CN113098699A - User information distribution and pairing method facing intelligent terminal - Google Patents
User information distribution and pairing method facing intelligent terminal Download PDFInfo
- Publication number
- CN113098699A CN113098699A CN202110339738.0A CN202110339738A CN113098699A CN 113098699 A CN113098699 A CN 113098699A CN 202110339738 A CN202110339738 A CN 202110339738A CN 113098699 A CN113098699 A CN 113098699A
- Authority
- CN
- China
- Prior art keywords
- user information
- terminal
- strategy
- binding
- executing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1818—Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computational Linguistics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for distributing and binding user information facing an intelligent terminal, which is characterized by comprising the following steps: s100: defining a database structure, including a definition policy table, a definition user information table, a definition terminal table and a definition binding table; s200: setting a pairing strategy, including setting a strategy table, a user information table, a terminal table and a binding table in a database; s300: executing a pairing policy and distributing user information, comprising the steps of: s301: starting a working thread of a strategy; s302: acquiring and recording the current time; s303: acquiring all elements in a policy table, and recording as a policy set; s304: judging whether the current strategy set contains elements, if so, executing step S305, otherwise, executing step S307; s305: traversing the strategy set, recording as a strategy set _ element when the element exists, and executing S307 when the element does not exist; s306: executing a pairing strategy and distributing user information; s307: and executing the sleep operation according to the preset sleep duration, and executing the step S302.
Description
Technical Field
The invention belongs to the field of network communication and artificial intelligence network conferences, and relates to an intelligent terminal-oriented user information distribution and pairing method.
Background
In network communication and artificial intelligent network conferences, the most basic method for ensuring the system safety is to verify the login of a user, namely, whether the user is allowed to enter the system is judged by whether a password is matched with an account or not. The technical scheme in the prior art is that accounts with different authorities are created to limit user authorities, and corresponding authorities and functions are enabled or shielded according to the authorities of login users, so that the login security verification is completed.
However, the technical solution in the prior art only passes software authentication, and although the technical solution is relatively general and general, the defects and shortcomings of the technical solution become more and more obvious as the application scenario expands. For example: when holding a video conference or setting a desktop nameplate of an offline conference, client hardware and specified user information need to be bound one by one. However, the current solutions are generally: (1) the method has the advantages that accounts with certain authority can be appointed to log in, all accounts with the authority can log in the client, a user cannot be accurately appointed to match with a terminal, and when a large amount of equipment user information is rapidly configured in batches, the workload of a network conference manager can be greatly increased through the user login mode, so that the labor waste is caused; (2) if the login account is bound with the MAC address of the terminal, the appointed terminal can only log in through the appointed account, and the waste of hardware resources is caused.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides a method for distributing and pairing user information facing an intelligent terminal, which realizes the purposes of distributing and pairing the user information facing the intelligent terminal by defining a database structure, setting a pairing strategy, executing the pairing strategy and distributing the user information, and comprises the following steps:
s100: defining a database structure, including a definition policy table, a definition user information table, a definition terminal table and a definition binding table;
s200: setting a pairing strategy, including setting a strategy table, a user information table, a terminal table and a binding table in a database;
s300: executing a pairing policy and distributing user information, comprising the steps of:
s301: starting a working thread of a strategy;
s302: acquiring and recording the current time;
s303: acquiring all elements in a policy table, and recording as a policy set;
s304: judging whether the current strategy set contains elements, if so, executing step S305, otherwise, executing step S307;
s305: traversing the strategy set, recording as a strategy set _ element when the element exists, and executing S307 when the element does not exist;
s306: executing a pairing strategy and distributing user information;
s307: and executing the sleep operation according to the preset sleep duration, and executing the step S302.
Preferably, the step S100 includes the steps of:
s101: defining a policy table: creating a data table of a strategy in a database, wherein the strategy comprises that a designated user and a terminal participate in a conference together within a designated time, and the data table of the strategy comprises a strategy id, working content, starting time and ending time;
s102: defining a user information table: creating a data table of user information in a database for storing users logging in a system, wherein the data table of the user information comprises a user information id, a user name, a password field and a user contact way;
s103: defining a terminal table: creating a data table of a terminal in a database for storing equipment bearing system software, wherein the data table of the terminal comprises a terminal MAC address and a terminal name;
s104: defining a binding table: creating a binding data table of the terminal and the user in the database to represent the binding state of the terminal and the user when the strategy is executed, wherein the binding data table of the terminal and the user comprises a strategy id, a user information id and a terminal MAC address.
Preferably, the step S200 includes the steps of:
s201: setting user information, comprising the following steps:
s2011: creating user information and recording the user information as target user information;
s2012: setting user information id, user name, password and user contact information of target user information, wherein the user contact information comprises a telephone number, a micro signal, a QQ number, a Skype user name, a msn user name and a mailbox;
s2013: inputting the target user information into a user information table;
s202: the data of the terminal are set, and the method comprises the following steps:
s2021: creating terminal data information and recording the terminal data information as a target terminal;
s2022: setting a terminal MAC address and a terminal name of a target terminal;
s2023: recording a target terminal into a terminal table;
s203: setting a policy, comprising the steps of:
s2031: creating policy data information and marking as a target policy;
s2032: setting a strategy id, strategy content, starting time and ending time of a target strategy;
s2033: recording the target strategy into a strategy table;
s2034: and binding the user information and the terminal name corresponding to the target strategy.
Preferably, the step S2034 comprises the steps of:
s20341: inquiring all elements of the terminal table, and recording as a terminal set;
s20342: inquiring all elements of the user information table, and recording as a user information set;
s20343: selecting a terminal needing to be bound from a terminal set;
s20344: selecting user information needing to be bound from the user information set;
s20345: creating binding data and marking as target binding;
s20346: the strategy id, the user information id and the terminal MAC address of the target binding respectively correspond to the strategy id of the target strategy, the user information id value of a user information set element and the terminal MAC address of a terminal set element;
s20347: recording the target binding into a binding table;
s20348: and finishing the setting of the strategy.
Preferably, the step S20343 comprises the steps of:
s203431: traversing the terminal set, recording as a terminal set _ element when an element exists, ending traversing the terminal set when the element does not exist, and executing the step S20348;
s203432: and judging whether the terminal set _ element is to be added into the target policy, if so, executing step S20344, otherwise, executing step 203431.
Preferably, the step S20344 comprises the steps of:
s203441: traversing the user information set, recording as a user information set _ element when an element exists, ending traversing the user information set when the element does not exist, and executing the step S20348;
s203442: and judging whether the user information set element is to be added into the target policy, if so, executing the step S20345, otherwise, executing the step S203441.
Preferably, the step S306 includes the steps of:
s3061: acquiring data corresponding to the strategy id of the strategy set element in a binding table according to the strategy id of the strategy set element, and recording the data as a binding association set;
s3062: judging whether the current time is equal to the starting time of the strategy set element, if so, executing a step S3063, otherwise, executing a step S3064;
s3063: starting a strategy;
s3064: judging whether the current time is equal to the starting time of the strategy set element minus the time advance, if so, executing a step S3065, otherwise, executing a step S307, wherein the time advance is a natural number which is more than 1 and has a unit of second;
s3065: notifying a user to execute a policy;
s3066: judging whether the current time is equal to the end time of the strategy set element, if so, executing a step S3067, otherwise, executing a step S307;
s3067: and unbinding and ending the strategy.
Preferably, the step S3063 includes the steps of:
s30631: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S3064 when the element does not exist;
s30632: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as binding strategy set element user information;
s30633: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30634: and setting a binding association set _ element _ terminal to only allow the binding association set _ element _ user information to log in, wherein the policy to be executed is a policy set _ element.
Preferably, the step S3067 includes the steps of:
s30671: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S307 when the element does not exist;
s30672: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as the binding association set element user information;
s30673: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30674: sending a notification to a user corresponding to the binding association set element user information according to the contact information of the user, wherein the notification comprises a notification that the current strategy is finished;
s30675: and releasing the association between the binding association set _ element _ terminal and the binding association set _ element _ user information, and exiting the current strategy and jumping to a login interface by the association set _ element _ terminal.
Preferably, the notification includes voice call and short message, WeChat message and push, QQ message, Skype message, msn message and mail notification according to different contact ways of the user.
The method has the beneficial effects that: a manager can independently define user information distribution and pairing strategies under different time, different scenes, different terminals and user groups, and screen out all user information and equipment required under corresponding scenes; the screened user information is paired and bound in advance according to the inherent characteristics of the terminal, once the paired and bound are formed, the appointed account can only log in the specific terminal, and the appointed terminal only supports the login of the specific account; when the strategy execution time is reached, the equipment is monopolized by the bound user; when the strategy is overdue, releasing the association between the terminal and the user; this forms automatic distribution, binding and unbinding of devices and accounts. Specifically, the method has the following beneficial effects:
1. the strategy can be established in batch, a plurality of scenes can be predefined, binding information can be distributed, and the working efficiency can be improved.
2. And the user information and the terminal are automatically paired according to the distribution strategy, so that the distribution is automatically completed, and the labor cost is saved.
3. When the strategy is overdue, the user information and the terminal are automatically unpaired, and the waste of hardware resources is avoided.
4. The user information and the terminal MAC address are bound in advance, so that the role and the authority of the terminal user are defined, and the terminal user and a manager can conveniently and quickly identify the target terminal.
Drawings
FIG. 1 is a general flow diagram of a method provided by the present invention;
FIG. 2 is a detailed flowchart of the method for executing the pairing policy and distributing the user information;
fig. 3 is a specific flowchart of unbinding and ending the policy in the method provided by the present invention.
Detailed Description
Fig. 1 shows a general flow chart of the method provided by the present invention. As shown in fig. 1, the method of the present invention comprises the steps of:
s100: defining a database structure, including a definition policy table, a definition user information table, a definition terminal table and a definition binding table;
step S100 includes the steps of:
s101: defining a policy table: establishing a data table of a strategy in a database, wherein the strategy comprises that a designated user and a terminal participate in a conference together within a designated time, and the data table of the strategy comprises a strategy id, working content, starting time and ending time;
s102: defining a user information table: creating a data table of user information in a database for storing users logging in a system, wherein the data table of the user information comprises a user information id, a user name, a password field and a user contact way;
s103: defining a terminal table: creating a data table of the terminal in a database for storing equipment bearing system software, wherein the data table of the terminal comprises a terminal MAC address and a terminal name;
s104: defining a binding table: and creating a binding data table of the terminal and the user in the database to represent the binding state of the terminal and the user when the strategy is executed, wherein the binding data table of the terminal and the user comprises a strategy id, a user information id and a terminal MAC address.
S200: setting a pairing strategy, including setting a strategy table, a user information table, a terminal table and a binding table in a database; step S200 includes the steps of:
s201: setting user information, comprising the following steps:
s2011: creating user information and recording the user information as target user information;
s2012: setting a user information id, a user name, a password and a user contact mode of the target user information, wherein the user contact mode comprises but is not limited to: telephone number, micro signal, QQ number, Skype user name, msn user name, mailbox and the like;
s2013: inputting the target user information into a user information table;
s202: the data of the terminal are set, and the method comprises the following steps:
s2021: creating terminal data information and recording the terminal data information as a target terminal;
s2022: setting a terminal MAC address and a terminal name of a target terminal;
s2023: recording a target terminal into a terminal table;
s203: setting a policy, comprising the steps of:
s2031: creating policy data information and marking as a target policy;
s2032: setting a strategy id, strategy content, starting time and ending time of a target strategy;
s2033: recording the target strategy into a strategy table;
s2034: and binding the user information and the terminal name corresponding to the target strategy. Step S2034 includes the steps of:
s20341: inquiring all elements of the terminal table, and recording as a terminal set;
s20342: inquiring all elements of the user information table, and recording as a user information set;
s20343: selecting a terminal needing to be bound from a terminal set; step S20343 includes the steps of:
s203431: traversing the terminal set, recording as a terminal set _ element when an element exists, ending traversing the terminal set when the element does not exist, and executing the step S20348;
s203432: and judging whether the terminal set _ element is to be added into the target policy, if so, executing step S20344, otherwise, executing step 203431.
S20344: selecting user information needing to be bound from the user information set; step S20344 includes the steps of:
s203441: traversing the user information set, recording as a user information set _ element when an element exists, ending traversing the user information set when the element does not exist, and executing the step S20348;
s203442: and judging whether the user information set element is to be added into the target policy, if so, executing the step S20345, otherwise, executing the step S203441.
S20345: creating binding data and marking as target binding;
s20346: the strategy id, the user information id and the terminal MAC address of the target binding respectively correspond to the strategy id of the target strategy, the user information id value of a user information set element and the terminal MAC address of a terminal set element;
s20347: recording the target binding into a binding table;
s20348: and finishing the setting of the strategy.
S300: executing a pairing policy and distributing user information, comprising the steps of:
s301: starting a working thread of a strategy;
s302: acquiring and recording the current time;
s303: acquiring all elements in a policy table, and recording as a policy set;
s304: judging whether the current strategy set contains elements, if so, executing step S305, otherwise, executing step S307;
s305: traversing the strategy set, recording as a strategy set _ element when the element exists, and executing S307 when the element does not exist;
s306: the pairing policy is executed and the user information is distributed. Fig. 2 shows a specific flowchart for executing the pairing policy and distributing the user information in the method provided by the present invention. As shown in fig. 2, step S306 includes the steps of:
s3061: acquiring data corresponding to the strategy id of the strategy set element in a binding table according to the strategy id of the strategy set element, and recording the data as a binding association set;
s3062: judging whether the current time is equal to the starting time of the strategy set element, if so, executing a step S3063, otherwise, executing a step S3064;
s3063: starting a strategy; step S3063 includes the steps of:
s30631: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S3064 when the element does not exist;
s30632: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as binding strategy set element user information;
s30633: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30634: and setting a binding association set _ element _ terminal to only allow the binding association set _ element _ user information to log in, wherein the policy to be executed is a policy set _ element.
S3064: judging whether the current time is equal to the starting time of the strategy set element minus the time advance, if so, executing a step S3065, otherwise, executing a step S307, wherein the time advance is a natural number which is more than 1 and has a unit of second;
in this embodiment, the time advance is set to 1 hour, i.e., 3600 seconds.
S3065: notifying a user to execute a policy;
s3066: judging whether the current time is equal to the end time of the strategy set element, if so, executing a step S3067, otherwise, executing a step S307;
s3067: and unbinding and ending the strategy. Fig. 3 shows a specific flowchart of unbinding and ending policy in the method provided by the present invention. As shown in fig. 3, step S3067 includes the steps of:
s30671: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S307 when the element does not exist;
s30672: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as the binding association set element user information;
s30673: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30674: and sending a notification to a user corresponding to the binding association set element user information according to the user contact information, wherein the notification comprises a notification that the current strategy is finished.
It should be understood that notifications include, but are not limited to, depending on the user's contact details: voice calls and short messages, WeChat messages and pushes, QQ messages, Skype messages, msn messages, mail notifications, and the like.
S30675: and releasing the association between the binding association set _ element _ terminal and the binding association set _ element _ user information, and exiting the current strategy and jumping to a login interface by the association set _ element _ terminal.
S307: and executing the sleep operation according to the preset sleep duration, and executing the step S302. In this embodiment, the sleep duration is set to 1 second.
The method provided by the invention solves the technical problem that no method for distributing and pairing the user information facing the intelligent terminal exists in the prior art.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations are possible to those skilled in the art in light of the above teachings, and that all such modifications and variations are intended to be included within the scope of the invention as defined in the appended claims.
Claims (10)
1. A method for distributing and pairing user information facing an intelligent terminal is characterized by comprising the following steps:
s100: defining a database structure, including a definition policy table, a definition user information table, a definition terminal table and a definition binding table;
s200: setting a pairing strategy, including setting a strategy table, a user information table, a terminal table and a binding table in a database;
s300: executing a pairing policy and distributing user information, comprising the steps of:
s301: starting a working thread of a strategy;
s302: acquiring and recording the current time;
s303: acquiring all elements in a policy table, and recording as a policy set;
s304: judging whether the current strategy set contains elements, if so, executing step S305, otherwise, executing step S307;
s305: traversing the strategy set, recording as a strategy set _ element when the element exists, and executing S307 when the element does not exist;
s306: executing a pairing strategy and distributing user information;
s307: and executing the sleep operation according to the preset sleep duration, and executing the step S302.
2. The method for distributing and pairing user information facing an intelligent terminal according to claim 1, wherein the step S100 comprises the following steps:
s101: defining a policy table: creating a data table of a strategy in a database, wherein the strategy comprises that a designated user and a terminal participate in a conference together within a designated time, and the data table of the strategy comprises a strategy id, working content, starting time and ending time;
s102: defining a user information table: creating a data table of user information in a database for storing users logging in a system, wherein the data table of the user information comprises a user information id, a user name, a password field and a user contact way;
s103: defining a terminal table: creating a data table of a terminal in a database for storing equipment bearing system software, wherein the data table of the terminal comprises a terminal MAC address and a terminal name;
s104: defining a binding table: creating a binding data table of the terminal and the user in the database to represent the binding state of the terminal and the user when the strategy is executed, wherein the binding data table of the terminal and the user comprises a strategy id, a user information id and a terminal MAC address.
3. The method for distributing and pairing user information facing an intelligent terminal according to claim 1, wherein the step S200 comprises the following steps:
s201: setting user information, comprising the following steps:
s2011: creating user information and recording the user information as target user information;
s2012: setting user information id, user name, password and user contact information of target user information, wherein the user contact information comprises a telephone number, a micro signal, a QQ number, a Skype user name, a msn user name and a mailbox;
s2013: inputting the target user information into a user information table;
s202: the data of the terminal are set, and the method comprises the following steps:
s2021: creating terminal data information and recording the terminal data information as a target terminal;
s2022: setting a terminal MAC address and a terminal name of a target terminal;
s2023: recording a target terminal into a terminal table;
s203: setting a policy, comprising the steps of:
s2031: creating policy data information and marking as a target policy;
s2032: setting a strategy id, strategy content, starting time and ending time of a target strategy;
s2033: recording the target strategy into a strategy table;
s2034: and binding the user information and the terminal name corresponding to the target strategy.
4. The method for distributing and pairing user information facing an intelligent terminal according to claim 3, wherein the step S2034 comprises the following steps:
s20341: inquiring all elements of the terminal table, and recording as a terminal set;
s20342: inquiring all elements of the user information table, and recording as a user information set;
s20343: selecting a terminal needing to be bound from a terminal set;
s20344: selecting user information needing to be bound from the user information set;
s20345: creating binding data and marking as target binding;
s20346: the strategy id, the user information id and the terminal MAC address of the target binding respectively correspond to the strategy id of the target strategy, the user information id value of a user information set element and the terminal MAC address of a terminal set element;
s20347: recording the target binding into a binding table;
s20348: and finishing the setting of the strategy.
5. The method for distributing and pairing user information facing an intelligent terminal according to claim 4, wherein the step S20343 comprises the following steps:
s203431: traversing the terminal set, recording as a terminal set _ element when an element exists, ending traversing the terminal set when the element does not exist, and executing the step S20348;
s203432: and judging whether the terminal set _ element is to be added into the target policy, if so, executing step S20344, otherwise, executing step 203431.
6. The method for distributing and pairing user information facing an intelligent terminal according to claim 4, wherein the step S20344 comprises the following steps:
s203441: traversing the user information set, recording as a user information set _ element when an element exists, ending traversing the user information set when the element does not exist, and executing the step S20348;
s203442: and judging whether the user information set element is to be added into the target policy, if so, executing the step S20345, otherwise, executing the step S203441.
7. The method for distributing and pairing user information towards an intelligent terminal according to claim 1, wherein the step S306 comprises the following steps:
s3061: acquiring data corresponding to the strategy id of the strategy set element in a binding table according to the strategy id of the strategy set element, and recording the data as a binding association set;
s3062: judging whether the current time is equal to the starting time of the strategy set element, if so, executing a step S3063, otherwise, executing a step S3064;
s3063: starting a strategy;
s3064: judging whether the current time is equal to the starting time of the strategy set element minus the time advance, if so, executing a step S3065, otherwise, executing a step S307, wherein the time advance is a natural number which is more than 1 and has a unit of second;
s3065: notifying a user to execute a policy;
s3066: judging whether the current time is equal to the end time of the strategy set element, if so, executing a step S3067, otherwise, executing a step S307;
s3067: and unbinding and ending the strategy.
8. The method for distributing and pairing user information towards an intelligent terminal according to claim 7, wherein the step S3063 includes the steps of:
s30631: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S3064 when the element does not exist;
s30632: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as binding strategy set element user information;
s30633: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30634: and setting a binding association set _ element _ terminal to only allow the binding association set _ element _ user information to log in, wherein the policy to be executed is a policy set _ element.
9. The method for distributing and pairing user information towards an intelligent terminal according to claim 7, wherein the step S3067 includes the steps of:
s30671: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S307 when the element does not exist;
s30672: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as the binding association set element user information;
s30673: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30674: sending a notification to a user corresponding to the binding association set element user information according to the contact information of the user, wherein the notification comprises a notification that the current strategy is finished;
s30675: and releasing the association between the binding association set _ element _ terminal and the binding association set _ element _ user information, and exiting the current strategy and jumping to a login interface by the association set _ element _ terminal.
10. The method for distributing and pairing user information towards an intelligent terminal according to claim 9, wherein the notification includes voice call and short message, WeChat message and push, QQ message, Skype message, msn message and mail notification according to different user contact ways.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110339738.0A CN113098699B (en) | 2021-03-30 | 2021-03-30 | Intelligent terminal-oriented user information distribution and pairing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110339738.0A CN113098699B (en) | 2021-03-30 | 2021-03-30 | Intelligent terminal-oriented user information distribution and pairing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113098699A true CN113098699A (en) | 2021-07-09 |
CN113098699B CN113098699B (en) | 2023-03-07 |
Family
ID=76670839
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110339738.0A Active CN113098699B (en) | 2021-03-30 | 2021-03-30 | Intelligent terminal-oriented user information distribution and pairing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113098699B (en) |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040123150A1 (en) * | 2002-12-18 | 2004-06-24 | Michael Wright | Protection of data accessible by a mobile device |
US20070180490A1 (en) * | 2004-05-20 | 2007-08-02 | Renzi Silvio J | System and method for policy management |
CN101651623A (en) * | 2009-09-07 | 2010-02-17 | 中兴通讯股份有限公司 | Generation method and device for access control list application |
CN101754090A (en) * | 2008-12-16 | 2010-06-23 | 中兴通讯股份有限公司 | Method and system for opening meetings when PC client is used for binding hard terminal |
CN102546464A (en) * | 2011-12-22 | 2012-07-04 | 华为技术有限公司 | Conference method and conference system crossing instant messaging (IM) system |
CN102932785A (en) * | 2011-08-12 | 2013-02-13 | 中国移动通信集团浙江有限公司 | Rapid authentication method, system and equipment of wireless local area network |
CN103426078A (en) * | 2012-05-26 | 2013-12-04 | 李正 | Paperless conference system and method based on internal working automation |
WO2014186628A1 (en) * | 2013-05-16 | 2014-11-20 | Iboss, Inc. | Location based network usage policies |
CN105246073A (en) * | 2015-08-28 | 2016-01-13 | 深圳市信锐网科技术有限公司 | Wireless network access authentication method and server |
US9258312B1 (en) * | 2010-12-06 | 2016-02-09 | Amazon Technologies, Inc. | Distributed policy enforcement with verification mode |
CN106878990A (en) * | 2017-01-16 | 2017-06-20 | 新华三技术有限公司 | A kind of information-pushing method and device |
CN107710247A (en) * | 2015-09-30 | 2018-02-16 | 谷歌有限责任公司 | Meeting comment establishment and shared system and method are carried out automatically using the context and close physical proximity of user |
CN108108893A (en) * | 2017-12-19 | 2018-06-01 | 江苏航天龙梦信息技术有限公司 | the seat management method of conference system |
US20180176270A1 (en) * | 2016-12-15 | 2018-06-21 | Cisco Technology, Inc. | Initiating a conferencing meeting using a conference room device |
CN109819195A (en) * | 2017-11-22 | 2019-05-28 | 重庆晋才富熙科技有限公司 | Wisdom conference system |
CN110602432A (en) * | 2019-08-23 | 2019-12-20 | 苏州米龙信息科技有限公司 | Conference system based on biological recognition and conference data transmission method |
CN111600724A (en) * | 2020-04-03 | 2020-08-28 | 深圳市会缤科技有限公司 | Intelligent conference seat management system and method |
CN111784250A (en) * | 2020-07-02 | 2020-10-16 | 四川巧夺天工信息安全智能设备有限公司 | Method and device for identifying and controlling article access behaviors |
CN111816173A (en) * | 2020-06-01 | 2020-10-23 | 珠海格力电器股份有限公司 | Dialogue data processing method, device, storage medium and computer equipment |
CN112149159A (en) * | 2020-08-26 | 2020-12-29 | 网神信息技术(北京)股份有限公司 | Permission setting method and device of terminal, electronic equipment and storage medium |
-
2021
- 2021-03-30 CN CN202110339738.0A patent/CN113098699B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040123150A1 (en) * | 2002-12-18 | 2004-06-24 | Michael Wright | Protection of data accessible by a mobile device |
US20070180490A1 (en) * | 2004-05-20 | 2007-08-02 | Renzi Silvio J | System and method for policy management |
CN101754090A (en) * | 2008-12-16 | 2010-06-23 | 中兴通讯股份有限公司 | Method and system for opening meetings when PC client is used for binding hard terminal |
CN101651623A (en) * | 2009-09-07 | 2010-02-17 | 中兴通讯股份有限公司 | Generation method and device for access control list application |
US9258312B1 (en) * | 2010-12-06 | 2016-02-09 | Amazon Technologies, Inc. | Distributed policy enforcement with verification mode |
CN102932785A (en) * | 2011-08-12 | 2013-02-13 | 中国移动通信集团浙江有限公司 | Rapid authentication method, system and equipment of wireless local area network |
CN102546464A (en) * | 2011-12-22 | 2012-07-04 | 华为技术有限公司 | Conference method and conference system crossing instant messaging (IM) system |
CN103426078A (en) * | 2012-05-26 | 2013-12-04 | 李正 | Paperless conference system and method based on internal working automation |
WO2014186628A1 (en) * | 2013-05-16 | 2014-11-20 | Iboss, Inc. | Location based network usage policies |
CN105246073A (en) * | 2015-08-28 | 2016-01-13 | 深圳市信锐网科技术有限公司 | Wireless network access authentication method and server |
CN107710247A (en) * | 2015-09-30 | 2018-02-16 | 谷歌有限责任公司 | Meeting comment establishment and shared system and method are carried out automatically using the context and close physical proximity of user |
US20180176270A1 (en) * | 2016-12-15 | 2018-06-21 | Cisco Technology, Inc. | Initiating a conferencing meeting using a conference room device |
CN106878990A (en) * | 2017-01-16 | 2017-06-20 | 新华三技术有限公司 | A kind of information-pushing method and device |
CN109819195A (en) * | 2017-11-22 | 2019-05-28 | 重庆晋才富熙科技有限公司 | Wisdom conference system |
CN108108893A (en) * | 2017-12-19 | 2018-06-01 | 江苏航天龙梦信息技术有限公司 | the seat management method of conference system |
CN110602432A (en) * | 2019-08-23 | 2019-12-20 | 苏州米龙信息科技有限公司 | Conference system based on biological recognition and conference data transmission method |
CN111600724A (en) * | 2020-04-03 | 2020-08-28 | 深圳市会缤科技有限公司 | Intelligent conference seat management system and method |
CN111816173A (en) * | 2020-06-01 | 2020-10-23 | 珠海格力电器股份有限公司 | Dialogue data processing method, device, storage medium and computer equipment |
CN111784250A (en) * | 2020-07-02 | 2020-10-16 | 四川巧夺天工信息安全智能设备有限公司 | Method and device for identifying and controlling article access behaviors |
CN112149159A (en) * | 2020-08-26 | 2020-12-29 | 网神信息技术(北京)股份有限公司 | Permission setting method and device of terminal, electronic equipment and storage medium |
Non-Patent Citations (5)
Title |
---|
AHMED A. ZEWAIL: "Device-to-Device Secure Coded Caching", 《IEEE XPLORE》 * |
何道敬: "无线网络安全的关键技术研究", 《CNKI中国知网》 * |
石红岩: "基于P2P优化策略的网络流量管理", 《哈尔滨师范大学自然科学学报》 * |
程超: "网络会议记录管理系统的设计与实现", 《CNKI中国知网》 * |
陈小红: "邻近区域移动社交网络中轻量级细粒度的隐私保护的属性匹配应用的设计与实现", 《CNKI中国知网》 * |
Also Published As
Publication number | Publication date |
---|---|
CN113098699B (en) | 2023-03-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7305234B1 (en) | Automated device behavior management based on preset preferences | |
US8050394B2 (en) | System and method for control of communications connections and notifications | |
EP2811727B1 (en) | Conference call set-up | |
CN110519761B (en) | User identity identification card verification method and device, electronic equipment and storage medium | |
CN101834834A (en) | Authentication method, device and system | |
CN104980926B (en) | The long-range control method and device of mobile terminal | |
CN103473502A (en) | Method and system for acquiring Root rights of android-based mobile terminal | |
WO2011137931A1 (en) | Social network connections | |
CN110166725A (en) | Video method, device, computer equipment and storage medium | |
CN108712440A (en) | User information management method, device, server and storage medium | |
CN111817999A (en) | User login method and device | |
CN113098699B (en) | Intelligent terminal-oriented user information distribution and pairing method | |
CN108632773B (en) | Call interception method, intelligent network system and call interception system | |
CN102572762A (en) | Method for scheduling service capacity by application, charging method and device | |
CN1649299B (en) | Comlex management system and complex conversation management server for applicating programme | |
CN101291539B (en) | Method and device for controlling authorization function | |
CN106060031A (en) | Method of multimedia communication control, server and system | |
CN115866535A (en) | Method and system for realizing 5G message access by multiple protocols | |
CN112492531B (en) | Dynamic recombination method of wide-band and narrow-band fusion network hybrid group and fusion core network | |
CN114565425A (en) | Message pushing method and device, electronic equipment and storage medium | |
CN106304130A (en) | A kind of method of real-time monitoring calling in group system | |
CN112004228A (en) | Real person authentication method and system | |
CN109240475A (en) | Factory reset method, apparatus, system, computer installation and computer readable storage medium | |
CN111988473A (en) | Voice communication call control method and device based on intelligent contract | |
TWI690183B (en) | Method and system for supporting telephone access to iot services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |