CN106713614A - Method and terminal for selectively locking applications by monitoring local area network - Google Patents

Method and terminal for selectively locking applications by monitoring local area network Download PDF

Info

Publication number
CN106713614A
CN106713614A CN201611024780.9A CN201611024780A CN106713614A CN 106713614 A CN106713614 A CN 106713614A CN 201611024780 A CN201611024780 A CN 201611024780A CN 106713614 A CN106713614 A CN 106713614A
Authority
CN
China
Prior art keywords
lan
list
privacy
trust
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611024780.9A
Other languages
Chinese (zh)
Inventor
汪忆清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201611024780.9A priority Critical patent/CN106713614A/en
Publication of CN106713614A publication Critical patent/CN106713614A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Abstract

The invention discloses a method and terminal for selectively locking applications by monitoring a local area network. A trusted local area network list and a privacy application list are pre-stored in terminal equipment; whether a wireless local area network with which the terminal equipment is connected belongs to trusted local area networks in the trusted local area network list is judged; and if yes, applications in the privacy application list are locked. By the technical scheme of the invention, the terminal equipment of a user can lock the specific applications in an unfamiliar wireless network environment. When the terminal is positioned in different places, automatic intelligent management on the application for the user is implemented, so that convenience is provided for protecting privacy of the user.

Description

A kind of method and terminal by monitoring LAN selective lock application program
Technical field
The invention belongs to terminal privacy information security protection technology field, and in particular to a kind of to be selected by monitoring LAN The method and terminal of property locking applications.
Background technology
Many public arenas have wireless network WiFi to be connected for popular at present, such as airport, station, hotel, dining room, city Political affairs center etc., into after these public arenas, people can select to intervene its wireless network WiFi for providing, and ought enter again When entering the WiFi environment once intervened, mobile phone steps on terminal and can automatically access once logged WiFi rings in many instances Border, the user in convenient these places that often come in and go out.And the WiFi securities of these public arenas are often less high, because for normal Often come in and go out some specific public arenas need connect WiFi terminal user for, lock automatically some privacy application programs just it is non- It is often necessary.
The content of the invention:
In order to overcome the defect of above-mentioned background technology, the present invention to provide one kind by monitoring LAN selective lock application The method and terminal of program, can.
In order to solve the above-mentioned technical problem used technical scheme of the invention is:
A kind of method by monitoring LAN selective lock application program:Trust local is prestored in terminal device Train table and privacy the application list, judge that terminal device connects whether WLAN is not belonging to trust LAN list In trust LAN, if so, then locking privacy the application list in application program.
It is preferred that prestored in terminal device the LAN list of multiple trusts and multiple privacy the application lists, each letter LAN list is appointed to be equipped with map listing, corresponding one or more the privacy applications of LAN list are trusted in map listing storage Program listing;Any one trust LAN in trusting LAN list is not belonging to when terminal device connects WLAN When, each in privacy the application list that locking map listing corresponding with the trust LAN list is stored applies journey Sequence.
It is preferred that the trust LAN trusted in LAN list is set by the user, answering in privacy the application list It is set by the user with program name.
It is preferred that each trusts one or more the privacy Application Columns in the map listing corresponding to LAN list Table is set by the user.
It is preferred that when getting the exit instruction of user input, exiting method.
The present invention also provides a kind of terminal by monitoring LAN selective lock application program, including:
Memory module, LAN list and privacy the application list are trusted for storing;
Monitoring modular, WLAN is connected for obtaining terminal;
Judge module, judge connect WLAN sign whether not with trust LAN list in any trust local The sign of net is identical, if so, then sending lock instruction;
Processing module, for locking the application program in privacy the application list when lock instruction is received.
It is preferred that memory module includes trusting LAN list storage unit and privacy the application list memory cell;
Trust prestored in LAN list storage unit one or more trust LAN lists, privacy the application list Prestore one or more privacy the application lists in memory cell;
Trust LAN list storage unit and also prestore mapping table, each is prestored in mapping table and trusts LAN list One or more corresponding privacy the application lists.
It is preferred that also include trusting LAN setting module, the trust LAN for obtaining user's setting, and storage is arrived In the LAN list of corresponding trust.Also include privacy application setting module, the privacy application for obtaining user's setting Program, and store in corresponding privacy the application list.
It is preferred that also including mapping relations setting module, each trust LAN list institute is set by the user for obtaining One or more privacy the application lists in corresponding map listing, and store in corresponding map listing.
It is preferred that also including exiting module, the exit instruction for obtaining user input.
The beneficial effects of the present invention are:By technical scheme the terminal device of user can be caused strange Under wireless network environment, specific application program is locked.When terminal is in different places, realize automatically being the intelligent pipe of user Ought to use, for the privacy for protecting user is provided conveniently.Improved as one kind, each trust wireless network list correspondence is reflected List is penetrated, privacy the application list corresponding with the trust wireless network list is stored in the map listing, by institute during comparison Connection wireless network is compared one by one with each trust wireless network list, and different privacy applications are locked in the case of difference Program.The terminals such as mobile phone can be grouped to the trusted wireless network environment for prestoring, when terminal is in different grouping environment Outside wireless network environment under, lock different privacy application programs.Wireless network list, privacy application journey are trusted simultaneously Sequence table, and from trust LAN list to the mapping relations one or more privacy the application lists can by with Family presets, and on the one hand with stronger flexibility ratio, the opposing party has more strong adaptability, is the setting side of very hommization Case.User can also be by exiting this method, using the conventional mode of tradition under each wireless network environment for having connected simultaneously Normally use each application program.
Brief description of the drawings
Fig. 1 is the method flow diagram of the embodiment of the present invention one;
Fig. 2 trusts after wireless network list and privacy the application list mapping relations for the embodiment of the present invention one is added Method flow diagram;
Fig. 3 is that the embodiment of the present invention one adds the side for being set by the user and trusting after wireless network and privacy application program Method flow chart;
Fig. 4 is that the embodiment of the present invention one adds the method flow diagram being set by the user after mapping relations list;
Fig. 5 is the terminal structure schematic diagram of the embodiment of the present invention two;
Fig. 6 is the structural representation of the memory module of the embodiment of the present invention two;
Fig. 7 trusts after LAN setting module and privacy application setting module for the embodiment of the present invention two is added Terminal structure schematic diagram;
Fig. 8 is the terminal structure schematic diagram after the embodiment of the present invention two adds mapping relations setting module;
Fig. 9 is that the embodiment of the present invention two adds the terminal structure schematic diagram exited after module.
Specific embodiment
The present invention is described further with reference to the accompanying drawings and examples.
Embodiment one
A kind of method by monitoring LAN selective lock application program, prestores trust local in terminal device Train table and privacy the application list, judge that terminal device connects whether WLAN is not belonging to trust LAN list In trust LAN, if so, then locking privacy the application list in application program.As shown in figure 1, specific steps bag Include:
Step 1, the trust that prestores LAN list and privacy the application list;
Step 2, obtains the mark of the current connected WLAN of terminal device;
Step 3, judge current connected WLAN identify whether not with trust LAN list in any trust The mark of LAN is identical, if so, then enter step 4, if it is not, then entering step 5;
Step 4, the application program in locking privacy the application list;
Step 5, normal operation of terminal, and return to step 2.
By the scheme terminal device of the present embodiment under strange wireless network environment, specific application program is locked.When Terminal realizes automatically being user's intelligent management application, for the privacy for protecting user is provided conveniently in different places.
Used as a kind of improvement project of the present embodiment, prestore the LAN list of multiple trusts and multiple privacies in terminal device The application list, each is trusted LAN list and is equipped with map listing, and LAN list correspondence is trusted in map listing storage One or more privacy the application lists;Any one trust local is not belonging to when terminal device connects WLAN During trust LAN in train table, the privacy application journey that map listing corresponding with the trust LAN list is stored is locked Each application program in sequence table.As shown in Fig. 2 specific steps include:
Step 1, the trust that prestores LAN list and privacy the application list, and react each trust LAN list With the map listing of privacy the application list mapping relations;
Step 2, obtains the mark of the current connected WLAN of terminal device;
Step 3, judge current connected WLAN identify whether not with n-th trust LAN list in it is any The mark for trusting LAN is identical, if so, then enter step 4, if it is not, then entering step 5;Wherein n=1,2,3 ... N, N are Trust LAN list total number;
Step 4, answering in each privacy the application list in locking n-th trust LAN list correspondence mappings list Use program;
Whether step 5, judge n less than N, if so, then enter step 6, if it is not, then entering step 7;
Step 6, makes n=n+1, and return to step 3;
Step 7, normal operation of terminal, and return to step 2.
Wireless network list is trusted for each by this improved technical scheme and is correspondingly arranged a map listing, the mapping Corresponding with trust wireless network list privacy the application list is stored in list, during comparison by connected wireless network and Each is trusted wireless network list and compares one by one, and different privacy application programs are locked in the case of difference.Mobile phone etc. is eventually End can be grouped to the trusted wireless network environment for prestoring, the wireless network outside terminal is in different grouping environment Under environment, different privacy application programs are locked.
Used as a kind of improvement project of the present embodiment, the trust LAN trusted in LAN list is set by the user, hidden Application name in private the application list is set by the user.
As shown in figure 3, specific steps include:
Step 1, the trust LAN list of acquisition user's setting and privacy the application list are simultaneously stored;
Step 2, prestore each trust LAN list of reaction and the map listing of privacy the application list mapping relations;
Step 3, obtains the mark of the current connected WLAN of terminal device;
Step 4, judge current connected WLAN identify whether not with n-th trust LAN list in it is any The mark for trusting LAN is identical, if so, then enter step 6, if it is not, then entering step 7;Wherein n=1,2,3 ... N, N are Trust LAN list total number;
Step 6, answering in each privacy the application list in locking n-th trust LAN list correspondence mappings list Use program;
Whether step 7, judge n less than N, if so, then enter step 8, if it is not, then entering step 9;
Step 8, makes n=n+1, and return to step 4;
Step 9, normal operation of terminal, and return to step 3.
Preset by user trust wireless network list and privacy the application list on the one hand have it is stronger flexible Property, on the other hand belong to the more humane plan of establishment, with stronger adaptability.
Used as a kind of improvement project of the present embodiment, each trusts in the map listing corresponding to LAN list Or multiple privacy the application lists are set by the user.
As shown in figure 4, specific steps include:
Step 1, the trust LAN list of acquisition user's setting and privacy the application list are simultaneously stored;
Step 2, obtains each trust LAN list of the reaction of user's setting and privacy the application list mapping relations Map listing and store;
Step 3, obtains the mark of the current connected WLAN of terminal device;
Step 4, judge current connected WLAN identify whether not with n-th trust LAN list in it is any The mark for trusting LAN is identical, if so, then enter step 6, if it is not, then directly redirecting into step 7;Wherein n=1,2, 3 ... N, N are trust LAN list total number;
Step 6, answering in each privacy the application list in locking n-th trust LAN list correspondence mappings list With program, and entrance step 7;
Whether step 7, judge n less than N, if so, then enter step 8, if it is not, then entering step 9;
Step 8, makes n=n+1, and return to step 4;
Step 9, normal operation of terminal, and return to step 3.
By this improvement, can be set by the user from trust LAN list to one or more privacy the application lists Between mapping relations, mapping relations are set by user it is also possible that this programme has more change functions, in difference Situation under, user sets to different privacy application programs, and in varied situations different that can cater to user need Ask.
As a kind of improvement project of the present embodiment, when getting the exit instruction of user input, method is exited.Work as user When exiting the function described in this programme, no matter whether the wireless network that terminal is connected is trust network, will not be to default Privacy application program is locked, namely uses each application program in the terminals such as mobile phone with conventional method.
Embodiment two
A kind of terminal by monitoring LAN selective lock application program, as shown in figure 5, including:
Memory module, LAN list and privacy the application list are trusted for storing;
Monitoring modular, WLAN is connected for obtaining terminal;
Judge module, judge connect WLAN sign whether not with trust LAN list in any trust local The sign of net is identical, if so, then sending lock instruction;
Processing module, for locking the application program in privacy the application list when lock instruction is received.
The method of work of the present embodiment prestores after trust LAN list and privacy the application list for memory module, The mark of the current connected WLAN of terminal device is obtained by monitoring modular, judge module judges current connected wireless office Identifying whether for domain net be not identical with the mark for trusting any trust LAN in LAN list, if so, then by processing module Application program in locking privacy the application list, if it is not, then normal operation of terminal.
By the scheme terminal device of the present embodiment under strange wireless network environment, specific application program is locked.When Terminal realizes automatically being user's intelligent management application, for the privacy for protecting user is provided conveniently in different places.
As a kind of improvement project of the present embodiment, as shown in fig. 6, memory module includes trusting LAN list storage list Unit and privacy the application list memory cell;
Trust prestored in LAN list storage unit one or more trust LAN lists, privacy the application list Prestore one or more privacy the application lists in memory cell;
Trust LAN list storage unit and also prestore mapping table, each is prestored in mapping table and trusts LAN list One or more corresponding privacy the application lists.
This improved specific workflow includes trusting LAN list storage unit and prestores trust LAN list and each The individual map listing for trusting LAN list and privacy the application list mapping relations, privacy the application list memory cell The privacy that prestores the application list;Monitoring modular obtains the mark of the current connected WLAN of terminal device;Judge module By the mark of connected WLAN one by one with each trust LAN list in each trust LAN and identified whether It is identical to compare, and be no to comparison result, then lock each privacy in the trust LAN list correspondence mappings list Application program in the application list.Otherwise terminal continues normal operation.
Originally it is improved to each trust wireless network list and is correspondingly arranged a map listing, is stored in the map listing and be somebody's turn to do The corresponding privacy the application list of wireless network list is trusted, by connected wireless network and each trust wireless network during comparison Network list is compared one by one, and different privacy application programs are locked in the case of difference.The terminals such as mobile phone can be to prestoring Trusted wireless network environment is grouped, when terminal is under the wireless network environment outside different grouping environment, locking Different privacy application programs.
As a kind of improvement project of the present embodiment, as shown in fig. 7, also including that trusting LAN setting module and privacy answers Program setting module is used, trusting LAN setting module is used to obtain the trust LAN of user's setting, and storage arrives corresponding In trust LAN list.Privacy application setting module is used to obtain the privacy application program of user's setting, and storage is arrived In corresponding privacy the application list.Trust wireless network list and the side of privacy the application list one are preset by user Face has stronger flexibility, on the other hand belongs to the more humane plan of establishment, with stronger adaptability.
As a kind of improvement project of the present embodiment, as shown in figure 8, also include mapping relations setting module, for obtaining Each one or more privacy the application list in trusting the map listing corresponding to LAN list is set by the user, and In storing corresponding map listing.It is set by the user from trust LAN list to one or more privacy the application lists Between mapping relations, mapping relations are set by user it is also possible that this programme has more change functions, in difference Situation under, user sets to different privacy application programs, and in varied situations different that can cater to user need Ask.
As a kind of improvement project of the present embodiment, also including exiting module, the exit instruction for obtaining user input. When the function described in user exits this programme, no matter whether the wireless network that terminal is connected is trust network, will not be right Default privacy application program is locked, namely uses each application program in the terminals such as mobile phone with conventional method.
It should be appreciated that for those of ordinary skills, can according to the above description be improved or converted, And all these modifications and variations should all belong to the protection domain of appended claims of the present invention.

Claims (10)

1. a kind of method by monitoring LAN selective lock application program, it is characterised in that:Prestored in terminal device There are trust LAN list and privacy the application list, judge that the terminal device connects whether WLAN is not belonging to The trust LAN trusted in LAN list, if so, then locking the application program in described privacy the application list.
2. a kind of method by monitoring LAN selective lock application program according to claim 1, its feature exists In:Prestore the LAN list of multiple trusts and multiple privacy the application lists in the terminal device, each described trust office Domain train table is equipped with map listing, and map listing storage trust LAN list is corresponding described in one or more Privacy the application list;Any one of trust local train is not belonging to when the terminal device connects WLAN During trust LAN in table, lock the privacy that the map listing corresponding with the trust LAN list stored and answer With each application program in program listing.
3. a kind of method by monitoring LAN selective lock application program according to claim 1 and 2, its feature It is:The trust LAN trusted in LAN list is set by the user, the application in described privacy the application list Program name is set by the user.
4. a kind of method by monitoring LAN selective lock application program according to claim 3, its feature exists In:Each it is described trust LAN list corresponding to map listing in one or more described privacy the application lists by User sets.
5. a kind of method by monitoring LAN selective lock application program according to claim 4, its feature exists In:When getting the exit instruction of user input, methods described is exited.
6. a kind of terminal by monitoring LAN selective lock application program, it is characterised in that including:
Memory module, LAN list and privacy the application list are trusted for storing;
Monitoring modular, WLAN is connected for obtaining the terminal;
Judge module, judge it is described connection WLAN sign whether not with it is described trust LAN list in any trust The sign of LAN is identical, if so, then sending lock instruction;
Processing module, for locking the application program in described privacy the application list when the lock instruction is received.
7. a kind of terminal by monitoring LAN selective lock application program according to claim 6, its feature exists In:
The memory module includes trusting LAN list storage unit and privacy the application list memory cell;
Being prestored in the trust LAN list storage unit, one or more trust LAN list, the privacy application program Prestore one or more privacy the application lists in list storage unit;
The trust LAN list storage unit also prestores mapping table, and each trust office is prestored in the mapping table One or more described privacy the application lists corresponding to the train table of domain.
8. a kind of terminal by monitoring LAN selective lock application program according to claim 6, its feature exists In:Also include trusting LAN setting module, the trust LAN for obtaining user's setting, and store to the corresponding letter Appoint LAN list in.Also include privacy application setting module, for obtaining the privacy application program of user's setting, and deposit In storing up corresponding described privacy the application list.
9. a kind of terminal by monitoring LAN selective lock application program according to claim 6, its feature exists In:Also include mapping relations setting module, reflecting corresponding to each trust LAN list is set by the user for obtaining One or more the described privacy the application lists penetrated in list, and store in corresponding map listing.
10. a kind of terminal by monitoring LAN selective lock application program according to claim 6, its feature exists In:Also include exiting module, the exit instruction for obtaining user input.
CN201611024780.9A 2016-11-14 2016-11-14 Method and terminal for selectively locking applications by monitoring local area network Pending CN106713614A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611024780.9A CN106713614A (en) 2016-11-14 2016-11-14 Method and terminal for selectively locking applications by monitoring local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611024780.9A CN106713614A (en) 2016-11-14 2016-11-14 Method and terminal for selectively locking applications by monitoring local area network

Publications (1)

Publication Number Publication Date
CN106713614A true CN106713614A (en) 2017-05-24

Family

ID=58941171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611024780.9A Pending CN106713614A (en) 2016-11-14 2016-11-14 Method and terminal for selectively locking applications by monitoring local area network

Country Status (1)

Country Link
CN (1) CN106713614A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171044A (en) * 2017-12-28 2018-06-15 深圳豪客互联网有限公司 A kind of permission automatic obtaining method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102573107A (en) * 2010-11-22 2012-07-11 三星电子株式会社 Apparatus and method for connecting an access point in portable terminal
US20140258480A1 (en) * 2013-03-11 2014-09-11 Samsung Electronics Co. Ltd. Apparatus and method for controlling network access for applications on mobile terminals
CN104066088A (en) * 2014-06-06 2014-09-24 Tcl通讯(宁波)有限公司 Wireless internet access strategy method, system and definition method for mobile terminal
CN104639522A (en) * 2013-11-15 2015-05-20 华为终端有限公司 Network access control method and device
CN104717653A (en) * 2015-03-12 2015-06-17 惠州Tcl移动通信有限公司 Network connection control method and system of mobile terminal
CN104902480A (en) * 2015-06-17 2015-09-09 上海斐讯数据通信技术有限公司 Smartphone WIFI grading management method
CN105592448A (en) * 2014-10-22 2016-05-18 中兴通讯股份有限公司 Wifi processing method and system, and terminal
CN106096450A (en) * 2016-06-21 2016-11-09 依偎科技(南昌)有限公司 A kind of application program freezing method and mobile terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102573107A (en) * 2010-11-22 2012-07-11 三星电子株式会社 Apparatus and method for connecting an access point in portable terminal
US20140258480A1 (en) * 2013-03-11 2014-09-11 Samsung Electronics Co. Ltd. Apparatus and method for controlling network access for applications on mobile terminals
CN104639522A (en) * 2013-11-15 2015-05-20 华为终端有限公司 Network access control method and device
CN104066088A (en) * 2014-06-06 2014-09-24 Tcl通讯(宁波)有限公司 Wireless internet access strategy method, system and definition method for mobile terminal
CN105592448A (en) * 2014-10-22 2016-05-18 中兴通讯股份有限公司 Wifi processing method and system, and terminal
CN104717653A (en) * 2015-03-12 2015-06-17 惠州Tcl移动通信有限公司 Network connection control method and system of mobile terminal
CN104902480A (en) * 2015-06-17 2015-09-09 上海斐讯数据通信技术有限公司 Smartphone WIFI grading management method
CN106096450A (en) * 2016-06-21 2016-11-09 依偎科技(南昌)有限公司 A kind of application program freezing method and mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171044A (en) * 2017-12-28 2018-06-15 深圳豪客互联网有限公司 A kind of permission automatic obtaining method and device

Similar Documents

Publication Publication Date Title
WO2015149568A1 (en) A method of quickly establishing team communication group
US7548537B2 (en) 911 location updating for an enterprise using VOIP telephones
CN105976471B (en) A kind of access control equipment, caller management method and system
CN103380613B (en) The control method of wireless terminal device, messaging device, communication system and wireless terminal device
CN108521656A (en) A kind of Lora communication means and system
CN106991742B (en) Door opening method and system for dynamically identifying community Bluetooth and network access control terminal
CN103597808B (en) Directing messages based on domain names
CN108768799A (en) A kind of smart home account authoring system, method and terminal
CN102831503A (en) Building visual talkback integrated management system and implementing method thereof
JP2008141513A (en) Communication terminal
EP1587293B1 (en) Wireless door telephone
CN106255106A (en) A kind of wireless network connecting method and device
CN105868648B (en) Mobile terminal and data processing method and device for mobile terminal guest mode
CN106161213A (en) A kind of building intelligent visible intercommunication system and method
CN106933458A (en) Intellectual property managing method and system
CN110536036A (en) Information cuing method and equipment
CN106790039A (en) The flow of task control method and system of kvm system
CN106713614A (en) Method and terminal for selectively locking applications by monitoring local area network
CN109120710A (en) intelligent campus communication device management system, method and storage terminal
CN103312784B (en) The terminal Adaptable System and method of a kind of backup & disaster recovery
DE102019008189A1 (en) Procedure and arrangement for emergency call communication via nomadic ALL-IP connections
KR20190087820A (en) Smart Office Seat Occupancy And Monitoring System Using Network
CN107347184A (en) The detection of WIFI connection status, display methods and device, server and terminal device
CN108665583A (en) information correlation method and device
CN105959370A (en) Home cloud system of automatically sharing contents according to face information and realization method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170524