CN107820702B - Management and control method, device and electronic equipment - Google Patents

Management and control method, device and electronic equipment Download PDF

Info

Publication number
CN107820702B
CN107820702B CN201780001807.9A CN201780001807A CN107820702B CN 107820702 B CN107820702 B CN 107820702B CN 201780001807 A CN201780001807 A CN 201780001807A CN 107820702 B CN107820702 B CN 107820702B
Authority
CN
China
Prior art keywords
server
terminal
user
control
control authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201780001807.9A
Other languages
Chinese (zh)
Other versions
CN107820702A (en
Inventor
周勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Data Robotics (Zhuhai) Co.,Ltd.
Original Assignee
Cloudminds Robotics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Robotics Co Ltd filed Critical Cloudminds Robotics Co Ltd
Publication of CN107820702A publication Critical patent/CN107820702A/en
Application granted granted Critical
Publication of CN107820702B publication Critical patent/CN107820702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention relates to the technical field of terminal control, and discloses a management and control method, a management and control device and electronic equipment. The method comprises the following steps: sending a terminal login request to a server; receiving a terminal login success message returned by the server after the server verifies the terminal login request, wherein the server manages and controls the terminal according to a preset first management and control authority when the terminal login is successful; after the terminal successfully logs in and when a message that a user successfully logs in the server is obtained, the terminal is controlled by the server according to a preset second control authority; and when the message that the user exits the server is acquired, receiving the control after the server is switched from the second control authority to the first control authority. The implementation mode enriches the management mode of the equipment management system, facilitates the management of the equipment and improves the utilization rate of the equipment.

Description

Management and control method, device and electronic equipment
[ technical field ] A method for producing a semiconductor device
The embodiment of the invention relates to the technical field of terminal control, in particular to a management and control method, a management and control device and electronic equipment.
[ background of the invention ]
In the current device management system, if a device wants to receive the management and control of a certain server, the device generally logs in the device through a user, the device sends the identity information logged in by the user to the server for verification, and after the verification is passed, the user logs in the server and the device receives the management and control of the server, so that the device can communicate with the server.
In addition, after the user successfully logs in the server, the identity information of the user and the device are generally bound, and the user and the device correspond to each other one by one.
In the process of implementing the invention, the inventor finds that the related art has at least the following problems: the device can receive the management and control of the server only after the user logs in the device; the device logged in by the user can only be used by the user, and the condition that a plurality of users use the managed device with different rights alternately cannot be met.
[ summary of the invention ]
The embodiment of the invention provides a management and control method, a management and control device and electronic equipment, and solves the problem that one piece of equipment can only be used by one bound user in the related art.
In order to solve the above technical problem, in a first aspect, an embodiment of the present invention adopts a technical solution that: the management and control method is applied to the terminal and comprises the following steps:
sending a terminal login request to a server;
receiving a terminal login success message returned by the server after the server verifies the terminal login request, wherein the server manages and controls the terminal according to a preset first management and control authority when the terminal login is successful;
after the terminal successfully logs in and when a message that a user successfully logs in the server is obtained, the terminal is controlled by the server according to a preset second control authority;
and when the message that the user exits the server is acquired, receiving the control after the server is switched from the second control authority to the first control authority.
The first management and control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
Before the obtaining of the message that the user exits the server, the method further includes:
sending data associated with the user to the server to download the data from the server the next time the user logs into the server.
Wherein the successful login of the user to the server specifically comprises:
logging in the server according to a user login request sent to the server; alternatively, the first and second electrodes may be,
and logging in the server according to the user account distributed by the server.
Wherein the exiting of the user from the server specifically comprises:
logging out the server according to a login logging-out request sent to the server; alternatively, the first and second electrodes may be,
and exiting the server according to the management and control instruction pushed by the server.
In a second aspect, one technical solution adopted by the embodiments of the present invention is: the management and control method is applied to a server and comprises the following steps:
receiving a terminal login request;
verifying the terminal login request and returning a terminal login success message, wherein when the terminal login is verified successfully, the terminal is controlled according to a preset first control authority;
after the terminal successfully logs in and when a message that a user successfully logs in the server is obtained, the terminal is controlled according to a preset second control authority;
and when the message that the user exits the server is acquired, the second control authority is switched to the first control authority, and the terminal is controlled according to the first control authority.
The first management and control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
Before the obtaining of the message that the user exits the server, the method further includes:
and receiving data associated with the user, and backing up the data so as to return the backed-up data when the user logs in the server next time.
Wherein the successful login of the user to the server specifically comprises:
logging in the server according to a user login request sent to the server; alternatively, the first and second electrodes may be,
and logging in the server according to the user account distributed by the server.
Wherein the exiting of the user from the server specifically comprises:
logging out the server according to a login logging-out request sent to the server; alternatively, the first and second electrodes may be,
and exiting the server according to the management and control instruction pushed by the server.
In a third aspect, one technical solution adopted by the embodiments of the present invention is: the management and control device is applied to a terminal and comprises:
the first sending module is used for sending a terminal login request to the server;
the first receiving module is used for receiving a terminal login success message returned by the server after the server verifies the terminal login request, wherein the server manages and controls the terminal according to a preset first management and control authority when the terminal login is successful;
the first receiving module is used for receiving the control of the server on the terminal according to a preset second control authority after the terminal successfully logs in and when the message that the user successfully logs in the server is acquired;
and the second receiving module is used for receiving the control of the server after the second control authority is switched to the first control authority when the message that the user exits the server is acquired.
The first management and control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
Wherein the apparatus further comprises: a second sending module, configured to send data associated with the user to the server, so as to download the data from the server when the user logs in the server next time.
In a fourth aspect, one technical solution adopted by the embodiments of the present invention is: the management and control device is applied to a server and comprises:
the second receiving module is used for receiving a terminal login request;
the first control module is used for verifying the terminal login request and returning a terminal login success message, wherein when the terminal login success is verified, the terminal is controlled according to a preset first control authority;
the second control module is used for controlling the terminal according to a preset second control authority after the terminal successfully logs in and when a message that the user successfully logs in the server is acquired;
and the third control module is used for switching the second control authority to the first control authority when the message that the user exits the server is acquired, and controlling the terminal according to the first control authority.
The first management and control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
Wherein the apparatus further comprises:
and the backup module is used for receiving the data associated with the user and backing up the data so as to return the backed-up data when the user logs in the server next time.
In a fifth aspect, a technical solution of an embodiment of the present invention is: provided is an electronic device including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method as described above.
In the embodiment of the invention, the terminal is respectively controlled through two preset control authorities, under the first control authority, the terminal can receive the control of the server without the login of a user, under the second control authority, after the user logs in the terminal, the terminal receives the control of the server, and after the user logs out of the terminal, other users can log in the controlled terminal, so that one controlled terminal can be alternately used by a plurality of different users. The implementation mode enriches the management mode of the equipment management system, facilitates the management of the equipment and improves the utilization rate of the equipment.
[ description of the drawings ]
FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present invention;
FIG. 2 is a flowchart of a control method according to an embodiment of the present invention;
FIG. 3 is a flowchart of a management method according to a second embodiment of the present invention;
fig. 4 is a flowchart of a management and control method according to a third embodiment of the present invention;
fig. 5 is a flowchart of a management method according to a fourth embodiment of the present invention;
fig. 6 is a block diagram of a control device according to a fifth embodiment of the present invention;
fig. 7 is a block diagram of a management and control apparatus according to a sixth embodiment of the present invention;
fig. 8 is a block diagram of a system according to a seventh embodiment of the present invention;
fig. 9 is a schematic structural diagram of an electronic device according to an eighth embodiment of the present invention.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments of the present invention. It should be understood that the specific embodiments of the present invention described herein are for purposes of illustration only and are not intended to limit the invention.
Fig. 1 is a schematic diagram of an optional application scenario of a management and control method provided in an embodiment of the present invention. As shown in fig. 1, the application scenario includes an intelligent robot 1 and a server 2. After the intelligent robot 1 and the server 2 are connected, the intelligent robot 1 receives the control of the server 2. Then, the intelligent robot 1 can receive control of the management platform of the server 2, the management platform can send various instructions such as ring tones, messages and positioning, and the robot 1 can also be controlled by pushing a specific strategy with a part irrelevant to the login account as required, or the intelligent robot 1 can be controlled by pushing a specific application with a part irrelevant to the login account. At this time, although the intelligent robot 1 is controlled, a specific login account is not logged in, and the received policies and application controls are not related to the specific login account. Then the intelligent robot 1 logs in the server 2 according to the authentication information of the login account and obtains the service content related to the login account. After the intelligent robot 1 logs in the account, the intelligent robot 1 starts to receive the management and control operation, the management and control policy, and the installation push related to the login account, in addition to receive the management and control operation, the management and control policy, and the configuration unrelated to the login account and all the application programs which can be installed by the managed and controlled terminals, under the condition that the login account is not logged out. If the current login account is quitted from use, the control strategy to be followed by the login account and the application program which can be installed are deleted from the intelligent robot 1, and the intelligent robot 1 is restored to the state before login of the login account and still receives various controls unrelated to the login account. At this time, any legal login account can be logged in and then used by the managed intelligent robot 1 as required.
In the prior art, the intelligent robot 1 which normally does not log in to the account cannot be controlled by the server 2. After the login account is logged in, one intelligent robot 1 corresponds to one login account and can only be used for one login account, and the intelligent robot 1 is bound with the login account. The condition that a plurality of login accounts can use the same controlled intelligent robot 1 with different authorities at will can not be met.
Referring to fig. 1 again, in a possible application scenario provided by the embodiment of the present invention, the intelligent robot 1 may be controlled by the server 2 without logging in to a login account, and different users of the multiple users may use the same controlled intelligent robot 1 with different permissions alternately.
It should be noted that fig. 1 only shows one robot and one server, and those skilled in the art will understand that the application scenario may also include any number of robots and servers.
In combination with the above application scenarios, the following embodiments provide a specific management and control method and a management and control apparatus. In the following embodiments, the terminal includes: electronic equipment such as cell-phone, panel computer, PC, intelligent robot.
Example one
Referring to fig. 2, a first embodiment of the present invention provides a management and control method, where an execution subject of the method is a terminal, and the method includes:
step 21, sending a terminal login request to the server.
And step 23, receiving a terminal login success message returned by the server after the server verifies the terminal login request, wherein the server manages and controls the terminal according to a preset first management and control authority when the terminal login is successful.
In this embodiment, a login request is sent by a terminal to a server, at which time the terminal is in an unmanaged state and there is no user login.
And inputting address information of the server on the unmanaged terminal through built-in management and control software or installed management and control software, and sending a login request to the server. Specifically, the information specified by the server can be input or some information which can be used for uniquely identifying the terminal can be automatically carried according to the requirement. The login request may additionally input information similar to a company or department, limiting the future use of the terminal by multiple users, but only users within a particular community.
The login request carries information required by the server through the input server address information, and the server can determine whether to allow the terminal to accept the management and control of the management platform according to configuration.
If the server verifies the terminal without errors, a correct result is returned to inform the terminal that the terminal is managed and controlled. But the managed terminal does not have an associated login account.
And at the moment, the terminal connected with the server can receive the management and control of the server management platform, and the server manages and controls the terminal according to the preset first management and control authority. Based on the first control authority, the server can send various information such as ring tone, message, positioning and the like to the terminal, and can also push control operation or control strategies with parts irrelevant to the login account according to requirements so as to control the terminal, or push specific applications with parts irrelevant to the login account to the terminal. At this time, the terminal is controlled, but does not log in a specific login account, and the received control operation, control strategy and application control are not related to a specific login account.
The first control authority includes basic operation, that is, all operations unrelated to the login account, and all terminals under the control of the server may execute the basic operation. The basic operations are for example, but not limited to: the method comprises one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting restoration, enterprise data erasing and software upgrading.
In addition, the terminal may also report basic information of the terminal to the server actively, and reporting the basic information is to execute the basic operation, where the basic operation is, for example, but not limited to: sending one or more of power supply allowance, disk allowance, memory state, information about whether the sending equipment is cracked, starting time, and irrelevant logs of the sending equipment and the login account.
And 25, after the terminal successfully logs in and when the information that the user successfully logs in the server is obtained, receiving the control of the terminal by the server according to a preset second control authority.
The successful login of the user to the server may be to log in the server according to a user login request sent to the server; specifically, the terminal receives authentication information of a login account input by a user, sends a user login request to the server according to the authentication information of the login account, and the server authenticates the authentication information of the login account. After the authentication and verification of the login account authentication information are passed, the management platform on the server marks the terminal which logs in the server through the login account, and the user successfully logs in the server.
The user can successfully log in the server according to a user account distributed by the server. That is, the server actively allocates users to the terminal, and after the users are configured to the terminal, the management platform on the server marks the terminal.
At this time, the server manages and controls the terminal logging in the server through the login account according to a preset second management and control authority, and the server pushes corresponding service contents such as management and control operation, management and control strategy or application and the like related to the login account of the terminal. Meanwhile, the server records the log of the used equipment according to the requirement.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users. When a user logs in a controlled terminal, the communication between the terminal and the server can be a basic operation independent of the user account or a dedicated operation related to the user account.
And 27, when the message that the user exits the server is acquired, receiving the control after the server is switched from the second control authority to the first control authority.
In this embodiment, the server can be exited in the following two ways.
The first method is as follows: and logging out the server according to a login logging-out request sent to the server. Here, the terminal may actively request the server to log out of the login account, specifically, the terminal sends a login log-out request instruction to the server, and the server returns a login log-out confirmation instruction according to the received login log-out request instruction, so that the login account logs out from the terminal.
The second method comprises the following steps: receiving a control instruction pushed by a server, and quitting the server according to the control instruction. Here, the server may actively request the login account to be logged out from the terminal.
And when the login account logs out, the control authority of the server is switched to the first control authority from the second control authority, and the terminal accepts control of the first control authority. At this point, all information on the terminal related to the user's login account (such as received policies and downloaded applications) may be cleared. At the server side, the information of the user login account is also cleared, at this time, the terminal managed by the server does not have user login, but the terminal is still controlled by the server.
In addition, other users can log in the server according to the authentication information of the user, so as to receive the control of the second control authority of the server, and the server can push corresponding service contents such as control operation, control strategy or application and the like related to the logged-in user. Meanwhile, the server records the log of the used equipment according to the requirement. After the user logs out, the terminal receives the control of the server after the second control authority is switched to the first control authority, and other users can log in the server according to corresponding authorities of the other users, and the process is repeated. Here, a terminal controlled by a server can be accessed by a plurality of users alternately using different rights, thereby solving the problem that one terminal can be used by only one user.
The embodiment of the invention provides a control method, which respectively controls a terminal through two preset control authorities, wherein under the first control authority, the terminal can receive the control of a server without the login of a user, under the second control authority, after the user logs in the terminal, the terminal receives the control of the server, and after the user logs out of the login, other users can log in the controlled terminal, so that one controlled terminal can be alternately used by a plurality of different users. The implementation mode enriches the management mode of the equipment management system, facilitates the management of the equipment and improves the utilization rate of the equipment.
Example two
Referring to fig. 3, a second embodiment of the present invention provides a management method, and the main difference between fig. 3 and fig. 2 is that before the obtaining of the message that the user exits from the server, the method further includes:
step 26, sending data associated with the user to the server to download the data from the server the next time the user logs in to the server.
In this embodiment, during the period that the user logs in the terminal, all data generated by the user can be backed up as required, so that when the user logs in the terminal again, the backed-up history data can be obtained. It should be noted that the terminal on which the user logs in again is not necessarily the terminal on which the user logs in when backing up data, and the terminal may be any one of all managed devices.
The embodiment of the invention provides a control method, which respectively controls a terminal through two preset control authorities, wherein under the first control authority, the terminal can receive the control of a server without the need of logging in by a user, under the second control authority, after the user logs in the terminal, the terminal receives the control of the server, and after the user logs out of the terminal, other users can log in the controlled terminal, so that one controlled terminal can be alternately used by a plurality of different users, and in addition, when the user logs in the terminal, data related to the user can be backed up. The implementation mode facilitates the management of the equipment, ensures the integrity of user data and improves the utilization rate of the equipment.
EXAMPLE III
Referring to fig. 4, a third embodiment of the present invention provides a management and control method, where an execution subject of the method is a server, and the method includes:
and step 31, receiving a terminal login request.
And step 33, verifying the terminal login request, and returning a terminal login success message, wherein when the terminal login is verified successfully, the terminal is controlled according to a preset first control authority.
In this embodiment, the server receives a login request sent by a terminal, and at this time, the terminal is in an unmanaged state.
And inputting address information of the server on the unmanaged terminal through built-in management and control software or installed management and control software, and receiving a login request sent by the terminal by the server. Specifically, the information specified by the server can be input or some information which can be used for uniquely identifying the terminal can be automatically carried according to the requirement. The login request may additionally input information similar to a company or department, limiting the future use of the terminal by multiple users, but only users within a particular community.
The terminal logs in the request to carry the information required by the server through the input server address information, and the server can determine whether the terminal is allowed to be controlled by the server management platform according to the configuration.
If the server verifies the terminal without errors, a correct result is returned to inform the terminal that the terminal is managed and controlled. But the managed terminal does not have an associated login account.
At this time, the server management platform can manage and control the terminal which is successfully logged in, and the server manages and controls the terminal according to a preset first management and control authority. Based on the first control authority, the server can send various information such as ring tone, message, positioning and the like to the terminal, and can also push control operation or control strategies with parts irrelevant to the login account according to requirements so as to control the terminal, or push specific applications with parts irrelevant to the login account to the terminal. At this time, the terminal is controlled, but does not log in a specific login account, and the received control operation, control strategy and application control are not related to a specific login account.
The first control authority includes basic operation, that is, all operations unrelated to the login account, and all terminals under the control of the server may execute the basic operation. The basic operations are for example, but not limited to: the method comprises one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting restoration, enterprise data erasing and software upgrading.
In addition, the terminal may also report basic information of the terminal to the server actively, and reporting the basic information is to execute the basic operation, where the basic operation is, for example, but not limited to: sending one or more of power supply allowance, disk allowance, memory state, information about whether the sending equipment is cracked, starting time, and irrelevant logs of the sending equipment and the login account.
And step 35, after the terminal successfully logs in and when the information that the user successfully logs in the server is obtained, managing and controlling the terminal according to a preset second management and control authority.
The successful login of the user to the server may be to log in the server according to a user login request sent to the server; specifically, the terminal receives authentication information of a login account input by a user, sends a user login request to the server according to the authentication information of the login account, and the server authenticates the authentication information of the login account. After the authentication and verification of the login account authentication information are passed, the management platform on the server marks the terminal which logs in the server through the login account, and the user successfully logs in the server.
The user can successfully log in the server according to a user account distributed by the server. That is, the server actively allocates users to the terminal, and after the users are configured to the terminal, the management platform on the server marks the terminal.
At this time, the server manages and controls the terminal logging in the server through the login account according to a preset second management and control authority, and the server pushes corresponding service contents such as management and control operation, management and control strategy or application and the like related to the login account of the terminal. Meanwhile, the server records the log of the used equipment according to the requirement.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users. When a user logs in a controlled terminal, the communication between the terminal and the server can be a basic operation independent of the user account or a dedicated operation related to the user account.
And step 37, when the message that the user exits the server is acquired, switching the second control authority to the first control authority, and controlling the terminal according to the first control authority.
In this embodiment, the server can be exited in the following two ways.
The first method is as follows: and logging out the server according to a log-out request sent to the server. Here, the terminal may actively request the server to log out of the login account, specifically, the terminal sends a login log-out request instruction to the server, and the server returns a login log-out confirmation instruction according to the received login log-out request instruction, so that the login account logs out from the terminal.
The second method comprises the following steps: and exiting the server according to the management and control instruction pushed by the server. Here, the server may actively request the login account to be logged out from the terminal.
And when the login account logs out, the control authority of the server is switched to the first control authority from the second control authority, and the terminal accepts control of the first control authority. At this point, all information on the terminal related to the user's login account (such as received policies and downloaded applications) may be cleared. At the server side, the information of the user login account is also cleared, at this time, the terminal managed by the server does not have user login, but the terminal is still controlled by the server.
In addition, other users can log in the server according to the authentication information of the user, so as to receive the control of the second control authority of the server, and the server can push corresponding service contents such as control operation, control strategy or application and the like related to the logged-in user. Meanwhile, the server records the log of the used equipment according to the requirement. After the user logs out, the terminal receives the control of the server after the second control authority is switched to the first control authority, and other users can log in the server according to corresponding authorities of the other users, and the process is repeated. Here, a terminal controlled by a server can be accessed by a plurality of users alternately using different rights, thereby solving the problem that one terminal can be used by only one user.
The embodiment of the invention provides a control method, which respectively controls a terminal through two preset control authorities, wherein under the first control authority, the terminal can receive the control of a server without the login of a user, under the second control authority, after the user logs in the terminal, the terminal receives the control of the server, and after the user logs out of the login, other users can log in the controlled terminal, so that one controlled terminal can be alternately used by a plurality of different users. The implementation mode enriches the management mode of the equipment management system, facilitates the management of the equipment and improves the utilization rate of the equipment.
Example four
Referring to fig. 5, a fourth embodiment of the present invention provides a management method, and the main difference between fig. 5 and fig. 4 is that before the message that the user exits the server is obtained, the method further includes:
step 36, receiving the data associated with the user, and backing up the data, so as to return the backed-up data when the user logs in the server next time.
In this embodiment, the server may back up data generated by the user during logging in the terminal, so that when the user logs in the terminal again, the server may obtain the backed-up history data. It should be noted that the terminal on which the user logs in again is not necessarily the terminal on which the user logs in when backing up data, and the terminal may be any one of all managed devices.
The embodiment of the invention provides a control method, which respectively controls a terminal through two preset control authorities, wherein under the first control authority, the terminal can receive the control of a server without the need of logging in by a user, under the second control authority, after the user logs in the terminal, the terminal receives the control of the server, and after the user logs out of the terminal, other users can log in the controlled terminal, so that one controlled terminal can be alternately used by a plurality of different users, and in addition, when the user logs in the terminal, data related to the user can be backed up. The implementation mode facilitates the management of the equipment, ensures the integrity of user data and improves the utilization rate of the equipment.
EXAMPLE five
Referring to fig. 6, a fifth embodiment of the present invention provides a management and control device, which is suitable for a terminal such as a mobile phone, a tablet computer, a PC, and an intelligent robot, where the device 40 includes: a first sending module 41, a first receiving module 42, a first receiving module 43, and a second receiving module 44.
The first sending module 41 is configured to send a terminal login request to a server; a first receiving module 42, configured to receive a terminal login success message returned by the server after the server verifies the terminal login request, where when the terminal login succeeds, the server manages and controls the terminal according to a preset first management and control authority; the first receiving module 43 is configured to receive, after the terminal successfully logs in and when a message that the user successfully logs in the server is acquired, the server receives control over the terminal according to a preset second control permission; a second receiving module 44, configured to receive, when the message that the user exits the server is obtained, the control after the server is switched from the second control permission to the first control permission.
The first management and control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
Optionally, the apparatus 40 further comprises: a second sending module 45. A second sending module 45, configured to send data associated with the user to the server, so as to download the data from the server when the user logs in the server next time.
It should be noted that, since the contents of information interaction, execution process, and the like between the modules in the apparatus are based on the same concept as those of the first and second embodiments of the method of the present invention, specific contents may refer to the description in the embodiment of the method of the present invention, and are not described herein again.
The embodiment of the invention provides a management and control device, which respectively manages and controls a terminal through two preset management and control authorities, wherein under the first management and control authority, the terminal can receive the management and control of a server without the need of logging in by a user, under the second management and control authority, after the user logs in the terminal, the terminal receives the management and control of the server, and after the user logs out, other users can log in the controlled terminal, so that one controlled terminal can be alternately used by a plurality of different users, and in addition, when the user logs in the terminal, data related to the user can be backed up. The implementation mode facilitates the management of the equipment, ensures the integrity of user data and improves the utilization rate of the equipment.
EXAMPLE six
Referring to fig. 7, a sixth embodiment of the present invention provides a management device, which is suitable for a server, where the device 50 includes: a second receiving module 51, a first managing module 52, a second managing module 53, and a third managing module 54.
The second receiving module 51 is configured to receive a terminal login request; the first control module 52 is configured to verify the terminal login request and return a terminal login success message, where when the terminal login is verified successfully, the terminal is controlled according to a preset first control permission; the second control module 53 is configured to, after the terminal successfully logs in and when a message that the user successfully logs in the server is obtained, control the terminal according to a preset second control permission; and a third control module 54, configured to switch the second control permission to the first control permission when obtaining the message that the user exits from the server, and control the terminal according to the first control permission.
The first management and control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
Optionally, the apparatus further comprises: a backup module 55. A backup module 55, configured to receive data associated with the user, and backup the data, so as to return the backed-up data when the user logs in the server next time.
It should be noted that, since the contents of information interaction, execution process, and the like between the modules in the apparatus are based on the same concept as those of the third and fourth embodiments of the method of the present invention, specific contents may refer to the description in the embodiment of the method of the present invention, and are not described herein again.
The embodiment of the invention provides a management and control device, which respectively manages and controls a terminal through two preset management and control authorities, wherein under the first management and control authority, the terminal can receive the management and control of a server without the need of logging in by a user, under the second management and control authority, after the user logs in the terminal, the terminal receives the management and control of the server, and after the user logs out, other users can log in the controlled terminal, so that one controlled terminal can be alternately used by a plurality of different users, and in addition, when the user logs in the terminal, data related to the user can be backed up. The implementation mode facilitates the management of the equipment, ensures the integrity of user data and improves the utilization rate of the equipment.
EXAMPLE seven
Referring to fig. 8, a seventh embodiment of the present invention provides a system, the system 60 comprising:
a terminal 61 and a server 62.
The terminal 61 is configured to perform the following steps:
sending a terminal login request to a server; receiving a terminal login success message returned by the server after the server verifies the terminal login request, wherein the server manages and controls the terminal according to a preset first management and control authority when the terminal login is successful; after the terminal successfully logs in and when a message that a user successfully logs in the server is obtained, the terminal is controlled by the server according to a preset second control authority; and when the message that the user exits the server is acquired, receiving the control after the server is switched from the second control authority to the first control authority.
The first management and control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
The server 62 is configured to perform the following steps:
receiving a terminal login request; verifying the terminal login request and returning a terminal login success message, wherein when the terminal login is verified successfully, the terminal is controlled according to a preset first control authority; after the terminal successfully logs in and when a message that a user successfully logs in the server is obtained, the terminal is controlled according to a preset second control authority; and when the message that the user exits the server is acquired, the second control authority is switched to the first control authority, and the terminal is controlled according to the first control authority.
The first management and control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
The second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
The embodiment of the invention provides a system, which comprises a terminal and a server, wherein the system can receive the control of the server under the condition that the terminal does not have user login, and when the terminal is controlled by the server, the terminal can meet the requirement that a plurality of users alternately use different authorities to access the terminal. The system facilitates the management of the equipment and improves the utilization rate of the equipment.
Example eight
Fig. 9 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present invention, where the electronic device is configured to execute the method embodiment. As shown in fig. 9, the electronic device 700 includes:
one or more processors 701 and a memory 702, one processor 701 being exemplified in fig. 7.
The processor 701 and the memory 702 may be connected by a bus or other means, such as the bus in fig. 9.
Memory 702, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules. The processor 701 executes various functional applications and data processing by running nonvolatile software programs, instructions and modules stored in the memory 702, that is, implements the management and control method in the above method embodiment.
The memory 702 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the management and control device, and the like. Further, the memory 702 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
The one or more modules are stored in the memory 702, and when executed by the one or more processors 701, perform the policing method in any of the method embodiments described above, for example, perform the above-described method steps 21, 23, 25, and 27 in fig. 2, the method steps 21, 23, 25, 26, and 27 in fig. 3, the method steps 31, 33, 35, and 37 in fig. 4, the method steps 31, 33, 35, 36, and 37 in fig. 5, and implement the functions of the modules 41 to 45 in fig. 6 and the modules 51 to 55 in fig. 7.
The product can execute the method provided by the embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the method provided by the embodiment of the present invention.
The electronic device of embodiments of the present invention exists in a variety of forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The intelligent robot: such devices are provided with a variety of internal and external information sensors, such as visual, auditory, tactile, olfactory, and in addition to receptors, effectors as means of acting on the surrounding environment. Also, such devices are capable of understanding human language and conversing with operators in human language.
(5) A server: the device for providing the computing service comprises a processor, a hard disk, a memory, a system bus and the like, and the server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(6) And other electronic devices with data interaction functions.
Example nine
Embodiments of the present invention provide a non-transitory computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, which are executed by an electronic device to perform the method in any of the above method embodiments, for example, to perform the above-described method steps 21, 23, 25, and 27 in fig. 2, method steps 21, 23, 25, 26, and 27 in fig. 3, method steps 31, 33, 35, and 37 in fig. 4, method steps 31, 33, 35, and 37 in fig. 5, and implement the functions of modules 41 to 45 in fig. 6, and modules 51 to 55 in fig. 7.
Example ten
Embodiments of the present invention provide a computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform a governing method in any of the above-described method embodiments, for example, performing method step 21, step 23, step 25, step 27 in fig. 2, method step 21, step 23, step 25, step 26, step 27 in fig. 3, method step 31, step 33, step 35, step 37 in fig. 4, method step 31, step 33, step 35, step 37 in fig. 5, and implementing the functions of modules 41-45 in fig. 6, and modules 51-55 in fig. 7.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a computer readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (21)

1. A management and control method is applied to a terminal and is characterized by comprising the following steps:
sending a terminal login request to a server;
receiving a terminal login success message returned by the server after the server verifies the terminal login request, wherein the server manages and controls the terminal according to a preset first management and control authority when the terminal login is successful;
after the terminal successfully logs in and when a message that a user successfully logs in the server is obtained, the terminal is controlled by the server according to a preset second control authority;
and when the message that the user exits the server is acquired, receiving the control after the server is switched from the second control authority to the first control authority.
2. The method of claim 1,
the first control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
3. The method of claim 2,
the second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
4. The method according to any one of claims 1 to 3, wherein before the obtaining of the message that the user exits the server, the method further comprises:
sending data associated with the user to the server to download the data from the server the next time the user logs into the server.
5. The method of claim 4, wherein the successful login of the user to the server specifically comprises:
logging in the server according to a user login request sent to the server; alternatively, the first and second electrodes may be,
and logging in the server according to the user account distributed by the server.
6. The method of claim 4, wherein the user logging out of the server specifically comprises:
logging out the server according to a login logging-out request sent to the server; alternatively, the first and second electrodes may be,
and exiting the server according to the management and control instruction pushed by the server.
7. A management and control method is applied to a server and is characterized by comprising the following steps:
receiving a terminal login request;
verifying the terminal login request and returning a terminal login success message, wherein when the terminal login is verified successfully, the terminal is controlled according to a preset first control authority;
after the terminal successfully logs in and when a message that a user successfully logs in the server is obtained, the terminal is controlled according to a preset second control authority;
and when the message that the user exits the server is acquired, the second control authority is switched to the first control authority, and the terminal is controlled according to the first control authority.
8. The method of claim 7,
the first control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
9. The method of claim 8,
the second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
10. The method according to any one of claims 7 to 9, wherein before the obtaining of the message that the user exits the server, the method further comprises:
and receiving data associated with the user, and backing up the data so as to return the backed-up data when the user logs in the server next time.
11. The method of claim 10, wherein the successful login of the user to the server specifically comprises:
logging in the server according to a user login request sent to the server; alternatively, the first and second electrodes may be,
and logging in the server according to the user account distributed by the server.
12. The method of claim 10, wherein the user logging out of the server specifically comprises:
logging out the server according to a login logging-out request sent to the server; alternatively, the first and second electrodes may be,
and exiting the server according to the management and control instruction pushed by the server.
13. A control device applied to a terminal is characterized by comprising:
the first sending module is used for sending a terminal login request to the server;
the first receiving module is used for receiving a terminal login success message returned by the server after the server verifies the terminal login request, wherein the server manages and controls the terminal according to a preset first management and control authority when the terminal login is successful;
the first receiving module is used for receiving the control of the server on the terminal according to a preset second control authority after the terminal successfully logs in and when the message that the user successfully logs in the server is acquired;
and the second receiving module is used for receiving the control of the server after the second control authority is switched to the first control authority when the message that the user exits the server is acquired.
14. The apparatus of claim 13,
the first control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
15. The apparatus of claim 14,
the second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
16. The apparatus of any one of claims 13 to 15, further comprising:
a second sending module, configured to send data associated with the user to the server, so as to download the data from the server when the user logs in the server next time.
17. A control device applied to a server is characterized by comprising:
the second receiving module is used for receiving a terminal login request;
the first control module is used for verifying the terminal login request and returning a terminal login success message, wherein when the terminal login success is verified, the terminal is controlled according to a preset first control authority;
the second control module is used for controlling the terminal according to a preset second control authority after the terminal successfully logs in and when a message that the user successfully logs in the server is acquired;
and the third control module is used for switching the second control authority to the first control authority when the message that the user exits the server is acquired, and controlling the terminal according to the first control authority.
18. The apparatus of claim 17,
the first control authority comprises basic operation, wherein the basic operation is one or more of equipment positioning, message notification, equipment ringing, mark loss, mark recovery, password setting, equipment screen locking, password clearing, factory setting recovery, enterprise data erasing, software upgrading, power supply allowance sending, disk allowance sending, memory state sending and log sending.
19. The apparatus of claim 18,
the second control authority comprises exclusive operation and the basic operation, wherein the exclusive operation is one or more of locking an enterprise domain, unlocking the enterprise domain, switching users and receiving push information associated with the users.
20. The apparatus of any one of claims 17 to 19, further comprising:
and the backup module is used for receiving the data associated with the user and backing up the data so as to return the backed-up data when the user logs in the server next time.
21. An electronic device, comprising:
at least one processor;
and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-12.
CN201780001807.9A 2017-07-03 2017-07-03 Management and control method, device and electronic equipment Active CN107820702B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/091491 WO2019006595A1 (en) 2017-07-03 2017-07-03 Control method and apparatus, and electronic device

Publications (2)

Publication Number Publication Date
CN107820702A CN107820702A (en) 2018-03-20
CN107820702B true CN107820702B (en) 2021-02-09

Family

ID=61606893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780001807.9A Active CN107820702B (en) 2017-07-03 2017-07-03 Management and control method, device and electronic equipment

Country Status (2)

Country Link
CN (1) CN107820702B (en)
WO (1) WO2019006595A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111316246A (en) * 2018-08-03 2020-06-19 深圳市元征科技股份有限公司 Maintenance equipment management method, user terminal and server
CN110501968A (en) * 2019-09-29 2019-11-26 山信软件股份有限公司 A kind of strange land method of controlling operation thereof applied to equipment centralized management
CN111107078B (en) * 2019-12-16 2023-04-07 达闼机器人股份有限公司 Application access method, robot control unit, server and storage medium
CN112261658B (en) * 2020-09-03 2024-04-16 富联智能工坊(郑州)有限公司 Terminal and terminal use method
CN113254902A (en) * 2021-06-11 2021-08-13 海尔数字科技(青岛)有限公司 Communication method, system, equipment and storage medium of service platform
CN117692258B (en) * 2024-02-02 2024-06-07 新亿成科技(江苏)有限公司 Security access control method, system and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN102318314A (en) * 2011-07-29 2012-01-11 华为技术有限公司 Method and devices for handling access authorities
CN103955203A (en) * 2014-04-14 2014-07-30 苏州汇川技术有限公司 Method and system for authority management of elevator controller debugging system

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8621204B2 (en) * 2009-12-23 2013-12-31 Citrix Systems, Inc. Systems and methods for evaluating and prioritizing responses from multiple OCSP responders
US8806593B1 (en) * 2011-05-19 2014-08-12 Zscaler, Inc. Guest account management using cloud based security services
CN103312676B (en) * 2012-03-15 2017-06-20 宇龙计算机通信科技(深圳)有限公司 Terminal, server and terminal safety management method
CN103634271B (en) * 2012-08-21 2018-07-06 腾讯科技(深圳)有限公司 A kind of authority control method of authority control system, device and network request
US9407620B2 (en) * 2013-08-23 2016-08-02 Morphotrust Usa, Llc System and method for identity management
CN105678564A (en) * 2014-11-19 2016-06-15 镇江金软计算机科技有限责任公司 Authority management method on the basis of Android discount application
CN105743841A (en) * 2014-12-08 2016-07-06 丰唐物联技术(深圳)有限公司 Intelligent hotel room facility control authority distribution method, client and system
CN106156549B (en) * 2015-04-28 2019-12-06 阿里巴巴集团控股有限公司 application program authorization processing method and device
CN106780243B (en) * 2016-11-24 2020-06-30 杭州领点科技有限公司 Intelligent party building system
CN106651397A (en) * 2016-12-22 2017-05-10 安徽杰瑞信息科技有限公司 New energy automobile linkage management system
CN106713321A (en) * 2016-12-26 2017-05-24 中国银联股份有限公司 Authority management method and device for debugging function of point of sale
CN106897589A (en) * 2017-03-07 2017-06-27 北京奇虎科技有限公司 Method, device and terminal that wearable device authority is shifted

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN102318314A (en) * 2011-07-29 2012-01-11 华为技术有限公司 Method and devices for handling access authorities
CN103955203A (en) * 2014-04-14 2014-07-30 苏州汇川技术有限公司 Method and system for authority management of elevator controller debugging system

Also Published As

Publication number Publication date
CN107820702A (en) 2018-03-20
WO2019006595A1 (en) 2019-01-10

Similar Documents

Publication Publication Date Title
CN107820702B (en) Management and control method, device and electronic equipment
CN112738805B (en) Device control method and apparatus, storage medium, and electronic device
CN104967997B (en) A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
CN104980926B (en) The long-range control method and device of mobile terminal
CN111991813B (en) Method and device for logging in game, electronic equipment and storage medium
CN104917749A (en) Account registration method and device
EP3641261A1 (en) Entrusted login method, related device and computer readable storage medium
CN108337210A (en) Equipment configuration method and device, system
CN104753944A (en) Account security verifying method and system
CN113505354B (en) Data processing method, device and storage medium
CN111355723A (en) Single sign-on method, device, equipment and readable storage medium
US20130084828A1 (en) Method and apparatus for providing cellphone service from any device
CN104635543A (en) Method and device for carrying out management operation
CN114139135B (en) Equipment login management method, device and storage medium
CN106656985A (en) Backup account login method, device and system
CN113886803A (en) Object storage system of instant messaging, object storage request method and device
CN106537873A (en) Establishing secure computing devices for virtualization and administration
CN102801728A (en) Management method and system for automatic login of client side
CN110601852B (en) Authentication and authorization method and system for electronic equipment of voice conversation platform
CN111859320A (en) Cross-system login-free method, device, equipment and readable storage medium
CN103559430A (en) Application account management method and device based on android system
CN109842600B (en) Method for realizing mobile office, terminal equipment and MDM equipment
CN105025482B (en) Communication information processing method and equipment thereof
CN115943623A (en) Techniques for managing telephone number-based user accounts
CN108471409B (en) The application programming interfaces authentication configuration method and system of voice dialogue platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210122

Address after: 200000 second floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Applicant after: Dalu Robot Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: CLOUDMINDS (SHENZHEN) ROBOTICS SYSTEMS Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 201111 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Patentee after: Dayu robot Co.,Ltd.

Address before: 200000 second floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Patentee before: Dalu Robot Co.,Ltd.

CP03 Change of name, title or address
TR01 Transfer of patent right

Effective date of registration: 20230918

Address after: Office 701-724, No. 3000 Huandao East Road, Hengqin New District, Zhuhai City, Guangdong Province, 519031

Patentee after: Data Robotics (Zhuhai) Co.,Ltd.

Address before: 201111 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Patentee before: Dayu robot Co.,Ltd.

TR01 Transfer of patent right