CN111381888A - Electronic terminal use control method and device and storage medium - Google Patents

Electronic terminal use control method and device and storage medium Download PDF

Info

Publication number
CN111381888A
CN111381888A CN201811609952.8A CN201811609952A CN111381888A CN 111381888 A CN111381888 A CN 111381888A CN 201811609952 A CN201811609952 A CN 201811609952A CN 111381888 A CN111381888 A CN 111381888A
Authority
CN
China
Prior art keywords
electronic
contract
terminal
electronic contract
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811609952.8A
Other languages
Chinese (zh)
Inventor
杨文峻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201811609952.8A priority Critical patent/CN111381888A/en
Publication of CN111381888A publication Critical patent/CN111381888A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4418Suspend and resume; Hibernate and awake
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • G06F9/453Help systems

Abstract

The application discloses a method and a device for managing and controlling the use of an electronic terminal and a storage medium, and relates to the technical field of internet. In the embodiment of the application, the electronic contract can be signed with the electronic terminal user. The electronic contract has a plurality of electronic contracts, and each electronic contract has data analysis rules. When the terminal is controlled, a data acquisition rule corresponding to the electronic contract can be called, and the use data of the electronic terminal is acquired and stored according to a preset rule; then for each electronic appointment: calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment; and then outputting whether the condition of the electronic contract is violated or not according to the statistical analysis result. In this way, data collection, storage and statistics are all realized based on the electronic contract, and the electronic contract is generated according to the needs of the user, so the information is the information required by the electronic terminal, and the use control of the electronic terminal can be effectively realized.

