CN113098699A - User information distribution and pairing method facing intelligent terminal - Google Patents

User information distribution and pairing method facing intelligent terminal Download PDF

Info

Publication number
CN113098699A
CN113098699A CN202110339738.0A CN202110339738A CN113098699A CN 113098699 A CN113098699 A CN 113098699A CN 202110339738 A CN202110339738 A CN 202110339738A CN 113098699 A CN113098699 A CN 113098699A
Authority
CN
China
Prior art keywords
user information
terminal
strategy
binding
executing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110339738.0A
Other languages
Chinese (zh)
Other versions
CN113098699B (en
Inventor
梁效宁
聂学良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Masterpiece Precision Equipment LLC
Original Assignee
Sichuan Masterpiece Precision Equipment LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Masterpiece Precision Equipment LLC filed Critical Sichuan Masterpiece Precision Equipment LLC
Priority to CN202110339738.0A priority Critical patent/CN113098699B/en
Publication of CN113098699A publication Critical patent/CN113098699A/en
Application granted granted Critical
Publication of CN113098699B publication Critical patent/CN113098699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1818Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computational Linguistics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for distributing and binding user information facing an intelligent terminal, which is characterized by comprising the following steps: s100: defining a database structure, including a definition policy table, a definition user information table, a definition terminal table and a definition binding table; s200: setting a pairing strategy, including setting a strategy table, a user information table, a terminal table and a binding table in a database; s300: executing a pairing policy and distributing user information, comprising the steps of: s301: starting a working thread of a strategy; s302: acquiring and recording the current time; s303: acquiring all elements in a policy table, and recording as a policy set; s304: judging whether the current strategy set contains elements, if so, executing step S305, otherwise, executing step S307; s305: traversing the strategy set, recording as a strategy set _ element when the element exists, and executing S307 when the element does not exist; s306: executing a pairing strategy and distributing user information; s307: and executing the sleep operation according to the preset sleep duration, and executing the step S302.

Description

User information distribution and pairing method facing intelligent terminal
Technical Field
The invention belongs to the field of network communication and artificial intelligence network conferences, and relates to an intelligent terminal-oriented user information distribution and pairing method.
Background
In network communication and artificial intelligent network conferences, the most basic method for ensuring the system safety is to verify the login of a user, namely, whether the user is allowed to enter the system is judged by whether a password is matched with an account or not. The technical scheme in the prior art is that accounts with different authorities are created to limit user authorities, and corresponding authorities and functions are enabled or shielded according to the authorities of login users, so that the login security verification is completed.
However, the technical solution in the prior art only passes software authentication, and although the technical solution is relatively general and general, the defects and shortcomings of the technical solution become more and more obvious as the application scenario expands. For example: when holding a video conference or setting a desktop nameplate of an offline conference, client hardware and specified user information need to be bound one by one. However, the current solutions are generally: (1) the method has the advantages that accounts with certain authority can be appointed to log in, all accounts with the authority can log in the client, a user cannot be accurately appointed to match with a terminal, and when a large amount of equipment user information is rapidly configured in batches, the workload of a network conference manager can be greatly increased through the user login mode, so that the labor waste is caused; (2) if the login account is bound with the MAC address of the terminal, the appointed terminal can only log in through the appointed account, and the waste of hardware resources is caused.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides a method for distributing and pairing user information facing an intelligent terminal, which realizes the purposes of distributing and pairing the user information facing the intelligent terminal by defining a database structure, setting a pairing strategy, executing the pairing strategy and distributing the user information, and comprises the following steps:
s100: defining a database structure, including a definition policy table, a definition user information table, a definition terminal table and a definition binding table;
s200: setting a pairing strategy, including setting a strategy table, a user information table, a terminal table and a binding table in a database;
s300: executing a pairing policy and distributing user information, comprising the steps of:
s301: starting a working thread of a strategy;
s302: acquiring and recording the current time;
s303: acquiring all elements in a policy table, and recording as a policy set;
s304: judging whether the current strategy set contains elements, if so, executing step S305, otherwise, executing step S307;
s305: traversing the strategy set, recording as a strategy set _ element when the element exists, and executing S307 when the element does not exist;
s306: executing a pairing strategy and distributing user information;
s307: and executing the sleep operation according to the preset sleep duration, and executing the step S302.
Preferably, the step S100 includes the steps of:
s101: defining a policy table: creating a data table of a strategy in a database, wherein the strategy comprises that a designated user and a terminal participate in a conference together within a designated time, and the data table of the strategy comprises a strategy id, working content, starting time and ending time;
s102: defining a user information table: creating a data table of user information in a database for storing users logging in a system, wherein the data table of the user information comprises a user information id, a user name, a password field and a user contact way;
s103: defining a terminal table: creating a data table of a terminal in a database for storing equipment bearing system software, wherein the data table of the terminal comprises a terminal MAC address and a terminal name;
s104: defining a binding table: creating a binding data table of the terminal and the user in the database to represent the binding state of the terminal and the user when the strategy is executed, wherein the binding data table of the terminal and the user comprises a strategy id, a user information id and a terminal MAC address.
Preferably, the step S200 includes the steps of:
s201: setting user information, comprising the following steps:
s2011: creating user information and recording the user information as target user information;
s2012: setting user information id, user name, password and user contact information of target user information, wherein the user contact information comprises a telephone number, a micro signal, a QQ number, a Skype user name, a msn user name and a mailbox;
s2013: inputting the target user information into a user information table;
s202: the data of the terminal are set, and the method comprises the following steps:
s2021: creating terminal data information and recording the terminal data information as a target terminal;
s2022: setting a terminal MAC address and a terminal name of a target terminal;
s2023: recording a target terminal into a terminal table;
s203: setting a policy, comprising the steps of:
s2031: creating policy data information and marking as a target policy;
s2032: setting a strategy id, strategy content, starting time and ending time of a target strategy;
s2033: recording the target strategy into a strategy table;
s2034: and binding the user information and the terminal name corresponding to the target strategy.
Preferably, the step S2034 comprises the steps of:
s20341: inquiring all elements of the terminal table, and recording as a terminal set;
s20342: inquiring all elements of the user information table, and recording as a user information set;
s20343: selecting a terminal needing to be bound from a terminal set;
s20344: selecting user information needing to be bound from the user information set;
s20345: creating binding data and marking as target binding;
s20346: the strategy id, the user information id and the terminal MAC address of the target binding respectively correspond to the strategy id of the target strategy, the user information id value of a user information set element and the terminal MAC address of a terminal set element;
s20347: recording the target binding into a binding table;
s20348: and finishing the setting of the strategy.
Preferably, the step S20343 comprises the steps of:
s203431: traversing the terminal set, recording as a terminal set _ element when an element exists, ending traversing the terminal set when the element does not exist, and executing the step S20348;
s203432: and judging whether the terminal set _ element is to be added into the target policy, if so, executing step S20344, otherwise, executing step 203431.
Preferably, the step S20344 comprises the steps of:
s203441: traversing the user information set, recording as a user information set _ element when an element exists, ending traversing the user information set when the element does not exist, and executing the step S20348;
s203442: and judging whether the user information set element is to be added into the target policy, if so, executing the step S20345, otherwise, executing the step S203441.
Preferably, the step S306 includes the steps of:
s3061: acquiring data corresponding to the strategy id of the strategy set element in a binding table according to the strategy id of the strategy set element, and recording the data as a binding association set;
s3062: judging whether the current time is equal to the starting time of the strategy set element, if so, executing a step S3063, otherwise, executing a step S3064;
s3063: starting a strategy;
s3064: judging whether the current time is equal to the starting time of the strategy set element minus the time advance, if so, executing a step S3065, otherwise, executing a step S307, wherein the time advance is a natural number which is more than 1 and has a unit of second;
s3065: notifying a user to execute a policy;
s3066: judging whether the current time is equal to the end time of the strategy set element, if so, executing a step S3067, otherwise, executing a step S307;
s3067: and unbinding and ending the strategy.
Preferably, the step S3063 includes the steps of:
s30631: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S3064 when the element does not exist;
s30632: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as binding strategy set element user information;
s30633: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30634: and setting a binding association set _ element _ terminal to only allow the binding association set _ element _ user information to log in, wherein the policy to be executed is a policy set _ element.
Preferably, the step S3067 includes the steps of:
s30671: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S307 when the element does not exist;
s30672: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as the binding association set element user information;
s30673: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30674: sending a notification to a user corresponding to the binding association set element user information according to the contact information of the user, wherein the notification comprises a notification that the current strategy is finished;
s30675: and releasing the association between the binding association set _ element _ terminal and the binding association set _ element _ user information, and exiting the current strategy and jumping to a login interface by the association set _ element _ terminal.
Preferably, the notification includes voice call and short message, WeChat message and push, QQ message, Skype message, msn message and mail notification according to different contact ways of the user.
The method has the beneficial effects that: a manager can independently define user information distribution and pairing strategies under different time, different scenes, different terminals and user groups, and screen out all user information and equipment required under corresponding scenes; the screened user information is paired and bound in advance according to the inherent characteristics of the terminal, once the paired and bound are formed, the appointed account can only log in the specific terminal, and the appointed terminal only supports the login of the specific account; when the strategy execution time is reached, the equipment is monopolized by the bound user; when the strategy is overdue, releasing the association between the terminal and the user; this forms automatic distribution, binding and unbinding of devices and accounts. Specifically, the method has the following beneficial effects:
1. the strategy can be established in batch, a plurality of scenes can be predefined, binding information can be distributed, and the working efficiency can be improved.
2. And the user information and the terminal are automatically paired according to the distribution strategy, so that the distribution is automatically completed, and the labor cost is saved.
3. When the strategy is overdue, the user information and the terminal are automatically unpaired, and the waste of hardware resources is avoided.
4. The user information and the terminal MAC address are bound in advance, so that the role and the authority of the terminal user are defined, and the terminal user and a manager can conveniently and quickly identify the target terminal.
Drawings
FIG. 1 is a general flow diagram of a method provided by the present invention;
FIG. 2 is a detailed flowchart of the method for executing the pairing policy and distributing the user information;
fig. 3 is a specific flowchart of unbinding and ending the policy in the method provided by the present invention.
Detailed Description
Fig. 1 shows a general flow chart of the method provided by the present invention. As shown in fig. 1, the method of the present invention comprises the steps of:
s100: defining a database structure, including a definition policy table, a definition user information table, a definition terminal table and a definition binding table;
step S100 includes the steps of:
s101: defining a policy table: establishing a data table of a strategy in a database, wherein the strategy comprises that a designated user and a terminal participate in a conference together within a designated time, and the data table of the strategy comprises a strategy id, working content, starting time and ending time;
s102: defining a user information table: creating a data table of user information in a database for storing users logging in a system, wherein the data table of the user information comprises a user information id, a user name, a password field and a user contact way;
s103: defining a terminal table: creating a data table of the terminal in a database for storing equipment bearing system software, wherein the data table of the terminal comprises a terminal MAC address and a terminal name;
s104: defining a binding table: and creating a binding data table of the terminal and the user in the database to represent the binding state of the terminal and the user when the strategy is executed, wherein the binding data table of the terminal and the user comprises a strategy id, a user information id and a terminal MAC address.
S200: setting a pairing strategy, including setting a strategy table, a user information table, a terminal table and a binding table in a database; step S200 includes the steps of:
s201: setting user information, comprising the following steps:
s2011: creating user information and recording the user information as target user information;
s2012: setting a user information id, a user name, a password and a user contact mode of the target user information, wherein the user contact mode comprises but is not limited to: telephone number, micro signal, QQ number, Skype user name, msn user name, mailbox and the like;
s2013: inputting the target user information into a user information table;
s202: the data of the terminal are set, and the method comprises the following steps:
s2021: creating terminal data information and recording the terminal data information as a target terminal;
s2022: setting a terminal MAC address and a terminal name of a target terminal;
s2023: recording a target terminal into a terminal table;
s203: setting a policy, comprising the steps of:
s2031: creating policy data information and marking as a target policy;
s2032: setting a strategy id, strategy content, starting time and ending time of a target strategy;
s2033: recording the target strategy into a strategy table;
s2034: and binding the user information and the terminal name corresponding to the target strategy. Step S2034 includes the steps of:
s20341: inquiring all elements of the terminal table, and recording as a terminal set;
s20342: inquiring all elements of the user information table, and recording as a user information set;
s20343: selecting a terminal needing to be bound from a terminal set; step S20343 includes the steps of:
s203431: traversing the terminal set, recording as a terminal set _ element when an element exists, ending traversing the terminal set when the element does not exist, and executing the step S20348;
s203432: and judging whether the terminal set _ element is to be added into the target policy, if so, executing step S20344, otherwise, executing step 203431.
S20344: selecting user information needing to be bound from the user information set; step S20344 includes the steps of:
s203441: traversing the user information set, recording as a user information set _ element when an element exists, ending traversing the user information set when the element does not exist, and executing the step S20348;
s203442: and judging whether the user information set element is to be added into the target policy, if so, executing the step S20345, otherwise, executing the step S203441.
S20345: creating binding data and marking as target binding;
s20346: the strategy id, the user information id and the terminal MAC address of the target binding respectively correspond to the strategy id of the target strategy, the user information id value of a user information set element and the terminal MAC address of a terminal set element;
s20347: recording the target binding into a binding table;
s20348: and finishing the setting of the strategy.
S300: executing a pairing policy and distributing user information, comprising the steps of:
s301: starting a working thread of a strategy;
s302: acquiring and recording the current time;
s303: acquiring all elements in a policy table, and recording as a policy set;
s304: judging whether the current strategy set contains elements, if so, executing step S305, otherwise, executing step S307;
s305: traversing the strategy set, recording as a strategy set _ element when the element exists, and executing S307 when the element does not exist;
s306: the pairing policy is executed and the user information is distributed. Fig. 2 shows a specific flowchart for executing the pairing policy and distributing the user information in the method provided by the present invention. As shown in fig. 2, step S306 includes the steps of:
s3061: acquiring data corresponding to the strategy id of the strategy set element in a binding table according to the strategy id of the strategy set element, and recording the data as a binding association set;
s3062: judging whether the current time is equal to the starting time of the strategy set element, if so, executing a step S3063, otherwise, executing a step S3064;
s3063: starting a strategy; step S3063 includes the steps of:
s30631: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S3064 when the element does not exist;
s30632: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as binding strategy set element user information;
s30633: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30634: and setting a binding association set _ element _ terminal to only allow the binding association set _ element _ user information to log in, wherein the policy to be executed is a policy set _ element.
S3064: judging whether the current time is equal to the starting time of the strategy set element minus the time advance, if so, executing a step S3065, otherwise, executing a step S307, wherein the time advance is a natural number which is more than 1 and has a unit of second;
in this embodiment, the time advance is set to 1 hour, i.e., 3600 seconds.
S3065: notifying a user to execute a policy;
s3066: judging whether the current time is equal to the end time of the strategy set element, if so, executing a step S3067, otherwise, executing a step S307;
s3067: and unbinding and ending the strategy. Fig. 3 shows a specific flowchart of unbinding and ending policy in the method provided by the present invention. As shown in fig. 3, step S3067 includes the steps of:
s30671: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S307 when the element does not exist;
s30672: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as the binding association set element user information;
s30673: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30674: and sending a notification to a user corresponding to the binding association set element user information according to the user contact information, wherein the notification comprises a notification that the current strategy is finished.
It should be understood that notifications include, but are not limited to, depending on the user's contact details: voice calls and short messages, WeChat messages and pushes, QQ messages, Skype messages, msn messages, mail notifications, and the like.
S30675: and releasing the association between the binding association set _ element _ terminal and the binding association set _ element _ user information, and exiting the current strategy and jumping to a login interface by the association set _ element _ terminal.
S307: and executing the sleep operation according to the preset sleep duration, and executing the step S302. In this embodiment, the sleep duration is set to 1 second.
The method provided by the invention solves the technical problem that no method for distributing and pairing the user information facing the intelligent terminal exists in the prior art.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations are possible to those skilled in the art in light of the above teachings, and that all such modifications and variations are intended to be included within the scope of the invention as defined in the appended claims.

Claims (10)

1. A method for distributing and pairing user information facing an intelligent terminal is characterized by comprising the following steps:
s100: defining a database structure, including a definition policy table, a definition user information table, a definition terminal table and a definition binding table;
s200: setting a pairing strategy, including setting a strategy table, a user information table, a terminal table and a binding table in a database;
s300: executing a pairing policy and distributing user information, comprising the steps of:
s301: starting a working thread of a strategy;
s302: acquiring and recording the current time;
s303: acquiring all elements in a policy table, and recording as a policy set;
s304: judging whether the current strategy set contains elements, if so, executing step S305, otherwise, executing step S307;
s305: traversing the strategy set, recording as a strategy set _ element when the element exists, and executing S307 when the element does not exist;
s306: executing a pairing strategy and distributing user information;
s307: and executing the sleep operation according to the preset sleep duration, and executing the step S302.
2. The method for distributing and pairing user information facing an intelligent terminal according to claim 1, wherein the step S100 comprises the following steps:
s101: defining a policy table: creating a data table of a strategy in a database, wherein the strategy comprises that a designated user and a terminal participate in a conference together within a designated time, and the data table of the strategy comprises a strategy id, working content, starting time and ending time;
s102: defining a user information table: creating a data table of user information in a database for storing users logging in a system, wherein the data table of the user information comprises a user information id, a user name, a password field and a user contact way;
s103: defining a terminal table: creating a data table of a terminal in a database for storing equipment bearing system software, wherein the data table of the terminal comprises a terminal MAC address and a terminal name;
s104: defining a binding table: creating a binding data table of the terminal and the user in the database to represent the binding state of the terminal and the user when the strategy is executed, wherein the binding data table of the terminal and the user comprises a strategy id, a user information id and a terminal MAC address.
3. The method for distributing and pairing user information facing an intelligent terminal according to claim 1, wherein the step S200 comprises the following steps:
s201: setting user information, comprising the following steps:
s2011: creating user information and recording the user information as target user information;
s2012: setting user information id, user name, password and user contact information of target user information, wherein the user contact information comprises a telephone number, a micro signal, a QQ number, a Skype user name, a msn user name and a mailbox;
s2013: inputting the target user information into a user information table;
s202: the data of the terminal are set, and the method comprises the following steps:
s2021: creating terminal data information and recording the terminal data information as a target terminal;
s2022: setting a terminal MAC address and a terminal name of a target terminal;
s2023: recording a target terminal into a terminal table;
s203: setting a policy, comprising the steps of:
s2031: creating policy data information and marking as a target policy;
s2032: setting a strategy id, strategy content, starting time and ending time of a target strategy;
s2033: recording the target strategy into a strategy table;
s2034: and binding the user information and the terminal name corresponding to the target strategy.
4. The method for distributing and pairing user information facing an intelligent terminal according to claim 3, wherein the step S2034 comprises the following steps:
s20341: inquiring all elements of the terminal table, and recording as a terminal set;
s20342: inquiring all elements of the user information table, and recording as a user information set;
s20343: selecting a terminal needing to be bound from a terminal set;
s20344: selecting user information needing to be bound from the user information set;
s20345: creating binding data and marking as target binding;
s20346: the strategy id, the user information id and the terminal MAC address of the target binding respectively correspond to the strategy id of the target strategy, the user information id value of a user information set element and the terminal MAC address of a terminal set element;
s20347: recording the target binding into a binding table;
s20348: and finishing the setting of the strategy.
5. The method for distributing and pairing user information facing an intelligent terminal according to claim 4, wherein the step S20343 comprises the following steps:
s203431: traversing the terminal set, recording as a terminal set _ element when an element exists, ending traversing the terminal set when the element does not exist, and executing the step S20348;
s203432: and judging whether the terminal set _ element is to be added into the target policy, if so, executing step S20344, otherwise, executing step 203431.
6. The method for distributing and pairing user information facing an intelligent terminal according to claim 4, wherein the step S20344 comprises the following steps:
s203441: traversing the user information set, recording as a user information set _ element when an element exists, ending traversing the user information set when the element does not exist, and executing the step S20348;
s203442: and judging whether the user information set element is to be added into the target policy, if so, executing the step S20345, otherwise, executing the step S203441.
7. The method for distributing and pairing user information towards an intelligent terminal according to claim 1, wherein the step S306 comprises the following steps:
s3061: acquiring data corresponding to the strategy id of the strategy set element in a binding table according to the strategy id of the strategy set element, and recording the data as a binding association set;
s3062: judging whether the current time is equal to the starting time of the strategy set element, if so, executing a step S3063, otherwise, executing a step S3064;
s3063: starting a strategy;
s3064: judging whether the current time is equal to the starting time of the strategy set element minus the time advance, if so, executing a step S3065, otherwise, executing a step S307, wherein the time advance is a natural number which is more than 1 and has a unit of second;
s3065: notifying a user to execute a policy;
s3066: judging whether the current time is equal to the end time of the strategy set element, if so, executing a step S3067, otherwise, executing a step S307;
s3067: and unbinding and ending the strategy.
8. The method for distributing and pairing user information towards an intelligent terminal according to claim 7, wherein the step S3063 includes the steps of:
s30631: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S3064 when the element does not exist;
s30632: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as binding strategy set element user information;
s30633: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30634: and setting a binding association set _ element _ terminal to only allow the binding association set _ element _ user information to log in, wherein the policy to be executed is a policy set _ element.
9. The method for distributing and pairing user information towards an intelligent terminal according to claim 7, wherein the step S3067 includes the steps of:
s30671: traversing the binding association set, recording as a binding association set _ element when an element exists, and executing the step S307 when the element does not exist;
s30672: inquiring user information in a user information table according to the user information id of the binding association set element, and recording the user information as the binding association set element user information;
s30673: inquiring a terminal in a terminal table according to the terminal MAC address of the binding association set _ element, and recording the terminal as the binding association set _ element _ terminal;
s30674: sending a notification to a user corresponding to the binding association set element user information according to the contact information of the user, wherein the notification comprises a notification that the current strategy is finished;
s30675: and releasing the association between the binding association set _ element _ terminal and the binding association set _ element _ user information, and exiting the current strategy and jumping to a login interface by the association set _ element _ terminal.
10. The method for distributing and pairing user information towards an intelligent terminal according to claim 9, wherein the notification includes voice call and short message, WeChat message and push, QQ message, Skype message, msn message and mail notification according to different user contact ways.
CN202110339738.0A 2021-03-30 2021-03-30 Intelligent terminal-oriented user information distribution and pairing method Active CN113098699B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110339738.0A CN113098699B (en) 2021-03-30 2021-03-30 Intelligent terminal-oriented user information distribution and pairing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110339738.0A CN113098699B (en) 2021-03-30 2021-03-30 Intelligent terminal-oriented user information distribution and pairing method

Publications (2)

Publication Number Publication Date
CN113098699A true CN113098699A (en) 2021-07-09
CN113098699B CN113098699B (en) 2023-03-07

Family

ID=76670839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110339738.0A Active CN113098699B (en) 2021-03-30 2021-03-30 Intelligent terminal-oriented user information distribution and pairing method

Country Status (1)

Country Link
CN (1) CN113098699B (en)

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040123150A1 (en) * 2002-12-18 2004-06-24 Michael Wright Protection of data accessible by a mobile device
US20070180490A1 (en) * 2004-05-20 2007-08-02 Renzi Silvio J System and method for policy management
CN101651623A (en) * 2009-09-07 2010-02-17 中兴通讯股份有限公司 Generation method and device for access control list application
CN101754090A (en) * 2008-12-16 2010-06-23 中兴通讯股份有限公司 Method and system for opening meetings when PC client is used for binding hard terminal
CN102546464A (en) * 2011-12-22 2012-07-04 华为技术有限公司 Conference method and conference system crossing instant messaging (IM) system
CN102932785A (en) * 2011-08-12 2013-02-13 中国移动通信集团浙江有限公司 Rapid authentication method, system and equipment of wireless local area network
CN103426078A (en) * 2012-05-26 2013-12-04 李正 Paperless conference system and method based on internal working automation
WO2014186628A1 (en) * 2013-05-16 2014-11-20 Iboss, Inc. Location based network usage policies
CN105246073A (en) * 2015-08-28 2016-01-13 深圳市信锐网科技术有限公司 Wireless network access authentication method and server
US9258312B1 (en) * 2010-12-06 2016-02-09 Amazon Technologies, Inc. Distributed policy enforcement with verification mode
CN106878990A (en) * 2017-01-16 2017-06-20 新华三技术有限公司 A kind of information-pushing method and device
CN107710247A (en) * 2015-09-30 2018-02-16 谷歌有限责任公司 Meeting comment establishment and shared system and method are carried out automatically using the context and close physical proximity of user
CN108108893A (en) * 2017-12-19 2018-06-01 江苏航天龙梦信息技术有限公司 the seat management method of conference system
US20180176270A1 (en) * 2016-12-15 2018-06-21 Cisco Technology, Inc. Initiating a conferencing meeting using a conference room device
CN109819195A (en) * 2017-11-22 2019-05-28 重庆晋才富熙科技有限公司 Wisdom conference system
CN110602432A (en) * 2019-08-23 2019-12-20 苏州米龙信息科技有限公司 Conference system based on biological recognition and conference data transmission method
CN111600724A (en) * 2020-04-03 2020-08-28 深圳市会缤科技有限公司 Intelligent conference seat management system and method
CN111784250A (en) * 2020-07-02 2020-10-16 四川巧夺天工信息安全智能设备有限公司 Method and device for identifying and controlling article access behaviors
CN111816173A (en) * 2020-06-01 2020-10-23 珠海格力电器股份有限公司 Dialogue data processing method, device, storage medium and computer equipment
CN112149159A (en) * 2020-08-26 2020-12-29 网神信息技术(北京)股份有限公司 Permission setting method and device of terminal, electronic equipment and storage medium

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040123150A1 (en) * 2002-12-18 2004-06-24 Michael Wright Protection of data accessible by a mobile device
US20070180490A1 (en) * 2004-05-20 2007-08-02 Renzi Silvio J System and method for policy management
CN101754090A (en) * 2008-12-16 2010-06-23 中兴通讯股份有限公司 Method and system for opening meetings when PC client is used for binding hard terminal
CN101651623A (en) * 2009-09-07 2010-02-17 中兴通讯股份有限公司 Generation method and device for access control list application
US9258312B1 (en) * 2010-12-06 2016-02-09 Amazon Technologies, Inc. Distributed policy enforcement with verification mode
CN102932785A (en) * 2011-08-12 2013-02-13 中国移动通信集团浙江有限公司 Rapid authentication method, system and equipment of wireless local area network
CN102546464A (en) * 2011-12-22 2012-07-04 华为技术有限公司 Conference method and conference system crossing instant messaging (IM) system
CN103426078A (en) * 2012-05-26 2013-12-04 李正 Paperless conference system and method based on internal working automation
WO2014186628A1 (en) * 2013-05-16 2014-11-20 Iboss, Inc. Location based network usage policies
CN105246073A (en) * 2015-08-28 2016-01-13 深圳市信锐网科技术有限公司 Wireless network access authentication method and server
CN107710247A (en) * 2015-09-30 2018-02-16 谷歌有限责任公司 Meeting comment establishment and shared system and method are carried out automatically using the context and close physical proximity of user
US20180176270A1 (en) * 2016-12-15 2018-06-21 Cisco Technology, Inc. Initiating a conferencing meeting using a conference room device
CN106878990A (en) * 2017-01-16 2017-06-20 新华三技术有限公司 A kind of information-pushing method and device
CN109819195A (en) * 2017-11-22 2019-05-28 重庆晋才富熙科技有限公司 Wisdom conference system
CN108108893A (en) * 2017-12-19 2018-06-01 江苏航天龙梦信息技术有限公司 the seat management method of conference system
CN110602432A (en) * 2019-08-23 2019-12-20 苏州米龙信息科技有限公司 Conference system based on biological recognition and conference data transmission method
CN111600724A (en) * 2020-04-03 2020-08-28 深圳市会缤科技有限公司 Intelligent conference seat management system and method
CN111816173A (en) * 2020-06-01 2020-10-23 珠海格力电器股份有限公司 Dialogue data processing method, device, storage medium and computer equipment
CN111784250A (en) * 2020-07-02 2020-10-16 四川巧夺天工信息安全智能设备有限公司 Method and device for identifying and controlling article access behaviors
CN112149159A (en) * 2020-08-26 2020-12-29 网神信息技术(北京)股份有限公司 Permission setting method and device of terminal, electronic equipment and storage medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
AHMED A. ZEWAIL: "Device-to-Device Secure Coded Caching", 《IEEE XPLORE》 *
何道敬: "无线网络安全的关键技术研究", 《CNKI中国知网》 *
石红岩: "基于P2P优化策略的网络流量管理", 《哈尔滨师范大学自然科学学报》 *
程超: "网络会议记录管理系统的设计与实现", 《CNKI中国知网》 *
陈小红: "邻近区域移动社交网络中轻量级细粒度的隐私保护的属性匹配应用的设计与实现", 《CNKI中国知网》 *

Also Published As

Publication number Publication date
CN113098699B (en) 2023-03-07

Similar Documents

Publication Publication Date Title
US7305234B1 (en) Automated device behavior management based on preset preferences
US8050394B2 (en) System and method for control of communications connections and notifications
EP2811727B1 (en) Conference call set-up
CN110519761B (en) User identity identification card verification method and device, electronic equipment and storage medium
CN101834834A (en) Authentication method, device and system
CN104980926B (en) The long-range control method and device of mobile terminal
CN103473502A (en) Method and system for acquiring Root rights of android-based mobile terminal
WO2011137931A1 (en) Social network connections
CN110166725A (en) Video method, device, computer equipment and storage medium
CN108712440A (en) User information management method, device, server and storage medium
CN111817999A (en) User login method and device
CN113098699B (en) Intelligent terminal-oriented user information distribution and pairing method
CN108632773B (en) Call interception method, intelligent network system and call interception system
CN102572762A (en) Method for scheduling service capacity by application, charging method and device
CN1649299B (en) Comlex management system and complex conversation management server for applicating programme
CN101291539B (en) Method and device for controlling authorization function
CN106060031A (en) Method of multimedia communication control, server and system
CN115866535A (en) Method and system for realizing 5G message access by multiple protocols
CN112492531B (en) Dynamic recombination method of wide-band and narrow-band fusion network hybrid group and fusion core network
CN114565425A (en) Message pushing method and device, electronic equipment and storage medium
CN106304130A (en) A kind of method of real-time monitoring calling in group system
CN112004228A (en) Real person authentication method and system
CN109240475A (en) Factory reset method, apparatus, system, computer installation and computer readable storage medium
CN111988473A (en) Voice communication call control method and device based on intelligent contract
TWI690183B (en) Method and system for supporting telephone access to iot services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant