CN112702470A - Equipment monitoring method, device, equipment and storage medium - Google Patents

Equipment monitoring method, device, equipment and storage medium Download PDF

Info

Publication number
CN112702470A
CN112702470A CN202011478175.5A CN202011478175A CN112702470A CN 112702470 A CN112702470 A CN 112702470A CN 202011478175 A CN202011478175 A CN 202011478175A CN 112702470 A CN112702470 A CN 112702470A
Authority
CN
China
Prior art keywords
borrowing
target
protocol
equipment
monitored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011478175.5A
Other languages
Chinese (zh)
Inventor
杨东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goertek Optical Technology Co Ltd
Original Assignee
Goertek Optical Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goertek Optical Technology Co Ltd filed Critical Goertek Optical Technology Co Ltd
Priority to CN202011478175.5A priority Critical patent/CN112702470A/en
Publication of CN112702470A publication Critical patent/CN112702470A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a method, a device, equipment and a storage medium for monitoring equipment. The method is applied to the monitored equipment and comprises the following steps: obtaining a target borrowing protocol, wherein the target borrowing protocol comprises at least one group of borrowing subprotocols, and the borrowing subprotocols comprise: applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority; acquiring the current use state of the monitored equipment, wherein the current use state at least comprises an application identifier of an application running in a foreground; determining a target borrowing subprotocol in the target borrowing protocols according to the application identification of the application running in the foreground; and controlling the monitored equipment to execute decision operation corresponding to the target borrowing subprotocol under the condition that the current use state exceeds the authority corresponding to the target borrowing subprotocol. The method can ensure that the monitored equipment is safely used during the borrowing period.

Description

Equipment monitoring method, device, equipment and storage medium
Technical Field
The present application relates to the field of mobile terminals, and more particularly, to a device monitoring method, a device monitoring apparatus, a monitored device, and a computer-readable storage medium.
Background
With the development of science and technology, mobile phones have become important communication tools in people's lives.
At present, a mobile phone has a possibility of being borrowed by other people, and this causes the problems that privacy of the mobile phone is revealed, account money and money are transferred and the like in the process that a borrower uses the mobile phone after borrowing the mobile phone, especially in the process that the mobile phone is borrowed by the borrower and used outside the visual field range of the borrower, and further causes the safety of the mobile phone to be reduced.
Therefore, how to ensure the security of the mobile phone during borrowing becomes an urgent problem to be solved.
Disclosure of Invention
It is an object of the present application to provide a new solution for monitoring devices.
According to a first aspect of the present application, there is provided a device monitoring method, applied to a monitored device, including:
obtaining a target borrowing protocol, wherein the target borrowing protocol comprises at least one group of borrowing sub-protocols, and the borrowing sub-protocols comprise: applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority;
acquiring the current use state of the monitored equipment, wherein the current use state at least comprises an application identifier of an application running in a foreground;
determining a target borrowing subprotocol in the target borrowing protocols according to the application identifier of the application running in the foreground;
and controlling the monitored equipment to execute decision operation corresponding to the target borrowing subprotocol under the condition that the current use state exceeds the authority corresponding to the target borrowing subprotocol.
Optionally, when the current usage state representation exceeds the right corresponding to the target borrowing subprotocol, after controlling the monitored device to execute a decision operation corresponding to the target borrowing subprotocol, the method further includes:
and reporting the current use state of the monitored equipment and/or the decision operation to the monitoring equipment.
Optionally, the method further includes:
receiving an instruction of executing target operation sent by monitoring equipment;
and executing the target operation according to the instruction for executing the target operation.
Optionally, the method further includes:
sending heartbeat information to the monitoring equipment according to a set time interval;
and controlling the monitored equipment to execute screen locking operation under the condition that a heartbeat reply sent by the monitoring equipment is not received in a target time period.
Optionally, the method further includes:
receiving an instruction of removing the borrowing protocol sent by the monitoring equipment;
and stopping executing the step of acquiring the current use state of the monitored equipment according to the instruction of borrowing removal protocol.
Optionally, after obtaining the target borrowing protocol, the method further includes:
and sending the target borrowing protocol to the monitoring equipment.
Optionally, the obtaining the target borrowing protocol includes:
displaying at least one borrowing protocol;
receiving a selected instruction;
and acquiring the target borrowing protocol according to the selected instruction.
Optionally, the obtaining the target borrowing protocol includes:
providing a user-defined borrowing protocol interface;
and acquiring a custom borrowing protocol input through the interface to take the custom borrowing protocol as a target borrowing protocol.
According to a second aspect of the present application, there is provided a monitoring apparatus of a device, the apparatus comprising:
a first obtaining module, configured to obtain a target borrowing protocol, where the target borrowing protocol includes at least one group of borrowing sub-protocols, and the borrowing sub-protocols include: applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority;
a second obtaining module, configured to obtain a current usage state of the monitored device, where the current usage state at least includes an application identifier of an application running in a foreground;
a determining module, configured to determine a target borrowing subprotocol in the target borrowing protocols according to the application identifier of the application running in the foreground;
and the control module is used for controlling the monitored equipment to execute decision operation corresponding to the target borrowing subprotocol under the condition that the current use state exceeds the authority corresponding to the target borrowing subprotocol.
According to a third aspect of the present application, there is provided a monitored device comprising the apparatus of the second aspect; alternatively, the first and second electrodes may be,
comprising a memory for storing computer instructions and a processor for invoking the computer instructions from the memory for performing the method according to any of the first aspects.
According to a fourth aspect of the present application, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method according to any one of the first aspects.
In the embodiment of the application, by acquiring a target borrowing protocol, the target borrowing protocol comprises at least one group of borrowing sub-protocols, and the borrowing sub-protocols comprise: applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority; acquiring the current use state of the monitored equipment, wherein the current use state at least comprises an application identifier of an application running in a foreground; determining a target borrowing subprotocol in the target borrowing protocols according to the application identification of the application running in the foreground; and controlling the monitored equipment to execute decision operation corresponding to the target borrowing subprotocol under the condition that the current use state exceeds the authority corresponding to the target borrowing subprotocol. In this way, the current using state of the monitored device is monitored, whether the current using state exceeds the authority is judged by using the target borrowing protocol, and if the current using state exceeds the authority, the borrowed person is restrained by using the target borrowing protocol, so that the monitored device can be safely used during the borrowing.
Further features of the present application and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which is to be read in connection with the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a block diagram of a hardware configuration of a monitored device for implementing a monitoring method of the device according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a monitoring method for a device according to an embodiment of the present application;
FIG. 3 is a schematic structural diagram of a monitoring device of an apparatus according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a monitored device according to an embodiment of the present application.
Detailed Description
Various exemplary embodiments of the present application will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present application unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the application, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
< hardware configuration embodiment >
Fig. 1 is a block diagram of a hardware configuration of a monitored device, which implements a monitoring method of the device according to an embodiment of the present application.
The monitored device 1000 may typically be a smartphone, tablet computer, or the like.
The monitored device may include a processor 1100, a memory 1200, an interface device 1300, a communication device 1400, a display device 1500, an input device 1600, a speaker 1700, and a microphone 1800, among others.
The processor 1100 may be a central processing unit CPU, a microprocessor MCU, or the like. The memory 1200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 1300 includes, for example, a USB interface, a headphone interface, and the like. Communication device 1400 is capable of wired or wireless communication, for example. The display device 1500 is, for example, a liquid crystal display panel, a touch panel, or the like. The input device 1600 may include, for example, a touch screen, a keyboard, and the like. A user can input/output voice information through the speaker 1700 and the microphone 1800.
Although a plurality of devices are shown in fig. 1 for each monitored apparatus 1000, the present application may refer to only some of the devices, for example, the monitored apparatus 1000 refers to only the memory 1200 and the processor 1100.
In an embodiment of the present application, the memory 1200 of the monitored device 1000 is used for storing instructions for controlling the processor 1100 to execute the monitoring method of the device provided in the embodiment of the present application.
In the above description, the skilled person can design the instructions according to the solution disclosed in the present application. How the instructions control the operation of the processor is well known in the art and will not be described in detail herein.
< method examples >
The embodiment of the present application provides a device monitoring method, which is applied to the monitored device 1000 shown in fig. 1, and the execution subject of the method may be the monitored device 1000 shown in fig. 1.
As shown in fig. 2, the monitoring method of the device provided in the embodiment of the present application includes the following steps S2100 to S2400:
s2100, obtaining a target borrowing protocol.
The target borrowing protocol comprises at least one group of borrowing subprotocols, and the borrowing subprotocols comprise: and applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority.
In the embodiments of the present application, the borrowing protocol is used to specify which applications can be used by the borrower, which operations are allowed to be performed when the applications can be used or for how long, which operations will be performed by the monitored device beyond the scope specified by the borrowing protocol, and so on. On the basis, the borrowing protocol can be defined according to actual requirements.
On the basis of the above, the borrowing protocol comprises at least one group of borrowing sub-protocols. One set of borrowing sub-protocols may include: and applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority. The authority is used for describing whether the corresponding application can be used or not, and when the corresponding application can be used, the authority is also used for describing the operation allowed to be executed, or the accumulated time length of the use, the number of times of running in the foreground and the like.
In one example, taking an application as an application of transferring money as an example, the permissions in the borrowed sub-agreement corresponding to the application may be exemplified as: the checking is prohibited, only checked, checked and executable receiving transfer operation and the like, and the corresponding decision operation executed by the monitoring device after exceeding the authority can be: forcibly quitting the application, locking the screen, outputting prompt information of the do not require operation and the like.
In another example, taking an application as an application for playing video as an example, the right to borrow the sub-protocol corresponding to the application may be exemplified as follows: video selection operations, no appreciation, no exit, etc. can be performed only once. The corresponding decision operation executed by the monitoring device after exceeding the right may be: forcibly quitting the application, locking the screen, outputting prompt information of the do not require operation and the like.
It should be noted that all applications in the monitored device do not need to have a corresponding borrowing sub-protocol. If not, the corresponding application is regarded as freely usable by the borrower.
In one embodiment of the application, a plurality of groups of borrowing protocols are displayed on the monitored equipment, and the plurality of groups of borrowing protocols are established according to user habits. The borrowed person can select one borrowing protocol from the plurality of groups of borrowing protocols, and the borrowed device takes the selected borrowing protocol as a target borrowing protocol. On this basis, the above S2100 may be implemented by S2110 to S2112 as follows:
and S2110, displaying at least one borrowing protocol.
S2111, receiving a selected instruction.
And S2112, acquiring the target borrowing protocol according to the selected instruction.
In another embodiment of the present application, the target borrowing protocol may be customized by the borrower. Thus, the individual requirements of the borrowed person can be met. On this basis, the above S2100 may be implemented by S2120 and S2121 as follows:
and S2120, providing a custom borrowing protocol interface.
S2121, obtaining a custom borrowing protocol input through an interface, and taking the custom borrowing protocol as a target borrowing protocol.
S2200, acquiring the current use state of the monitored equipment.
Wherein the current usage state comprises at least an identification of the foreground-running application.
In the embodiment of the application, the current use state of the monitored device can reflect the condition that the monitored device is used by the borrower. The current usage state at least includes an identifier of an application running in the foreground of the monitored device, that is, an identifier of an application displayed on a current page of the monitored device.
Further, the current usage state may further include currently executed operations, an accumulated time length for running the foreground application, an accumulated number of times that the foreground application is run by the foreground, and the like.
It should be noted that the specific content of the current usage status of the monitored device may depend on the rights specified in the borrowing protocol.
S2300, determining a target subprotocol in the target borrowing protocol according to the application identifier of the application operated in the foreground.
In this embodiment of the present application, the specific implementation of S2300 may be: and searching for a borrowed sub-protocol corresponding to the application identifier matched with the application identifier of the foreground running application in the target borrowing protocol according to the application identifier of the foreground running application. And determining the searched borrowed subprotocol as a target subprotocol.
It should be noted that, if the target borrowing protocol does not include the borrowing sub-protocol matching the application identifier of the application running in the foreground, the application running in the foreground can be regarded as being freely used.
S2400, under the condition that the current use state exceeds the authority corresponding to the target borrowing subprotocol, controlling the monitored equipment to execute decision operation corresponding to the target borrowing subprotocol.
In the embodiment of the application, the current use state is compared with the authority corresponding to the target borrowing subprotocol, and the monitored equipment is controlled to execute the decision operation corresponding to the target borrowing subprotocol under the condition that the current use state exceeds the authority corresponding to the target borrowing subprotocol.
In one example, if the target borrowing sub-protocol is in a use prohibition condition, the current use state is determined to exceed the corresponding permission of the target borrowing sub-protocol.
And if the current use state indicates that the application running in the foreground is accumulated and run for 31min, the corresponding authority in the target sub-borrowing protocol is available, but the use duration is not allowed to exceed 30min, determining that the current use state exceeds the authority corresponding to the target borrowing sub-protocol.
In the embodiment of the application, when the current use state exceeds the authority corresponding to the target borrowing subprotocol, the monitored equipment is controlled to execute the decision operation corresponding to the target borrowing subprotocol. For example, if the decision operation executed by the monitored equipment after exceeding the authority corresponding to the target borrowing subprotocol is screen locking, the monitored equipment is controlled to execute screen locking operation.
Corresponding to the above S2400, if the current usage state does not exceed the right corresponding to the target borrowing subprotocol, the monitored device operates according to the instruction of the borrower.
In the embodiment of the application, by acquiring a target borrowing protocol, the target borrowing protocol comprises at least one group of borrowing sub-protocols, and the borrowing sub-protocols comprise: applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority; acquiring the current use state of the monitored equipment, wherein the current use state at least comprises an application identifier of an application running in a foreground; determining a target borrowing subprotocol in the target borrowing protocols according to the application identification of the application running in the foreground; and controlling the monitored equipment to execute decision operation corresponding to the target borrowing subprotocol under the condition that the current use state exceeds the authority corresponding to the target borrowing subprotocol. In this way, the current using state of the monitored device is monitored, whether the current using state exceeds the authority is judged by using the target borrowing protocol, and if the current using state exceeds the authority, the borrowed person is restrained by using the target borrowing protocol, so that the monitored device can be safely used during the borrowing.
In an embodiment, after the foregoing S2400, the monitoring method for a device provided in the embodiment of the present application further includes the following S2500:
and S2500, reporting the current use state and/or decision operation of the monitored equipment to the monitoring equipment.
In an embodiment of the application, the monitoring device is an electronic device carried by the borrower, such as a smart watch or a smart bracelet.
In an embodiment of the present application, the monitored device reports the current usage state and the decision operation of the monitored device to the monitoring device when determining that the current usage state exceeds the right corresponding to the target borrowed subprotocol based on the foregoing S2400. And under the condition that the current use state does not exceed the authority corresponding to the target borrowing subprotocol, periodically reporting the current use state of the monitored equipment to the monitoring equipment.
In another embodiment of the present application, the borrowed person may send an indication to the monitored device based on the monitoring device to instruct the monitored device to report the current usage status and/or decision operation of the monitored device. On this basis, after the monitored device receives the indication, the current use state and/or decision operation of the monitoring device are reported to the monitoring device.
In addition, the monitoring equipment determines that the current use state exceeds the corresponding authority of the target borrowing subprotocol under the condition of receiving the decision operation reported by the monitored equipment. At this point, the monitoring device may alert to strongly remind the borrowed. The alarm mode can be vibration, voice, flash, etc.
In the embodiment of the application, the borrowed person can know the current use state of the monitored device and/or the decision operation of the monitored device through the monitoring device.
In one embodiment, the monitoring method of the device provided in the embodiment of the present application further includes the following steps S2610 and S2611:
s2610, receiving an instruction that the monitoring device sends and executes target operation.
S2611, according to the instruction of executing the target operation, executing the target operation.
In one example, after the borrowed temporarily decides not to borrow the monitored equipment from the borrower according to the current use state reported by the monitored equipment, an instruction for executing the screen locking operation can be sent to the monitoring equipment. At this time, the monitored device recognizes the screen locking operation as a target operation, and executes the screen locking operation.
In another example, in the case that the borrower causes the monitored device to perform a decision operation of locking the screen due to false triggering, and the borrower determines to continue to use the monitored device by the borrower, the borrower may send an unlocking instruction on the side of the monitoring device. At this time, the monitored device recognizes the unlocking operation as a target operation, and executes the unlocking operation.
In the embodiment of the application, the borrowed person can send the instruction for executing the target operation to the monitored device through the monitoring device so as to further realize the monitoring of the monitored device.
In one embodiment, the monitoring method of the device provided by the present application further includes the following S2710 and S2711:
and S2710, sending heartbeat information to the monitoring equipment according to the set time interval.
In this embodiment, in order to implement monitoring and further control of the monitored device by the monitoring device, the monitored device may send heartbeat information to the monitoring device at a set time interval to notify that the monitored device and the monitored device are in a communicable state. The set time interval can be determined according to actual requirements.
S2711, controlling the monitored equipment to execute the screen locking operation under the condition that the heartbeat reply sent by the monitoring equipment is not received in the target time period.
In this embodiment of the application, the target time period is a time period from a time when the monitored device newly transmits a heartbeat to a time when a heartbeat reply based on the newly transmitted heartbeat feedback by the monitoring device is received at the latest.
In the embodiment of the application, under the condition that the heartbeat reply sent by the monitoring device is not received in the target time period, the monitored device determines that the communication connection with the monitoring device is disconnected, and the monitored device is separated from the monitoring of the monitoring device. At this time, the monitored equipment performs the screen locking operation, thereby realizing the prohibition of the use by the borrower. In this way, the security of the monitored device during borrowing can be further ensured.
In an embodiment, the monitoring method of the device provided in the embodiment of the present application further includes the following steps S2810 and S2811:
s2810, receiving an instruction of borrowing cancellation protocol sent by the monitoring equipment.
S2811, according to the instruction of borrowing cancellation, stopping executing the step of obtaining the current using state of the monitored equipment.
In the embodiment of the present application, in the case where the borrower decides to leave the borrowed free to use the monitored device, or the borrowed ends the borrowing of the own monitored device by the borrower, an instruction to release the borrowing protocol is transmitted to the monitored device by the monitoring device. At this time, the monitored device receives the instruction of borrowing cancellation protocol sent by the monitoring device. Further, the monitored device stops executing the step of acquiring the current use state of the monitored device according to the instruction of borrowing removal protocol, namely the monitored device quits monitoring the current use state of the monitored device.
In an embodiment, after S2100, the monitoring method of the device provided in this embodiment further includes the following S2130:
s2130, sending the target borrowing protocol to the monitoring equipment.
In the embodiment of the present application, the monitored device is further configured to send the target borrowing protocol to the monitoring device. In this way, the borrowed can further know the use authority of the borrower on the monitored equipment according to the target borrowing protocol.
< apparatus embodiment >
The embodiment of the present application provides a monitoring apparatus 3000 of a device, as shown in fig. 3, the apparatus 3000 includes: a first obtaining module 3100, a second obtaining module 3200, a determining module 3300, and a control module 3400. Wherein:
the first obtaining module 3100 is configured to obtain a target borrowing protocol, where the target borrowing protocol includes at least one group of borrowing sub-protocols, and the borrowing sub-protocols include: and applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority.
A second obtaining module 3200, configured to obtain a current usage state of the monitored device, where the current usage state at least includes an application identifier of an application running in a foreground.
The determining module 3300 is configured to determine a target borrowing subprotocol in the target borrowing protocols according to the application identifier of the foreground-running application.
The control module 3400 is configured to control the monitored device to perform a decision operation corresponding to the target borrowing sub-protocol if the current usage state exceeds the authority corresponding to the target borrowing sub-protocol.
In one embodiment, the apparatus 3000 further comprises a reporting module. The reporting module is configured to report the current usage state of the monitored device and/or the decision operation to the monitoring device.
In one embodiment, the apparatus 3000 further comprises a receiving module and an executing module. Wherein:
the receiving module is used for receiving an instruction of executing target operation sent by the monitoring equipment.
The execution module is used for executing the target operation according to the instruction for executing the target operation.
In one embodiment, the apparatus 3000 further comprises a transmitting module. Wherein:
the sending module is used for sending heartbeat information to the monitoring equipment according to a set time interval.
In this embodiment, the control module 3400 is further configured to control the monitored device to perform a screen locking operation when a heartbeat reply sent by the monitoring device is not received within a target time period.
In one embodiment, the receiving module is further configured to receive an indication of the borrowing cancellation protocol sent by the monitoring device.
In this embodiment, the executing module is further configured to stop executing the step of acquiring the current usage state of the monitored device according to the instruction of borrowing elimination protocol.
In one embodiment, the sending module is further configured to send the target borrowing protocol to a monitoring device.
In one embodiment, the acquisition module 3100 includes a display unit, a receiving unit, and a first acquisition unit. Wherein:
the display unit is used for displaying at least one borrowing protocol.
The receiving unit is used for receiving the selected instruction.
The obtaining unit is used for obtaining the target borrowing protocol according to the selected instruction.
In one embodiment, the acquisition module 3100 includes a providing unit and a second acquisition unit. Wherein:
the providing unit is used for providing a custom borrowing protocol interface.
The second acquisition unit is used for acquiring the custom borrowing protocol input through the interface so as to take the custom borrowing protocol as a target borrowing protocol.
< apparatus embodiment >
The embodiment of the present application provides a monitored device 1000, and the monitored device 1000 includes a monitoring apparatus 3000 of the device shown in fig. 3.
Alternatively, as shown in fig. 4, a memory 1200 and a processor 1100 are included. The memory 1200 is used for storing computer instructions, and the processor 1100 is used for calling the computer instructions from the memory 1200 to execute the method according to any one of the above method embodiments.
< storage Medium embodiment >
An embodiment of the application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method according to any one of the method embodiments provided above.
The present application may be a system, method and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present application.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present application may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry can execute computer-readable program instructions to implement aspects of the present application by utilizing state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present application are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, by software, and by a combination of software and hardware are equivalent.
Having described embodiments of the present application, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terms used herein were chosen in order to best explain the principles of the embodiments, the practical application, or technical improvements to the techniques in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the application is defined by the appended claims.

Claims (11)

1. A monitoring method of equipment, which is applied to monitored equipment and comprises the following steps:
obtaining a target borrowing protocol, wherein the target borrowing protocol comprises at least one group of borrowing sub-protocols, and the borrowing sub-protocols comprise: applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority;
acquiring the current use state of the monitored equipment, wherein the current use state at least comprises an application identifier of an application running in a foreground;
determining a target borrowing subprotocol in the target borrowing protocols according to the application identifier of the application running in the foreground;
and controlling the monitored equipment to execute decision operation corresponding to the target borrowing subprotocol under the condition that the current use state exceeds the authority corresponding to the target borrowing subprotocol.
2. The method according to claim 1, wherein after controlling the monitored device to perform a decision operation corresponding to the target borrowing sub-protocol in the case that the current usage status representation exceeds the authority corresponding to the target borrowing sub-protocol, the method further comprises:
and reporting the current use state of the monitored equipment and/or the decision operation to the monitoring equipment.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
receiving an instruction of executing target operation sent by monitoring equipment;
and executing the target operation according to the instruction for executing the target operation.
4. The method of claim 1, further comprising:
sending heartbeat information to the monitoring equipment according to a set time interval;
and controlling the monitored equipment to execute screen locking operation under the condition that a heartbeat reply sent by the monitoring equipment is not received in a target time period.
5. The method of claim 1, further comprising:
receiving an instruction of removing the borrowing protocol sent by the monitoring equipment;
and stopping executing the step of acquiring the current use state of the monitored equipment according to the instruction of borrowing removal protocol.
6. The method of claim 1, wherein after the obtaining a target borrowing protocol, the method further comprises:
and sending the target borrowing protocol to the monitoring equipment.
7. The method of claim 1, wherein obtaining a target borrowing protocol comprises:
displaying at least one borrowing protocol;
receiving a selected instruction;
and acquiring the target borrowing protocol according to the selected instruction.
8. The method of claim 1, wherein obtaining a target borrowing protocol comprises:
providing a user-defined borrowing protocol interface;
and acquiring a custom borrowing protocol input through the interface to take the custom borrowing protocol as a target borrowing protocol.
9. An apparatus for monitoring a device, the apparatus comprising:
a first obtaining module, configured to obtain a target borrowing protocol, where the target borrowing protocol includes at least one group of borrowing sub-protocols, and the borrowing sub-protocols include: applying the identifier, the authority and the decision operation executed by the monitoring equipment after exceeding the authority;
a second obtaining module, configured to obtain a current usage state of the monitored device, where the current usage state at least includes an application identifier of an application running in a foreground;
a determining module, configured to determine a target borrowing subprotocol in the target borrowing protocols according to the application identifier of the application running in the foreground;
and the control module is used for controlling the monitored equipment to execute decision operation corresponding to the target borrowing subprotocol under the condition that the current use state exceeds the authority corresponding to the target borrowing subprotocol.
10. A monitored device, comprising the apparatus of claim 9; alternatively, the first and second electrodes may be,
comprising a memory for storing computer instructions and a processor for invoking the computer instructions from the memory to perform the method of any one of claims 1-8.
11. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the method according to any one of claims 1-8.
CN202011478175.5A 2020-12-15 2020-12-15 Equipment monitoring method, device, equipment and storage medium Pending CN112702470A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011478175.5A CN112702470A (en) 2020-12-15 2020-12-15 Equipment monitoring method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011478175.5A CN112702470A (en) 2020-12-15 2020-12-15 Equipment monitoring method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112702470A true CN112702470A (en) 2021-04-23

Family

ID=75508125

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011478175.5A Pending CN112702470A (en) 2020-12-15 2020-12-15 Equipment monitoring method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112702470A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485142A (en) * 2016-09-30 2017-03-08 维沃移动通信有限公司 A kind of application program of mobile terminal runs authority treating method and apparatus
CN110032431A (en) * 2018-01-12 2019-07-19 广东欧珀移动通信有限公司 Application processing method and device, electronic equipment, computer readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485142A (en) * 2016-09-30 2017-03-08 维沃移动通信有限公司 A kind of application program of mobile terminal runs authority treating method and apparatus
CN110032431A (en) * 2018-01-12 2019-07-19 广东欧珀移动通信有限公司 Application processing method and device, electronic equipment, computer readable storage medium

Similar Documents

Publication Publication Date Title
CN103313216B (en) Message prompt method, system and device for communication account
KR102082347B1 (en) Electronic device and method for transmitting notification information
CN105094630B (en) The prompt information processing method and device of application program PUSH message
CN106664301B (en) Mobile device and control method thereof
KR20140127123A (en) Apparatus and method for notifying information of security in electric device and computer-readable recording medium for the same
CN112311824A (en) Attendance information processing method and related device
EP2759892A1 (en) Synchronization of Alarms between Devices
US11070577B2 (en) Data determination device, data determination method, and data determination program
CN110881211A (en) Power saving method, device, storage medium and terminal
US10897512B2 (en) Generating push notifications
US10419876B2 (en) Secure mobile device recovery
US9571992B1 (en) Priority message management
US9245255B2 (en) Method and a system for monitoring an activity or lack of activity of a subject
Jovanovic et al. SOSerbia: Android‐Based Software Platform for Sending Emergency Messages
CN112702470A (en) Equipment monitoring method, device, equipment and storage medium
CN106210245B (en) A kind of setting method and its device of portable terminal do-not-disturb mode
CN108882207A (en) The implementation method and device of near field Trigger Function
CN104660480B (en) A kind of method, apparatus and system of account number abnormality processing
CN115190000A (en) Alarm data processing method and device, electronic equipment and storage medium
CN109076008A (en) Inhibit the instruction of the communication to arrival in the user interface
US9947197B2 (en) Alerting system and method for portable electronic device
US9774686B1 (en) Transaction tracking and monitoring
CN114707951A (en) Alarm situation big data management method, device, equipment and storage medium
KR101919243B1 (en) Method and system for perceiving the violence
WO2017049317A1 (en) Secure data link for subscriber identification module (sim)-based processor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210423