Description

Electronic terminal use control method and device and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for managing and controlling usage of an electronic terminal, and a storage medium.
Background
And the use condition of the terminal is known, and the use condition is limited to the statistical information of a third party. On the one hand, these statistics are less well known. On the other hand, even if the user knows the existence of the statistical information, the statistical information is low in use rate because the data statistics are too simple and irrelevant to the user requirements. Since the user hardly needs the statistical information, the processing resources occupied by the statistics of the information are wasted. More importantly, effective supervision of the terminal cannot be achieved only through the existing statistical information.
Disclosure of Invention
The embodiment of the application provides a usage control method and device of an electronic terminal and a storage medium, which are used for solving the problem that the utilization rate of statistical information of usage data of the terminal is low in the prior art, so that the utilization rate of processing resources for counting the information usage is low.
In a first aspect, an embodiment of the present application provides a method for managing and controlling use of an electronic terminal, where the method includes:
reading an electronic contract for controlling the electronic terminal; the electronic contract comprises at least one electronic contract;
calling a data acquisition rule corresponding to the electronic contract, acquiring the use data of the electronic terminal and storing the use data according to a preset rule;
executing for each electronic appointment:
reading the usage data for the electronic appointment from the usage data;
calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment;
and outputting whether the condition of violating the electronic contract exists or not according to the statistical analysis result.
In a second aspect, an embodiment of the present application provides a usage management and control apparatus for an electronic terminal, where the apparatus includes:
the reading module is used for reading an electronic contract used for controlling the electronic terminal; the electronic contract comprises at least one electronic contract;
the acquisition module is used for calling a data acquisition rule corresponding to the electronic contract, acquiring the use data of the electronic terminal and storing the use data according to a preset rule;
an analysis module to perform, for each electronic appointment:
reading the usage data for the electronic appointment from the usage data;
calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment;
and outputting whether the condition of violating the electronic contract exists or not according to the statistical analysis result.
Another embodiment of the present application also provides a computing device comprising at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the usage control method of any electronic terminal provided by the embodiment of the application.
Another embodiment of the present application further provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are configured to cause a computer to execute a usage management and control method of any electronic terminal in the embodiments of the present application.
The embodiment of the application provides a method and a device for managing and controlling the use of an electronic terminal and a storage medium. In the method, an electronic contract can be made with an electronic end user. The electronic contract has a plurality of electronic contracts, and each electronic contract has data analysis rules. When the terminal is controlled, a data acquisition rule corresponding to the electronic contract can be called, and the use data of the electronic terminal is acquired and stored according to a preset rule; then for each electronic appointment: calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment; and then outputting whether the condition of the electronic contract is violated or not according to the statistical analysis result. Therefore, data acquisition, storage and statistics are all realized on the basis of the electronic contract, the electronic contract is generated according to the needs of the user, statistical information in the application is information required by the user, data acquisition and statistical analysis aiming at the actual needs of the user are realized, processing resources consumed by acquisition and processing of the use data of the terminal user are meaningful, and compared with the prior art that processing resources are used to obtain an undesirable statistical analysis result, the utilization rate of the processing resources is increased. In addition, the information is information required for managing and controlling the electronic terminal, so that the management and control of the use of the electronic terminal can be effectively realized.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic view of a usage management application scenario of an electronic terminal in an embodiment of the present application;
fig. 2 is an interface of a default page in the usage management and control method of the electronic terminal in the embodiment of the present application;
fig. 3 is a schematic flowchart illustrating a usage control method of an electronic terminal according to an embodiment of the present application;
fig. 4 is a second flowchart illustrating a usage control method of an electronic terminal according to an embodiment of the present application;
fig. 5 is a third schematic flowchart illustrating a usage control method of an electronic terminal in an embodiment of the present application;
fig. 6 is a fourth schematic flowchart illustrating a usage control method of an electronic terminal in an embodiment of the present application;
fig. 7 is a fifth flowchart illustrating a usage control method of an electronic terminal in an embodiment of the present application;
fig. 8a is a schematic view of an agreed interface in a usage control method of an electronic terminal in the embodiment of the present application;
fig. 8b is a second schematic diagram of a provisioning interface in the usage management and control method of the electronic terminal in the embodiment of the present application;
fig. 8c is a third schematic diagram of an agreed interface in the usage control method of the electronic terminal in the embodiment of the present application;
fig. 9 is a sixth schematic flowchart illustrating a usage control method of an electronic terminal in an embodiment of the present application;
fig. 10 is one of interface diagrams of a monitoring terminal in an embodiment of the present application;
fig. 11 is a second schematic interface diagram of the monitoring terminal in the embodiment of the present application;
FIG. 12 is a schematic interface diagram of a provisioning terminal in the embodiment of the present application;
fig. 13a is a third schematic interface diagram of a monitoring terminal in the embodiment of the present application;
fig. 13b is a fourth schematic interface diagram of the monitoring terminal in the embodiment of the present application;
fig. 13c is a fifth schematic interface diagram of the monitoring terminal in the embodiment of the present application;
fig. 13d is a sixth schematic interface diagram of the monitoring terminal in the embodiment of the present application;
fig. 14 is a schematic structural diagram of a usage control device of an electronic terminal in an embodiment of the present application;
fig. 15 is a schematic structural diagram of a computing device according to an embodiment of the present application.
Detailed Description
In order to improve the utilization efficiency of processing resources and obtain effective statistical information so as to facilitate the implementation of the usage control of the terminal, embodiments of the present application provide a method and an apparatus for usage control of an electronic terminal, and a storage medium. In order to better understand the technical scheme provided by the embodiment of the present application, the terms related to the scheme are briefly described here:
white list: the list stores application identifiers or web addresses that do not need to be monitored.
In the embodiment of the application, the electronic contract can be signed with the electronic terminal user. The electronic contract has a plurality of electronic contracts, and each electronic contract has data analysis rules. When the terminal is controlled, a data acquisition rule corresponding to the electronic contract can be called, and the use data of the electronic terminal is acquired and stored according to a preset rule; then for each electronic appointment: calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment; and then outputting whether the condition of the electronic contract is violated or not according to the statistical analysis result. Therefore, data acquisition, storage and statistics are all realized on the basis of the electronic contract, the electronic contract is generated according to the needs of the user, statistical information in the application is information required by the user, data acquisition and statistical analysis aiming at the actual needs of the user are realized, processing resources consumed by acquisition and processing of the use data of the terminal user are meaningful, and compared with the prior art that processing resources are used to obtain an undesirable statistical analysis result, the utilization rate of the processing resources is increased. In addition, the information is information required for managing and controlling the electronic terminal, so that the management and control of the use of the electronic terminal can be effectively realized.
As shown in fig. 1, an application scenario diagram of a usage monitoring method of an electronic terminal according to an embodiment of the present application is provided. The application scenario includes a user 10, a desktop 11, a server 12, a user 20, and a handset 21. The user 10 uses a desktop computer 11 and the user 20 uses a cellular phone 21. Various applications are installed in the desktop computer 11, and the management and control client is installed in the mobile phone 21, and the management and control client may be pre-bound with the desktop computer 11.
It is understood that in alternative embodiments, the user 10 is not limited to a specific desktop 11, and the user 10 may use an electronic terminal such as a mobile phone, a tablet computer, a notebook computer, etc. in an actual situation. Similarly, the user 20 is not limited to the mobile phone 21, and may also be an electronic terminal such as a tablet computer or a notebook computer.
In one implementation scenario shown in FIG. 1, first, user 10 and user 20 may first generate an electronic contract for user 10 via desktop computer 11. For example, the total time the user 10 uses the desktop computer each day, the time of the power-off, and which applications may not be used, etc. may be specified.
Then, after the user 10 powers on the desktop computer 11, the desktop computer starts to read the electronic contract for controlling the electronic terminal according to the power on message and invokes the data acquisition rule corresponding to the electronic contract, so as to acquire and store the usage data of the electronic terminal. Then the desktop computer 11 counts the use data according to the electronic contract in the electronic contract; and determining whether the situation of violating the electronic appointment exists, if so, generating violation alarm information aiming at the user 10, sending the violation alarm information to the server 12, and pushing the violation alarm information to the mobile phone 21 of the user 20 by the server 12. In this way, the user 20 can realize the terminal use management and control of the user 10.
The desktop computer 11 and the server 12, and the mobile phone 21 and the server may be connected by communication through a communication network. The communication network may be a local area network, a wide area network, etc., or may be connected by a line. The desktop 11 and the mobile phone 21 are represented by terminal devices, and the terminal devices applicable to the present application may also include various terminal devices such as a tablet computer and a notebook computer.
The method for managing and controlling the use of the electronic terminal is particularly suitable for parents to manage and control the use of the electronic terminal of teenagers, a network manager to manage and control the use of each terminal, or enterprises to manage and control the use of terminals of employees.
The following describes a usage control method of an electronic terminal according to an embodiment of the present application with reference to the accompanying drawings.
First, the usage data may be configured according to the usage management and control requirement of the user for the electronic terminal. Therefore, the electronic contract setting interface can be displayed firstly in the application; and then generating an electronic appointment according to the operation of the user on the setting interface. For example, a lead page of an electronic contract may be displayed first; after determining that an instruction for continuously generating the electronic contract is received, displaying a contract page of the electronic contract, wherein the contract page comprises electronic contract content and a configurable item corresponding to the electronic contract content; and generating the electronic contract according to the selected configuration item. As shown in fig. 2, it is possible to stipulate the time of power-off every day, the total time of use of the terminal every day, and the like. And the terminal stores the electronic contract after the protocol is generated and executes subsequent management and control operation.
As described above, in order to facilitate the management and control of the electronic terminal by implementing, the management and control terminal may generate the management and control authorization identifier after generating the electronic contract, so that the management and control terminal may receive the usage information of the electronic terminal after establishing association with the electronic terminal through the management and control authorization identifier, and may even perform the management and control operation on the electronic terminal.
The following further describes a usage control method of an electronic terminal, as shown in fig. 3, the method includes the following steps:
step 301: reading an electronic contract for controlling the electronic terminal; the electronic contract includes at least one electronic contract.
Step 302: and calling a data acquisition rule corresponding to the electronic contract, acquiring the use data of the electronic terminal and storing the use data according to a preset rule.
Step 303: executing for each electronic appointment: reading the usage data for the electronic appointment from the usage data; calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment; and outputting whether the condition of violating the electronic contract exists or not according to the statistical analysis result.
Further, in this embodiment of the present application, in a case that the statistical analysis result indicates that the usage of the electronic terminal violates the electronic appointment, a user identifier of an operating system of the electronic terminal is obtained; and generating default alarm information carrying the user identification and the electronic appointment. And then the default alarm information can be sent to the control terminal. Therefore, the control terminal can know the use condition of the electronic terminal conveniently and can even control the electronic terminal.
Further, in this embodiment of the present application, collecting the usage data of the electronic terminal may include: acquiring data of the use duration of an application program running on the electronic terminal; and acquiring data of the service life of the webpage running on the electronic terminal. The duration of use acquisition is further described below for both aspects.
1) The data collection of the usage duration of the application program running on the electronic terminal is shown in fig. 4, and may include:
step 401: receiving a system notification message of an electronic terminal, wherein the system notification message comprises a starting notification or a system awakening notification;
step 402: and acquiring the current application program running on the electronic terminal, and recording the current time for running the current application program.
Step 403: processor resources are released.
Wherein processor resources may be proactively released to enter a sleep state upon determining that no code is currently executing; or when the running system of the electronic terminal detects that the program executing the usage control method of the electronic terminal has no task, the program is controlled to release the processor resource so as to enable the program to enter the sleep state.
Step 404: and entering a wakeup state after receiving a preset wakeup message.
The wake-up message may be a switching notification of the operating system, and when the operating system receives the switching notification, the program may be woken up by using a callback function that executes program registration of the electronic terminal using the management and control method. The wake-up message may also be a wake-up notification triggered by the first periodic wake-up timer registered, and then the running system wakes up the program through a callback function when receiving the notification.
Step 405: if the preset wake-up message is a switching notification for switching the application program, determining a time length between the current time and the recorded time, taking the determined time length as the use time length of the recorded application program, and returning to execute the step 402.
Step 406: if the preset wakeup message is a wakeup notification that is wakened up by the first periodic wakeup timer, determining the timing period of the first periodic wakeup timer as the usage duration of the recorded application program, and returning to execute step 403 after the recorded time is updated to be the current time.
In this way, the program can enter a sleep state to conserve processing resources and power when operations need not be performed.
Of course, some applications do not need to be monitored when implemented, for example, applications used by teenagers for learning may not be monitored. Therefore, a white list of the application program can be configured, and then whether to determine the time length between the current time and the recorded time is determined through the white list so as to determine whether to store the acquired data. That is, the operations of determining the time length between the current time and the recorded time in steps 405 and 406 are not performed in the white list, otherwise, the collected data is discarded.
For ease of understanding, the collection of usage duration of the application program is illustrated in connection with fig. 5, as shown in fig. 5, including the following steps:
step 501: receiving a system notification message of the electronic terminal, wherein the system notification message comprises a starting notification or a system awakening notification, the initialization time variable is the current time, and the initialization application identification variable is the application identification for acquiring the current application program running on the electronic terminal.
In this way, the operation of recording the current application program and the current time in step 402 can be implemented by the time variable and the application identification variable.
Step 502: a first periodic wake-up timer is registered.
Step 503: releasing the processor resource and entering a sleep state.
Step 504: and calling a callback function to enter an awakening state after receiving a preset awakening message.
Step 505: if the preset wake-up message is the received switching notification of the switching application program, determining whether the recorded application identifier is in the white list, if yes, executing step 507, otherwise, executing step 506.
Step 506: and determining the time length between the current time and the recorded time as the use time length of the recorded application program, storing the use time length in a storage mode, and executing the step 507.
Step 507: the update time variable is the current time, the application identification variable is the application identification of the current application, and then step 503 is performed.
Step 508: if the preset wakeup message is a wakeup notification that is waken up by the first periodic wakeup timer, determining whether the recorded application identifier is in a white list, if so, executing step 510, otherwise, executing step 509.
Step 509: the timing period of the first periodic wakeup timer is determined as the usage duration of the recorded application, and then step 510 is executed.
Step 510: and returning to the step 503 after the time variable is updated to the current time.
2) The data acquisition of the usage duration of the web page running on the electronic terminal, as shown in fig. 6, may include:
step 601: and recording the current URL and the current time.
Step 602: processor resources are released.
The related operations for releasing the processor resources are already described in the foregoing, and are not described herein again.
Step 603: and entering a wakeup state after receiving a preset wakeup message.
Step 604: if the preset wake-up message is that a switching notification for switching the application program is received, determining the time length between the current time and the recorded time, taking the determined time length as the use time length of the recorded URL, and if the switched application program is still the browser, returning to execute the step 601;
correspondingly, if the switched application program is not a browser, the time variable may be updated to be the current time, and the application identifier variable is the application identifier of the current application, and then step 503 is executed.
Step 605: if the preset wakeup message is a wakeup notification that is wakened up by the second periodic wakeup timer, determining the timing period of the second periodic wakeup timer as the recorded use duration of the URL, and returning to execute step 601.
The second periodic wake-up timer may be the same as or different from the first periodic wake-up timer.
In specific implementation, some URLs do not need to be monitored, so that the URL white list can be provided, and only the URLs in the white list are subjected to data acquisition.
Taking the second periodic wakeup timer and the first periodic wakeup timer as an example, the following description will be given to the acquisition of the webpage time length with reference to fig. 7, and includes the following steps:
step 701: receiving a system notification message of the electronic terminal, wherein the system notification message comprises a starting notification or a system awakening notification, and if the current application is determined to be the browser, initializing a time variable to be the current time and initializing a URL identification variable to be the current URL.
Step 702: a first periodic wake-up timer is registered.
Step 703: processor resources are released.
Step 704, entering a wake-up state after receiving a preset wake-up message.
Step 705: and acquiring the current URL, determining whether the current URL is in a white list, if so, executing step 707, and otherwise, executing step 706.
Step 706: if the preset wake-up message is the received switching notification of the switching application, determining a time length between the current time and the recorded time, taking the determined time length as the usage time length of the recorded URL, and then executing step 707.
Step 707: if the switched application program is still the browser, the update time variable is the current time, and the URL variable is the current URL, then step 703 is executed.
Step 708: if the preset wakeup message is a wakeup notification that is wakened up by the first periodic wakeup timer, determining a timing period of the first periodic wakeup timer as a usage duration of the recorded URL, and then executing step 709.
Step 709: the time variable is updated to be the current time, and the URL variable is the current URL, and then step 703 is executed.
It should be noted that the execution timing of whether the white list in fig. 5 is executed is also applicable to fig. 7, and similarly, the execution timing of determining whether the white list operation is executed in fig. 7 is also applicable to fig. 5, which is not limited in this application.
When the statistical use data includes the URL, if the electronic appointment is the electronic appointment for the URL, the preset data analysis rule for the electronic appointment is called, and statistical analysis is performed on the electronic appointment use data, which may include detecting whether a restrictive web page exists in the stored URL. This allows for the administration of access-restricted web pages.
Correspondingly, if the electronic appointment is an electronic appointment aiming at the running time length and the closing of the system, the preset data analysis rule aiming at the electronic appointment is called, statistical analysis is carried out on the use data of the electronic appointment, and whether the current time exceeds the shutdown time specified by the electronic appointment or not can be determined; it is determined whether the total operational time duration of the system exceeds the total time duration specified by the electronic appointment. If the specified shutdown time is exceeded, the management and control terminal can be notified, and if the specified total duration is exceeded, the management and control terminal can also be notified.
Correspondingly, in order to protect the eyes of the user using the electronic terminal, in the embodiment of the application, after the operating time of the system is determined to be longer than the first set time, eye protection prompt information can be generated every second set time, and the eye protection prompt information is used for informing the user that the user should have a rest properly when the terminal is used for too long.
Further, in the embodiment of the application. In order to save resources, after the fact that the situation that the electronic contract is violated does not exist in the statistical result is determined, or after the violated electronic contract default alarm information is sent to the control client, the sleep state can be entered. In order to effectively control the electronic terminal in the dormant state, a data analysis timer can be further set in the application, so that execution is regularly performed for each electronic appointment: reading the usage data for the electronic appointment from the usage data; calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment; and outputting whether the condition of violating the electronic contract exists or not according to the statistical analysis result.
In order to facilitate understanding of the above solutions, the following describes a usage control method of an electronic terminal provided in the embodiments of the present application, taking an example of an electronic contract achieved by a teenager and a parent.
The embodiment of the application can comprise an appointment client used for generating the electronic contract and displaying the usage data statistics result, a server and a control terminal for displaying default alarm information. The client is appointed to operate on a terminal 1, and the control terminal is a terminal 2.
The parent and child begin the appointment first through the provisioning client's bootstrapping interface as in FIG. 8a, and then may jump to the provisioning page start appointment as shown in FIG. 8 b. In the appointment page shown in fig. 8b, the internet access duration, the power-off time, and the internet access duration and the power-off time on the weekend of the last study day may be appointed. After agreement is reached, the electronic contract is stored on the terminal 1. Then, in order to determine which management and control terminal is used for monitoring, after the agreement is reached, the agreement client may generate a management and control authorization identifier as shown in fig. 8c, and then the management and control terminal scans the management and control authorization identifier through a scanning function of the management and control terminal to perform binding. After the binding, the electronic terminal can push the management and control authorization identification code to the bound management and control terminal. And then, the monitoring of the electronic terminal of the teenager can be realized through the control terminal. The usage data collection may be performed subsequently with reference to fig. 6 and 7 as previously described, and the collected data may then be analyzed. As shown in fig. 9, analyzing whether a default exists may include the following steps:
step 901: and the electronic terminal reads the URL, and generates restrictive webpage warning information if the restrictive URL is determined to exist, wherein the restrictive webpage warning information comprises the user identification of the operating system and the violated electronic convention for accessing the restrictive webpage.
Step 902: and the electronic terminal sends the restrictive webpage alarm information to the server.
Step 903: and the server sends the restrictive webpage alarm information to the control terminal.
FIG. 10 is a diagram of the interface effect of the restricted web page warning message.
Step 904: the electronic terminal reads the shutdown time in the electronic contract, and if the current time of the operating system is greater than the shutdown time, delayed shutdown alarm information is generated, wherein the delayed shutdown alarm information comprises a user identifier of the operating system and the electronic contract of the shutdown time.
Step 905: and the electronic terminal sends the delayed shutdown alarm information to the server.
Step 906: and the server sends the delayed shutdown alarm information to the control terminal.
Step 907: the electronic terminal reads the total using time length in the electronic contract, if the total operating time length of the operating system in the current monitoring period exceeds the total using time length, overtime warning information is generated and sent, and the overtime warning information comprises the user identification of the operating system and the overtime electronic contract.
Step 908: and the electronic terminal sends the overtime alarm information to the server.
Step 909: and the server sends the online overtime alarm information to the control terminal.
The internet surfing timeout information displayed by the control terminal is shown in fig. 11.
In specific implementation, the use data and the statistical analysis result of the electronic terminal and the server can be synchronized, and after the use data, the data can be periodically synchronized to the server. Wherein the results of the statistical analysis can be classified by day and by week or even by month.
The following introduces interface display contents of the appointed client and the control terminal, which may include the following contents:
(1) and (3) interface display of the appointed client:
since it is daily counted whether the following teenagers comply with the electronic contract or not. Therefore, if the teenagers obey the electronic contract on the day, the parents can send star awards to the teenagers through the control terminal. The specific implementation is that the management and control terminal receives a request for sending the star reward, triggered by a user, to the appointed client, wherein the request comprises a date corresponding to the star reward. The appointment client may store the star award in association with the corresponding date after receiving the request. The appointment client can count the star rewards acquired in the current month in real time. And displayed in the week calendar. Fig. 12 is a diagram showing the effect of the appointed client on the total time of the day operation with the star reward and statistics.
(2) And (3) interface display of the control terminal:
at the control terminal, the user can check the date of the statistical data to be checked through the graph shown in fig. 13a to realize the control of the use data of the electronic terminal of the teenager.
The content that can be managed and controlled includes the total time length of using the terminal on the same day as shown in fig. 13b, and the total time length of using each application on the same day as shown in fig. 13 c.
Besides, parents and teenagers can also modify the electronic contract generated before, and after the electronic contract is modified, the electronic terminal can send a message to the control terminal to display, and the display effect is shown in fig. 13 d. Therefore, parents can conveniently know whether the electronic contract is illegally tampered or not in time.
Based on the same inventive concept, the embodiment of the application further provides a use control device of the electronic terminal. As shown in fig. 14, the apparatus includes:
a reading module 1401, configured to read an electronic contract for managing and controlling an electronic terminal; the electronic contract comprises at least one electronic contract;
the acquisition module 1402 is configured to invoke a data acquisition rule corresponding to the electronic contract, acquire the usage data of the electronic terminal, and store the usage data according to a preset rule;
an analysis module 1403, configured to perform, for each electronic appointment:
reading the usage data for the electronic appointment from the usage data;
calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment;
and outputting whether the condition of violating the electronic contract exists or not according to the statistical analysis result.
Further, the apparatus further comprises:
the generating module generates the electronic contract before the step of reading the electronic contract for managing and controlling the electronic terminal;
the generation module is specifically configured to:
displaying a leading page of the electronic contract;
after determining that an instruction for continuously generating the electronic contract is received, displaying a contract page of the electronic contract, wherein the contract page comprises electronic contract content and a configurable item corresponding to the electronic contract content;
and generating the electronic contract according to the selected configuration item.
Further, the generating module is further configured to generate a management and control authorization identifier according to the generated electronic contract after the step of generating the electronic contract, so that the management and control terminal receives the usage information of the electronic terminal and/or performs a management and control operation on the electronic terminal after establishing association with the electronic terminal through the management and control authorization identifier.
Further, the apparatus further comprises:
the user identifier obtaining module is used for obtaining the user identifier of the operating system of the electronic terminal under the condition that the statistical analysis result shows that the use of the electronic terminal violates the electronic convention after outputting whether the condition of violating the electronic convention exists according to the statistical analysis result;
and the default warning information generating module is used for generating default warning information carrying the user identification and the electronic appointment.
Further, the acquisition module comprises:
the application program duration acquisition unit is used for acquiring the data of the use duration of the application program running on the electronic terminal; and the number of the first and second groups,
and the network element time length acquisition unit is used for acquiring the data of the service time length of the webpage running on the electronic terminal.
Further, the application program duration acquisition unit is configured to:
receiving a system notification message of an electronic terminal, wherein the system notification message comprises a starting notification or a system awakening notification;
acquiring a current application program running on the electronic terminal, and recording the current time for running the current application program;
releasing processor resources;
entering a wakeup state after receiving a preset wakeup message;
if the preset wake-up message is the switching notification of the switching application program, determining the time length between the current time and the recorded time, taking the determined time length as the use time length of the recorded application program, and returning to execute the step of recording the current application program and the current time;
and if the preset awakening message is the awakening notice awakened by the first periodic awakening timer, determining the timing period of the first periodic awakening timer as the use duration of the recorded application program, and returning to the step of entering the sleep state after the recorded time is updated to be the current time.
Further, the network element duration acquisition unit is configured to:
recording the current uniform resource locator URL and the current time;
releasing processor resources;
entering a wakeup state after receiving a preset wakeup message;
if the preset wake-up message is the switching notification of the switching application program, determining the time length between the current time and the recorded time, taking the determined time length as the use time length of the recorded URL, and if the switched application program is still the browser, returning to the step of recording the current URL and the current time;
and if the preset wake-up message is a wake-up notice woken up by the second periodic wake-up timer, determining the timing period of the first periodic wake-up timer as the use duration of the recorded URL, and returning to the step of recording the current URL and the current time.
Further, the application duration acquisition unit and the network element duration acquisition unit are configured to determine that the recorded application program or URL is not in a preset white list before determining the duration between the current time and the recorded time.
Further, if the electronic appointment is an electronic appointment for the URL, the analysis module is specifically configured to detect whether a restrictive web page exists in the stored URL.
Further, if the electronic contract is an electronic contract for system operation duration and closing, the analysis module is specifically configured to:
determining whether the current time exceeds a shutdown time specified by the electronic convention; and the number of the first and second groups,
it is determined whether the total operational time duration of the system exceeds the total time duration specified by the electronic appointment.
Having described the usage management and control method and apparatus of an electronic terminal according to an exemplary embodiment of the present application, a computing apparatus according to another exemplary embodiment of the present application is described next.
As will be appreciated by one skilled in the art, aspects of the present application may be embodied as a system, method or program product. Accordingly, various aspects of the present application may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
In some possible implementations, a computing device according to the present application may include at least one processor, and at least one memory. Wherein the memory stores program code which, when executed by the processor, causes the processor to perform the steps of the usage management and control method of the electronic terminal according to various exemplary embodiments of the present application described above in the present specification. For example, the processor may perform steps 301-303 as shown in FIG. 15.
The computing device 150 according to this embodiment of the present application is described below with reference to fig. 15. The computing device 150 shown in fig. 15 is only an example and should not bring any limitations to the function and scope of use of the embodiments of the present application.
As shown in fig. 15, computing device 150 is embodied in the form of a general purpose computing device. Components of computing device 150 may include, but are not limited to: the at least one processor 151, the at least one memory 152, and a bus 153 connecting the various system components (including the memory 152 and the processor 151).
Bus 153 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, or a local bus using any of a variety of bus architectures.
The memory 152 may include readable media in the form of volatile memory, such as Random Access Memory (RAM)1321 and/or cache memory 1522, and may further include Read Only Memory (ROM) 1523.
Memory 152 may also include a program/utility 1525 having a set (at least one) of program modules 1524, such program modules 1524 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The computing device 150 may also communicate with one or more external devices 154 (e.g., keyboard, pointing device, etc.), may also communicate with one or more devices that enable a user to interact with the computing device 150, and/or may communicate with any devices (e.g., router, modem, etc.) that enable the computing device 150 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 155. Also, the computing device 150 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) through the network adapter 156. As shown, the network adapter 156 communicates with other modules for the computing device 150 over the bus 153. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the computing device 150, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
In some possible embodiments, various aspects of the usage control method of the electronic terminal provided by the present application may also be implemented in the form of a program product, which includes program code for causing a computer device to execute the steps in the usage control method of the electronic terminal according to various exemplary embodiments of the present application described above in this specification when the program product runs on the computer device, for example, the computer device may execute the steps 301 and 303 shown in fig. 3.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product for usage management and control of an electronic terminal of an embodiment of the present application may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a computing device. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user computing device, partly on the user equipment, as a stand-alone software package, partly on the user computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
It should be noted that although several units or sub-units of the apparatus are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, the features and functions of two or more units described above may be embodied in one unit, according to embodiments of the application. Conversely, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
Further, while the operations of the methods of the present application are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (15)

1. A method for managing and controlling the use of an electronic terminal is characterized by comprising the following steps:
reading an electronic contract for controlling the electronic terminal; the electronic contract comprises at least one electronic contract;
calling a data acquisition rule corresponding to the electronic contract, acquiring the use data of the electronic terminal and storing the use data according to a preset rule;
executing for each electronic appointment:
reading the usage data for the electronic appointment from the usage data;
calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment;
and outputting whether the condition of violating the electronic contract exists or not according to the statistical analysis result.
2. The method according to claim 1, characterized in that the step of reading an electronic contract for governing an electronic terminal is preceded by a step of generating the electronic contract, comprising:
displaying a leading page of the electronic contract;
after determining that an instruction for continuously generating the electronic contract is received, displaying a contract page of the electronic contract, wherein the contract page comprises electronic contract content and a configurable item corresponding to the electronic contract content;
and generating the electronic contract according to the selected configuration item.
3. The method of claim 2, further comprising, after the step of generating the electronic contract:
and generating a control authorization identification code according to the generated electronic contract so that the control terminal receives the service condition information of the electronic terminal after establishing the association with the electronic terminal through the control authorization identification code and/or executes the control operation on the electronic terminal.
4. The method as claimed in any one of claims 1 to 3, wherein after outputting whether there is a violation of the electronic contract according to the statistical analysis result, the method further comprises:
under the condition that the statistical analysis result shows that the use of the electronic terminal is against the electronic convention, acquiring a user identifier of an operating system of the electronic terminal;
and generating default alarm information carrying the user identification and the electronic appointment.
5. The method according to any one of claims 1-3, wherein the collecting usage data of the electronic terminal comprises:
acquiring data of the use duration of an application program running on the electronic terminal; and
and acquiring data of the service life of the webpage running on the electronic terminal.
6. The method according to claim 5, wherein the data collection of the usage duration of the application program running on the electronic terminal comprises:
receiving a system notification message of an electronic terminal, wherein the system notification message comprises a starting notification or a system awakening notification;
acquiring a current application program running on the electronic terminal, and recording the current time for running the current application program;
releasing processor resources;
entering a wakeup state after receiving a preset wakeup message;
if the preset wake-up message is the switching notification of the switching application program, determining the time length between the current time and the recorded time, taking the determined time length as the use time length of the recorded application program, and returning to execute the step of recording the current application program and the current time;
and if the preset awakening message is the awakening notice awakened by the first periodic awakening timer, determining the timing period of the first periodic awakening timer as the use duration of the recorded application program, and returning to the step of entering the sleep state after the recorded time is updated to be the current time.
7. The method according to claim 5, wherein the data collection of the usage duration of the web page running on the electronic terminal comprises:
recording the current uniform resource locator URL and the current time;
releasing processor resources;
entering a wakeup state after receiving a preset wakeup message;
if the preset wake-up message is the switching notification of the switching application program, determining the time length between the current time and the recorded time, taking the determined time length as the use time length of the recorded URL, and if the switched application program is still the browser, returning to the step of recording the current URL and the current time;
and if the preset wake-up message is a wake-up notice woken up by the second periodic wake-up timer, determining the timing period of the first periodic wake-up timer as the use duration of the recorded URL, and returning to the step of recording the current URL and the current time.
8. The method of claim 6 or 7, wherein prior to determining the length of time between the current time and the recorded time, the method further comprises:
and determining that the recorded application program or URL is not in a preset white list.
9. The method according to claim 7, wherein if the electronic appointment is an electronic appointment for a URL, the step of invoking a preset data analysis rule for the electronic appointment to perform statistical analysis on the usage data of the electronic appointment comprises:
it is detected whether a restrictive web page is present in the stored URL.
10. The method according to claim 1, wherein if the electronic contract is an electronic contract for system operation duration and shutdown, the step of calling a preset data analysis rule for the electronic contract to perform statistical analysis on the usage data of the electronic contract comprises:
determining whether the current time exceeds a shutdown time specified by the electronic convention; and the number of the first and second groups,
it is determined whether the total operational time duration of the system exceeds the total time duration specified by the electronic appointment.
11. An electronic terminal usage management and control apparatus, comprising:
the reading module is used for reading an electronic contract used for controlling the electronic terminal; the electronic contract comprises at least one electronic contract;
the acquisition module is used for calling a data acquisition rule corresponding to the electronic contract, acquiring the use data of the electronic terminal and storing the use data according to a preset rule;
an analysis module to perform, for each electronic appointment:
reading the usage data for the electronic appointment from the usage data;
calling a preset data analysis rule aiming at the electronic appointment, and carrying out statistical analysis on the use data of the electronic appointment;
and outputting whether the condition of violating the electronic contract exists or not according to the statistical analysis result.
12. The apparatus of claim 11, further comprising:
the generating module generates the electronic contract before the step of reading the electronic contract for managing and controlling the electronic terminal;
the generation module is specifically configured to:
displaying a leading page of the electronic contract;
after determining that an instruction for continuously generating the electronic contract is received, displaying a contract page of the electronic contract, wherein the contract page comprises electronic contract content and a configurable item corresponding to the electronic contract content;
and generating the electronic contract according to the selected configuration item.
13. The apparatus of claim 12,
the generating module is further configured to generate a management and control authorization identification code according to the generated electronic contract after the step of generating the electronic contract, so that the management and control terminal receives the use condition information of the electronic terminal after establishing association with the electronic terminal through the management and control authorization identification code, and/or performs a management and control operation on the electronic terminal.
14. A computer-readable medium having stored thereon computer-executable instructions for performing the method of any one of claims 1-10.
15. A computing device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-10.
CN201811609952.8A 2018-12-27 2018-12-27 Electronic terminal use control method and device and storage medium Pending CN111381888A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811609952.8A CN111381888A (en) 2018-12-27 2018-12-27 Electronic terminal use control method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811609952.8A CN111381888A (en) 2018-12-27 2018-12-27 Electronic terminal use control method and device and storage medium

Publications (1)

Publication Number Publication Date
CN111381888A true CN111381888A (en) 2020-07-07

Family

ID=71222381

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811609952.8A Pending CN111381888A (en) 2018-12-27 2018-12-27 Electronic terminal use control method and device and storage medium

Country Status (1)

Country Link
CN (1) CN111381888A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115460581A (en) * 2022-09-13 2022-12-09 中国联合网络通信集团有限公司 Auxiliary terminal supervision method, supervision platform and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080288215A1 (en) * 2006-01-24 2008-11-20 Hawkgrove Technologies Limited Methods and Apparatus for Monitoring Software Systems
CN104360852A (en) * 2014-10-30 2015-02-18 北京数字天域科技股份有限公司 Application program management method and application program management device of mobile terminal
CN105357631A (en) * 2015-11-23 2016-02-24 东莞酷派软件技术有限公司 Terminal use time control method and associated equipment
CN105451217A (en) * 2014-09-24 2016-03-30 中兴通讯股份有限公司 Terminal device control method, terminal device and terminal device control system
CN105739690A (en) * 2016-01-25 2016-07-06 成都趣动力教育科技有限公司 Double-client control method, device and system
CN105893221A (en) * 2016-04-01 2016-08-24 广东欧珀移动通信有限公司 Terminal operation time length alarming method and device
US10019599B1 (en) * 2015-04-08 2018-07-10 Comigo Ltd. Limiting applications execution time
CN108322551A (en) * 2018-03-22 2018-07-24 丘阳 Based on parent end APP to the management-control method and its managing and control system of study generator terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080288215A1 (en) * 2006-01-24 2008-11-20 Hawkgrove Technologies Limited Methods and Apparatus for Monitoring Software Systems
CN105451217A (en) * 2014-09-24 2016-03-30 中兴通讯股份有限公司 Terminal device control method, terminal device and terminal device control system
CN104360852A (en) * 2014-10-30 2015-02-18 北京数字天域科技股份有限公司 Application program management method and application program management device of mobile terminal
US10019599B1 (en) * 2015-04-08 2018-07-10 Comigo Ltd. Limiting applications execution time
CN105357631A (en) * 2015-11-23 2016-02-24 东莞酷派软件技术有限公司 Terminal use time control method and associated equipment
CN105739690A (en) * 2016-01-25 2016-07-06 成都趣动力教育科技有限公司 Double-client control method, device and system
CN105893221A (en) * 2016-04-01 2016-08-24 广东欧珀移动通信有限公司 Terminal operation time length alarming method and device
CN108322551A (en) * 2018-03-22 2018-07-24 丘阳 Based on parent end APP to the management-control method and its managing and control system of study generator terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115460581A (en) * 2022-09-13 2022-12-09 中国联合网络通信集团有限公司 Auxiliary terminal supervision method, supervision platform and readable storage medium

Similar Documents

Publication Publication Date Title
CN109040316B (en) HTTP service processing method and device
KR102076892B1 (en) Method and apparatus for managing background application
CN110058889B (en) Application awakening method and device
US9867131B2 (en) Wake-up control method and apparatus, and terminal device
EP2830044B1 (en) Instruction processing method, apparatus, and system
US9491247B2 (en) Automatic capture of detailed analysis information based on remote server analysis
CN103106130B (en) A kind of software action data monitoring method of mobile terminal and system
US20150089262A1 (en) Heuristics based on backoff for power modes
CN102662818A (en) Server remote monitoring management method based on intelligent handheld equipment
US9311598B1 (en) Automatic capture of detailed analysis information for web application outliers with very low overhead
US20130055271A1 (en) Apparatus and method for controlling polling
JP7406010B2 (en) Baseline monitoring methods, devices, readable media, and electronic equipment
CN110933698A (en) Monitoring management method, device and equipment for Internet of things card
CN105281965B (en) Traffic acquisition method and device based on IOS (input/output system)
CN103444236A (en) Managing a portal application
CN111694677A (en) Message queue management method, device, terminal and computer-readable storage medium
CN110032321A (en) Applied program processing method and device, electronic equipment, computer readable storage medium
CN104980451B (en) Information prompting method and device
CN109992380A (en) Applied program processing method and device, electronic equipment, computer readable storage medium
CN102970355B (en) Carry out the method and apparatus of the capacity at management data center by hanging up tenant
CN111381888A (en) Electronic terminal use control method and device and storage medium
CN113542256A (en) Method, device, equipment and storage medium for updating login credentials in client
CN107231386A (en) Application state conversion method, device and mobile terminal
KR101890046B1 (en) Concurrent network application scheduling for reduced power consumption
CN108111565B (en) Message transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination