in actual application.
The determining that the corresponding application program currently running on the monitored terminal needs to be locked is: the sending unit 62 receives an instruction from the user to lock the corresponding application.
The sending unit 62 is further configured to send an unlocking instruction to the monitored terminal when it is determined that the application program locked on the monitored terminal needs to be unlocked; and the unlocking instruction is used for unlocking the corresponding application program by the monitored terminal.
Here, the determining that the locked application on the monitored terminal needs to be unlocked includes: the sending unit 62 receives an unlocking instruction of the user.
The sending unit 62 is further configured to send an alarm instruction to the monitored terminal when it is determined that an alarm needs to be performed on a corresponding application currently running on the monitored terminal; and the alarm instruction is used for the monitored terminal to alarm the corresponding application program.
Wherein, the determining that the corresponding application program currently running on the monitored terminal needs to be warned is: the sending unit 62 receives an alert instruction of the user.
In practical application, the number of the monitored terminals can be more than one, in other words, a plurality of monitored terminals can be controlled; and when the number of the monitored terminals is more than two, respectively executing the operation on each monitored terminal.
In practical applications, the obtaining unit 61 and the setting unit may be implemented by a Central Processing Unit (CPU), a Digital Signal Processor (DSP), or a programmable logic array (FPGA) in the terminal in combination with a transceiver; the sending unit 62 may be implemented by a CPU, DSP or FPGA in the terminal in combination with the receiver.
In the terminal provided by the embodiment of the present invention, the obtaining unit 61 obtains relevant information of an application program on a monitored terminal; the sending unit 62 sends an instruction for locking the corresponding application program to the monitored terminal when determining that the corresponding application program currently running on the monitored terminal needs to be locked according to the acquired related information, so that the monitored terminal locks the corresponding application program according to the received instruction for locking the corresponding application program.
When it is determined that the application program locked on the monitored terminal needs to be unlocked, the sending unit 62 sends an unlocking instruction to the monitored terminal, so that the monitored terminal unlocks the corresponding application program according to the received unlocking instruction; in addition, when it is determined that the alarm needs to be performed on the corresponding application program currently running on the monitored terminal, the sending unit 62 sends an alarm instruction to the monitored terminal, so that the monitored terminal performs the alarm on the corresponding application program according to the received alarm instruction, and thus, the application program on the monitored terminal can be further effectively controlled.
EXAMPLE six
To implement the method of the second embodiment, this embodiment provides a system for locking a terminal application, as shown in fig. 7, the system includes: a first terminal 71 and a second terminal 72; wherein,
the first terminal 71 is configured to obtain relevant information of an application program on the second terminal 72; according to the acquired related information, when it is determined that the corresponding application program currently running on the second terminal 72 needs to be locked, an instruction for locking the corresponding application program is sent to the second terminal 72;
the second terminal 72 is configured to lock the corresponding application according to the received instruction for locking the corresponding application.
Here, in actual application, the acquiring unit of the existing first terminal 71 acquires the relevant information of the application program on the second terminal 72; and then, when determining that the corresponding application program currently running on the second terminal 72 needs to be locked according to the acquired related information, the sending unit of the first terminal 71 sends an instruction for locking the corresponding application program to the second terminal 72.
The first terminal 71 is specifically configured to send a monitoring instruction to the second terminal 72; receiving the relevant information fed back by the second terminal 72;
the second terminal 72 is configured to feed back relevant information of the application program to the first terminal 71 when determining that the received monitoring instruction is legal.
Here, the related information may include: the second terminal 72 may include a list of applications installed, an application status, an application currently running, running length information of the application currently running, and the like.
The related information may be related information of all current applications on the second terminal 72, or may be related information of a part of current applications on the second terminal 72; in actual application, the related information of all current applications or part of current applications can be determined according to needs.
In actual application, the first sending module of the obtaining unit may send a monitoring instruction to the second terminal 72; and the first receiving module of the acquiring unit receives the relevant information fed back by the second terminal 72.
The first terminal 71 is further configured to set monitoring of the second terminal 72;
the first terminal 71 is specifically configured to: sending a matching instruction containing self identification information and a matching instruction password to the second terminal 72; determining that the received matching instruction is legal according to the identification information of the second terminal 72 and the instruction matching password stored by the second terminal, and setting a monitoring binding identification;
the second terminal 72 is configured to, when determining that the received matching instruction is legal according to the first terminal identification information and the instruction matching password stored in the second terminal, feed back a matching instruction including the self identification information and the matching instruction password to the first terminal 71, and set a monitoring binding identifier.
Here, the identification information may be an MSISDN; the setting of the monitoring binding identifier indicates that the first terminal monitors the second terminal, and the monitoring binding identifier can be set to True in actual application.
In actual application, the setting unit of the first terminal 71 can set the monitoring of the second terminal 72; specifically, a second sending module of the setting unit sends a matching instruction including self identification information and a matching instruction password to the second terminal 72; then, a second receiving module of the setting unit receives a matching instruction which is fed back by the second terminal 72 after the received matching instruction is determined to be legal and contains the identification information of the second terminal 72 and the instruction matching password; and then the determining module of the setting unit determines that the received matching instruction is legal according to the identification information of the second terminal 72 and the instruction matching password stored by the determining module, and sets a monitoring binding identifier.
The determining that the corresponding application program currently running on the second terminal needs to be locked is: an instruction is received from the user of the first terminal 71 to lock the corresponding application.
The second terminal 72 is further configured to lock the corresponding application program according to the received instruction for locking the corresponding application program when determining that the received instruction for locking the corresponding application program is received before locking the corresponding application program according to the received instruction for locking the corresponding application program.
The specific implementation of the instruction for locking the corresponding application program, which is determined to be legal by the second terminal 72, is completely the same as the specific implementation of the instruction for matching the instruction, which is determined to be legal, and is not described again.
The first terminal 71 is further configured to send an unlocking instruction to the second terminal 72 when it is determined that the application program locked on the second terminal 72 needs to be unlocked;
the second terminal 72 is further configured to unlock the corresponding application program according to the received unlocking instruction.
Wherein, determining that the application program locked on the second terminal needs to be unlocked means: an unlocking instruction of the user of the first terminal 71 is received.
In actual application, when the sending unit determines that the application program locked on the second terminal 72 needs to be unlocked, an unlocking instruction is sent to the second terminal 72.
Correspondingly, the second terminal 72 is further configured to unlock the corresponding application program according to the received unlocking instruction when it is determined that the received unlocking instruction is legal before unlocking the corresponding application program according to the received unlocking instruction.
Here, the specific implementation of the second terminal determining that the received unlocking instruction is legal is completely the same as the specific implementation of determining that the matching instruction is legal, and is not described in detail again.
The first terminal 71 is further configured to send an alarm instruction to the second terminal 72 when it is determined that an alarm needs to be performed on a corresponding application currently running on the second terminal 72;
the second terminal 72 is further configured to alarm the corresponding application according to the received alarm instruction.
The second terminal 72 is further configured to alarm the corresponding application program according to the received alarm instruction when it is determined that the received alarm instruction is legal before the corresponding application program is alarmed according to the received alarm instruction.
Here, the specific implementation of the second terminal 72 determining that the received alarm instruction is legal is completely the same as the specific implementation of determining that the matching instruction is legal, and is not described again.
In actual application, when the sending unit determines that an alarm needs to be performed on a corresponding application currently running on the second terminal 72, the sending unit sends an alarm instruction to the second terminal 72.
In practical applications, the number of the second terminals 72 may be more than one, in other words, the first terminal 71 may control a plurality of the second terminals 72; when the number of the second terminals 72 is two or more, the first terminal 71 performs the above-described operation on each of the second terminals 72.
In the system for locking a terminal application provided in the embodiment of the present invention, the first terminal 71 obtains the relevant information of the application program on the second terminal 72; the first terminal 71, according to the acquired relevant information, sends an instruction for locking the corresponding application program to the second terminal 72 when determining that the corresponding application program currently running on the second terminal 72 needs to be locked; and the second terminal 72 locks the corresponding application program according to the received instruction for locking the corresponding application program, so that the application program running on the second terminal 72 can be monitored in real time, and the application program in use can be controlled at any time.
When determining that the locked application on the second terminal 72 needs to be unlocked, the first terminal 71 sends an unlocking instruction to the second terminal 72; the second terminal 72 unlocks the corresponding application program according to the received unlocking instruction; in addition, when determining that an alarm needs to be given to a corresponding application program currently running on the second terminal 72, the first terminal 71 sends an alarm instruction to the second terminal 72; the second terminal 72 alarms the corresponding application program according to the received alarm instruction, so that the application program on the second terminal 72 can be further effectively controlled.
The second terminal 72 judges the validity of the advancement of the received various instructions, so that the received instructions can be ensured to be valid instructions, and errors are avoided.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (25)

1. A method for locking terminal applications, the method comprising:
the method comprises the steps that a first terminal obtains relevant information of an application program on a second terminal;
the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information; the instruction for locking the corresponding application is used for locking the corresponding application by the second terminal.
2. The method of claim 1, wherein the obtaining, by the first terminal, information related to an application on the second terminal comprises:
the first terminal sends a monitoring instruction to the second terminal;
and the first terminal receives the relevant information of the application program on the second terminal fed back by the second terminal.
3. The method of claim 1, wherein before the first terminal obtains the information related to the application on the second terminal, the method further comprises:
the first terminal sets monitoring of the second terminal.
4. The method of claim 3, wherein the first terminal setting the monitoring of the second terminal comprises:
the first terminal sends a matching instruction containing self identification information and a matching instruction password to the second terminal;
the first terminal receives a matching instruction which is fed back by the second terminal after the second terminal determines that the received matching instruction is legal and contains the second terminal identification information and the instruction matching password;
and the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password stored by the first terminal, and sets a monitoring binding identification.
5. The method of claim 1, further comprising:
when the situation that the application program locked on the second terminal needs to be unlocked is determined, the first terminal sends an unlocking instruction to the second terminal; the unlocking instruction is used for unlocking the corresponding application program by the second terminal.
6. The method of claim 1, further comprising:
when determining that the corresponding application program currently running on the second terminal needs to be alarmed, the first terminal sends an alarm instruction to the second terminal; and the alarm instruction is used for the second terminal to alarm the corresponding application program.
7. A method for locking terminal applications, the method comprising:
the method comprises the steps that a first terminal obtains relevant information of an application program on a second terminal;
the first terminal sends an instruction for locking the corresponding application program to the second terminal when determining that the corresponding application program currently running on the second terminal needs to be locked according to the acquired related information;
and the second terminal locks the corresponding application program according to the received instruction for locking the corresponding application program.
8. The method of claim 7, wherein the obtaining, by the first terminal, information related to an application on the second terminal comprises:
the first terminal sends a monitoring instruction to the second terminal;
and when the second terminal determines that the received monitoring instruction is legal, feeding back relevant information of the application program to the first terminal.
9. The method of claim 7, wherein before the first terminal obtains the information related to the application on the second terminal, the method further comprises:
the first terminal sets monitoring of the second terminal.
10. The method of claim 9, wherein the first terminal setting the monitoring of the second terminal comprises:
the first terminal sends a matching instruction containing self identification information and a matching instruction password to the second terminal;
when the second terminal determines that the received matching instruction is legal according to the first terminal identification information and the instruction matching password stored by the second terminal, the second terminal feeds back the matching instruction containing the self identification information and the matching instruction password to the first terminal, and sets a monitoring binding identifier;
and the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password stored by the first terminal, and sets a monitoring binding identification.
11. The method of claim 7, further comprising:
when the situation that the application program locked on the second terminal needs to be unlocked is determined, the first terminal sends an unlocking instruction to the second terminal;
and the second terminal unlocks the corresponding application program according to the received unlocking instruction.
12. The method of claim 7, further comprising:
when determining that the corresponding application program currently running on the second terminal needs to be alarmed, the first terminal sends an alarm instruction to the second terminal;
and the second terminal alarms the corresponding application program according to the received alarm instruction.
13. A terminal, characterized in that the terminal comprises: an acquisition unit and a transmission unit; wherein,
the acquisition unit is used for acquiring relevant information of an application program on the monitored terminal;
the sending unit is configured to send an instruction for locking the corresponding application program to the monitored terminal when it is determined that the corresponding application program currently running on the monitored terminal needs to be locked according to the acquired related information; the instruction for locking the corresponding application program is used for locking the corresponding application program by the monitored terminal.
14. The terminal according to claim 13, wherein the obtaining unit comprises: the device comprises a first sending module and a first receiving module; wherein,
the first sending module is used for sending a monitoring instruction to the monitored terminal;
the first receiving module is configured to receive the relevant information of the application program on the monitored terminal, which is fed back by the monitored terminal.
15. The terminal according to claim 13, wherein the terminal further comprises a setting unit configured to set monitoring of the monitored terminal.
16. The terminal according to claim 15, wherein the setting unit comprises: the second sending module, the second receiving module and the determining module; wherein,
the second sending module is used for sending a matching instruction containing the identification information of the terminal where the second sending module is located and a matching instruction password to the monitored terminal;
the second receiving module is used for receiving a matching instruction which is fed back by the monitored terminal after the matching instruction which is determined to be received by the monitored terminal is legal and contains the identification information of the monitored terminal and the instruction matching password;
and the determining module is used for determining that the received matching instruction is legal according to the self-stored identification information of the monitored terminal and the instruction matching password and setting a monitoring binding identification.
17. The terminal according to claim 13, wherein the sending unit is further configured to send an unlocking instruction to the monitored terminal when it is determined that the application locked on the monitored terminal needs to be unlocked; and the unlocking instruction is used for unlocking the corresponding application program by the monitored terminal.
18. The terminal according to claim 13, wherein the sending unit is further configured to send an alarm instruction to the monitored terminal when it is determined that an alarm needs to be performed on a corresponding application currently running on the monitored terminal; and the alarm instruction is used for the monitored terminal to alarm the corresponding application program.
19. A system for locking an end application, the system comprising: a first terminal and a second terminal; wherein,
the first terminal is used for acquiring related information of an application program on the second terminal; according to the acquired related information, when the corresponding application program which is currently operated on the second terminal needs to be locked, an instruction for locking the corresponding application program is sent to the second terminal;
and the second terminal is used for locking the corresponding application program according to the received instruction for locking the corresponding application program.
20. The system according to claim 19, wherein the first terminal is specifically configured to send a monitoring instruction to the second terminal; receiving the relevant information fed back by the second terminal;
and the second terminal is used for feeding back the relevant information of the application program to the first terminal when the received monitoring instruction is determined to be legal.
21. The system of claim 19, wherein the first terminal is further configured to set up monitoring of the second terminal.
22. The system according to claim 21, wherein the first terminal is specifically configured to: sending a matching instruction containing self identification information and a matching instruction password to the second terminal; determining that the received matching instruction is legal according to the second terminal identification information and the instruction matching password stored by the terminal, and setting a monitoring binding identification;
and the second terminal is used for feeding back a matching instruction containing the self identification information and the matching instruction password to the first terminal and setting a monitoring binding identifier when the received matching instruction is determined to be legal according to the self-stored first terminal identification information and the instruction matching password.
23. The system according to claim 19, wherein the first terminal is further configured to send an unlocking instruction to the second terminal when it is determined that the application locked on the second terminal needs to be unlocked;
and the second terminal is also used for unlocking the corresponding application program according to the received unlocking instruction.
24. The system according to claim 19, wherein the first terminal is further configured to send an alarm instruction to the second terminal when it is determined that an alarm needs to be performed on a corresponding application currently running on the second terminal;
and the second terminal is also used for alarming the corresponding application program according to the received alarm instruction.
25. The system of claim 19, wherein the number of second terminals is more than one.
CN201410397810.5A 2014-08-13 2014-08-13 Terminal application locking method and system as well as terminal Withdrawn CN105334970A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410397810.5A CN105334970A (en) 2014-08-13 2014-08-13 Terminal application locking method and system as well as terminal
PCT/CN2014/089078 WO2016023269A1 (en) 2014-08-13 2014-10-21 Terminal application locking method, system, terminal and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410397810.5A CN105334970A (en) 2014-08-13 2014-08-13 Terminal application locking method and system as well as terminal

Publications (1)

Publication Number Publication Date
CN105334970A true CN105334970A (en) 2016-02-17

Family

ID=55285569

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410397810.5A Withdrawn CN105334970A (en) 2014-08-13 2014-08-13 Terminal application locking method and system as well as terminal

Country Status (2)

Country Link
CN (1) CN105334970A (en)
WO (1) WO2016023269A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197091A (en) * 2017-05-19 2017-09-22 广东小天才科技有限公司 Terminal control method, terminal control device, terminal equipment and computer readable storage medium
CN107729741A (en) * 2017-09-07 2018-02-23 努比亚技术有限公司 A kind of control method of application program, terminal and computer-readable recording medium
WO2018113215A1 (en) * 2016-12-22 2018-06-28 深圳市中兴微电子技术有限公司 Terminal control method, first terminal, second terminal, server, and system
CN108491700A (en) * 2018-03-20 2018-09-04 北京小米移动软件有限公司 Intelligent terminal control method, device and computer readable storage medium
CN109147276A (en) * 2018-10-29 2019-01-04 麒麟合盛网络技术股份有限公司 monitoring method and device
CN109788460A (en) * 2017-11-14 2019-05-21 中兴通讯股份有限公司 Terminal cooperation operation method and device
CN111597090A (en) * 2020-05-18 2020-08-28 闻泰通讯股份有限公司 Behavior monitoring method and device, electronic equipment and storage medium
CN113727074A (en) * 2021-08-31 2021-11-30 维沃移动通信有限公司 Monitoring information prompting method and device and electronic equipment
CN114070659A (en) * 2021-10-29 2022-02-18 深圳市优必选科技股份有限公司 Equipment locking method and device and terminal equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078954A (en) * 2013-01-28 2013-05-01 广东欧珀移动通信有限公司 Remote monitoring method of mobile terminal, mobile terminal and control terminal
CN103905492A (en) * 2012-12-27 2014-07-02 鸿富锦精密工业(深圳)有限公司 Electronic-device remote-control system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905513A (en) * 2012-12-28 2014-07-02 鸿富锦精密工业(深圳)有限公司 Electronic device remote control system and method
CN103237064B (en) * 2013-04-11 2019-05-03 百度在线网络技术(北京)有限公司 Remote lock method, system, cloud server and the terminal of terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905492A (en) * 2012-12-27 2014-07-02 鸿富锦精密工业(深圳)有限公司 Electronic-device remote-control system and method
CN103078954A (en) * 2013-01-28 2013-05-01 广东欧珀移动通信有限公司 Remote monitoring method of mobile terminal, mobile terminal and control terminal

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113215A1 (en) * 2016-12-22 2018-06-28 深圳市中兴微电子技术有限公司 Terminal control method, first terminal, second terminal, server, and system
CN108234586A (en) * 2016-12-22 2018-06-29 深圳市中兴微电子技术有限公司 Control method, first terminal, second terminal, server and the system of terminal
CN107197091A (en) * 2017-05-19 2017-09-22 广东小天才科技有限公司 Terminal control method, terminal control device, terminal equipment and computer readable storage medium
CN107729741A (en) * 2017-09-07 2018-02-23 努比亚技术有限公司 A kind of control method of application program, terminal and computer-readable recording medium
CN109788460A (en) * 2017-11-14 2019-05-21 中兴通讯股份有限公司 Terminal cooperation operation method and device
CN108491700A (en) * 2018-03-20 2018-09-04 北京小米移动软件有限公司 Intelligent terminal control method, device and computer readable storage medium
CN109147276A (en) * 2018-10-29 2019-01-04 麒麟合盛网络技术股份有限公司 monitoring method and device
CN111597090A (en) * 2020-05-18 2020-08-28 闻泰通讯股份有限公司 Behavior monitoring method and device, electronic equipment and storage medium
CN113727074A (en) * 2021-08-31 2021-11-30 维沃移动通信有限公司 Monitoring information prompting method and device and electronic equipment
CN114070659A (en) * 2021-10-29 2022-02-18 深圳市优必选科技股份有限公司 Equipment locking method and device and terminal equipment
CN114070659B (en) * 2021-10-29 2023-11-17 深圳市优必选科技股份有限公司 Equipment locking method and device and terminal equipment

Also Published As

Publication number Publication date
WO2016023269A1 (en) 2016-02-18

Similar Documents

Publication Publication Date Title
CN105334970A (en) Terminal application locking method and system as well as terminal
US11216549B2 (en) Security verification method and device
CN106926817B (en) A kind of vehicle interconnect device
US20160269895A1 (en) Device diagnostic and data retrieval
CN103577237B (en) The control method and device of application program launching
CN107911337A (en) A kind of apparatus bound method, server and equipment
CN103336924A (en) Starting lock for mobile terminal application program
CN106341834A (en) Internet-of-things device configuration method, Internet-of-things device configuration apparatus, Internet-of-things device configuration system and Internet-of-things device
US20170311154A1 (en) Security hub utilizing near field communication to onboard sensors
CN105787349A (en) Safe phone refreshing method and device
CN110727938B (en) Configuration method and device of intelligent equipment, electronic equipment and storage medium
CN108090331A (en) Unlocking method and equipment
CN109495344B (en) Debugging method, device and equipment of test equipment and storage medium
CN105827614A (en) Vehicle remote control method, device and system and vehicle remote controller
CN112134946B (en) Elevator Internet of things testing method, device, storage medium, terminal and system
CN115437915A (en) Vehicle-based version testing method and device and electronic equipment
CN105530358A (en) Bluetooth watch encryption method based on mobile terminal and Bluetooth watch
CN106507300A (en) A kind of method for giving loss terminal for change, device and terminal
US20180024522A1 (en) Method and system for safety-relevant input to a control system
CN111815332A (en) Equipment activation method, device and system
CN113823015B (en) Electric vehicle control system and electric vehicle control method
CN107196927B (en) Cloud lock fingerprint unlocking method and system based on multiple mobile communication terminals
CN107920097A (en) A kind of method and device of unlock
CN106529237B (en) Medical Devices login method and device
CN107102946B (en) Program detection method and device and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20160217

WW01 Invention patent application withdrawn after publication