CN113438602A - Terminal management method, device, equipment and storage medium - Google Patents

Terminal management method, device, equipment and storage medium Download PDF

Info

Publication number
CN113438602A
CN113438602A CN202110705901.0A CN202110705901A CN113438602A CN 113438602 A CN113438602 A CN 113438602A CN 202110705901 A CN202110705901 A CN 202110705901A CN 113438602 A CN113438602 A CN 113438602A
Authority
CN
China
Prior art keywords
policy
control
terminal
strategy
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110705901.0A
Other languages
Chinese (zh)
Other versions
CN113438602B (en
Inventor
吴蓓
邹仕洪
张广伟
周宏斌
黄浩东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanxin Information Technology Group Co ltd
Original Assignee
Yuanxin Information Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanxin Information Technology Group Co ltd filed Critical Yuanxin Information Technology Group Co ltd
Priority to CN202110705901.0A priority Critical patent/CN113438602B/en
Publication of CN113438602A publication Critical patent/CN113438602A/en
Application granted granted Critical
Publication of CN113438602B publication Critical patent/CN113438602B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Abstract

The embodiment of the application provides a terminal management method, a terminal management device, terminal management equipment and a storage medium, and relates to the field of mobile equipment management. The method comprises the following steps: responding to a control instruction carrying first policy information, and sending a policy control request to a server to determine a first policy identifier corresponding to the first policy information; and managing the controlled terminal through the first strategy identification fed back by the server. According to the method, the control terminal is additionally arranged and manages the controlled terminal according to the first strategy identification, so that the control strategy can be more conveniently issued to the controlled terminal in any place or situation, the fence limitation is broken through, and the flexible management of the controlled terminal is realized.

Description

Terminal management method, device, equipment and storage medium
Technical Field
The present application relates to the field of mobile device management, and in particular, to a terminal management method, apparatus, device, and storage medium.
Background
Currently, specific authority control can be made on mobile terminals in a fence through geographic location, access to Wifi, or fence limitation of a time period.
However, the method of determining the geographic location by using the longitude and latitude has the problem of insufficient accuracy of the longitude and latitude information, and is not suitable for the situations that the location is small, or the location is irregular, or no clear location division is available; the Wifi access information is only limited to Wifi access scenes, and the method is not suitable for other Wifi-free scenes. After the control range is determined, the server issues a control strategy to the mobile terminal, and if an emergency occurs, such as fence limitation adjustment or mobile terminal change, the control strategy cannot be adjusted in time by the fence limitation mode, so that control of part of the mobile terminals is affected.
Disclosure of Invention
The application provides a terminal management method, a terminal management device and a storage medium, which can solve various problems in the prior art that the authority control of a terminal is limited by a fence. The technical scheme is as follows:
according to a first aspect of the present application, a terminal management method is provided, which is applied to a control terminal, and the method includes:
responding to a control instruction carrying first policy information, and sending a policy control request to a server to determine a first policy identifier corresponding to the first policy information;
and managing the controlled terminal through the first strategy identification fed back by the server.
According to a second aspect of the present application, there is provided a terminal management method applied to a server, the method including:
responding to a policy control request which is sent by a control terminal and carries first policy information, determining a first policy identifier corresponding to the first policy information, and feeding back the first policy identifier;
when a second downloading strategy request carrying a first strategy identifier and sent by a controlled terminal is received, sending a first control strategy to the controlled terminal, wherein the first control strategy is a control strategy corresponding to the first strategy identifier in shared information at the current moment, and the shared information is information shared between a control terminal and a server;
alternatively, the first and second electrodes may be,
when a policy modification request which is sent by a control terminal and carries a first policy identifier and second policy information is received, sending a first update message which at least carries the first policy identifier to a controlled terminal, wherein the first update message is used for informing the controlled terminal to update a control policy;
alternatively, the first and second electrodes may be,
and when a policy revocation request sent by the control terminal is received, sending a second update message carrying the first policy identifier to the controlled terminal, wherein the second update message is used for informing the controlled terminal to terminate executing a second operation corresponding to a second control policy, and the second control policy is a control policy corresponding to the second operation currently executed by the controlled terminal and corresponds to the first policy identifier.
According to a third aspect of the present application, there is provided a terminal management method applied to a controlled terminal, the method including:
determining a first strategy identifier by scanning a first strategy two-dimensional code displayed by a control terminal;
and executing corresponding operation according to the first strategy identification.
According to a fourth aspect of the present application, there is provided a management apparatus comprising:
the receiving and sending module is used for receiving a control instruction carrying first policy information and responding to the control instruction, and sending a policy control request to the server so as to determine a first policy identifier corresponding to the first policy information;
and the management module is used for managing the controlled terminal through the first strategy identifier fed back by the server.
According to a fifth aspect of the present application, there is provided a controlled apparatus comprising:
the determining module is used for determining a first strategy identifier by scanning a first strategy two-dimensional code displayed by the control terminal;
and the execution module is used for executing corresponding operation according to the first strategy identifier.
According to a sixth aspect of the present application, there is provided a terminal device, comprising:
a processor; and
a memory configured to store machine readable instructions, which when executed by the processor, cause the processor to perform the terminal management method as shown in the first aspect or the third aspect of the present application.
According to a seventh aspect of the present application, there is provided a computer-readable storage medium for storing computer instructions which, when executed on a computer, enable the computer to perform the terminal management method of the first aspect or the third aspect of the present application.
The beneficial effect that technical scheme that this application provided brought is:
the terminal management method provided by the application specifically comprises the following steps: responding to a control instruction carrying first policy information, and sending a policy control request to a server to determine a first policy identifier corresponding to the first policy information; and managing the controlled terminal through the first strategy identification fed back by the server. Compared with the prior art, the method has the advantages that the control terminal is additionally arranged and is managed according to the first strategy identification, so that the control strategy can be more conveniently issued to the controlled terminal in any place or situation, the fence limitation is broken through, and the flexible management of the controlled terminal is realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of a terminal management method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a terminal management method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a terminal management method according to an embodiment of the present application;
fig. 4 is a schematic view of an interaction process of a terminal management method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a management control device according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a controlled apparatus according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The terms referred to in this application will first be introduced and explained:
(1) two-dimensional code
The content of the two-dimensional code is substantially a character string. If the input information is unique, the character string generated by processing the input information according to the unified rule is also unique. For example, the policy identifier generated according to the identity identifier and the time identifier of the management and control terminal in the embodiment of the present application, where the identity identifier and the time identifier are used as input information, may have uniqueness (the time identifier corresponding to a certain time is unique), a character string obtained according to the input information is also unique, and a two-dimensional code generated based on the character string is also unique.
(2)MDM
All referred to as Mobile Device Management. It provides complete mobile device full lifecycle management from device registration, activation, use to elimination of various links. Mobile Device Management (MDM) enables the implementation of device management, configuration management, security management, asset management, etc. The MDM ecosystem mainly comprises an MDM server and an MDM mobile device.
MDM server, typically a cloud server. The cloud server has the functions of storing and issuing control strategies and the like. The object of the issued control strategy is an MDM mobile device, and the issued control strategy can indicate the MDM mobile device to perform automatic device management, configuration management, safety management, asset management and the like.
MDM mobile devices, typically terminals controlled by cloud servers. The mobile device can be a mobile device such as a mobile phone and a tablet personal computer, and has a conventional communication function, an execution function and the like. The communication function may specifically be a function of performing communication via a network such as a local area network, a wide area network, or the internet. The execution function may be to receive a control policy issued by the cloud server, and execute operations related to the control policy, such as configuration management, security management, and asset management.
At present, the scheme of actively issuing a policy by an MDM server to control and manage MDM mobile devices is a top-down policy control, and can perform specific authority control on mobile devices in a fence through geographic location, access Wifi or fence limitation of a time period.
However, in the prior art, the authority control of the mobile device in the fence is limited by the fence, so that various problems exist.
The application provides a terminal management method, a terminal management device, a terminal management apparatus and a storage medium, which aim to solve the above technical problems in the prior art.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
The embodiment of the application provides a terminal management method, which is applied to a control terminal, and as shown in fig. 1, the method includes:
s101, responding to a control instruction carrying first policy information, and sending a policy control request to a server to determine a first policy identifier corresponding to the first policy information;
the controlled terminal is managed by the management and control terminal and the server in a mode of sharing information. The shared information may include: the first strategy identification and the first control strategy corresponding to the first strategy identification at the current moment. At present, at most one control strategy is corresponding to the first strategy identification, and the control strategy is in a state of being capable of being issued.
Wherein the control strategy can be generated according to the strategy information. And under the condition that the strategy information corresponds to the strategy identification, the control strategy generated according to the strategy information also corresponds to the strategy identification.
In addition, the form of the policy information may be a data format determined based on the relevant protocol, and the data format may reflect the specific content of the policy. Specifically, according to the relevant protocol, the content of a plurality of sub-policies is determined (the content of each sub-policy may be determined by the server alone, the control terminal alone, or both the server and the control terminal together), and data corresponding to the content of each sub-policy is displayed in the display area of the control terminal, where the data may include the number of the sub-policy, the name of the sub-policy, various execution operations of the sub-policy, various restrictions on the operation, and the like. And after the user determines at least one sub-strategy in the display area, generating first strategy information.
Illustratively, the telephone function of the terminal can be taken as a sub-policy, the policy number of the sub-policy is set to be 10001, and the telephone function includes a telephone dialing operation and a telephone answering operation. For example, in a training activity, there are a plurality of participants, and a trained organizer needs to train the plurality of participants for 2 hours in an unlimited place between 9:00am and 11:00am, during which time each participant cannot be disturbed by the outside, and therefore, it is necessary to control controlled terminals such as mobile phones carried by all participants. At this time, the user may select a corresponding sub-policy on a display interface provided by the management and control terminal, and determine an operation and a corresponding limitation in the sub-policy. The sub-policy number corresponding to the telephone function may be: 10001, for this case, the first policy information may be: numbering: 10001, content: telephone functions are not available, specific time: [ 9:00am-11:00am ].
The policy information may also be in a text format. In the same way, the user may also input the first policy information in a text form on the display interface provided by the control terminal. For example, the text information input by the user may be: telephone functions are not available, specific time: [ 9:00am-11:00am ]. It can be directly used as the first policy information.
In the above example, the selection or input of the user on the display interface provided by the control terminal may be regarded that the user has sent a control instruction carrying the first policy information, and as a response to the control instruction, the control terminal may further carry the first policy information in the policy control request and send the policy control request to the server, and after receiving the policy control request, the server generates the first policy identifier according to the policy control request, generates the corresponding control policy according to the first policy information, and updates the control policy into the shared information. Or the management and control terminal generates a corresponding control strategy according to the first strategy information, determines the corresponding relation between the generated control strategy and the first strategy identifier after receiving the first strategy identifier, and updates the control strategy and the first strategy identifier into the shared information. In this case, the first control policy in the shared information may be a control policy generated according to the first policy information.
It should be noted that the form of the first policy information shown in the embodiment of the present application is only used for illustrating the embodiment of the present application, and does not constitute a limitation to the present application. The skilled person can select the operation according to the actual situation. For example, the control instruction carrying the first policy information is not from the selection or input of the user, but from other preset legal ways, and the control terminal responds the same.
It should be further noted that both the control terminal and the controlled terminal have a unique identity, such as a physical address of the device, for identifying the uniqueness of the terminal identity. Specifically, in this embodiment of the present application, the first identity of the management and control terminal and the second identity of the controlled terminal in the following embodiments are shown.
In a possible implementation manner, the policy control request further carries a time identifier and a first identity identifier of the management and control terminal, so that the server generates the first policy identifier according to the time identifier and the first identity identifier.
And S102, managing the controlled terminal through the first strategy identifier fed back by the server.
The terminal management method provided by the embodiment of the application sends a policy control request to a server by responding to a control instruction carrying first policy information so as to determine a first policy identifier and a corresponding relation between the first policy identifier and the first policy information; and managing the controlled terminal through the first strategy identification fed back by the server. Compared with the prior art, the method has the advantages that the control terminal is additionally arranged, the controlled terminal is managed by the control terminal according to the first strategy identification, and strategies can be more conveniently issued to the controlled terminal in any place or under any situation. The method breaks through fence limitation and realizes flexible management of the controlled terminal in any place or situation.
The embodiment of the present application provides a possible implementation manner, where managing a controlled terminal through a first policy identifier may further include:
s102a (not shown in the figure), which shows a first policy two-dimensional code corresponding to the first policy identifier, so that the controlled terminal scans to obtain the first control policy.
The control terminal can generate a first policy two-dimensional code according to the first policy identifier by using technical means in the field for reference, and then displays the first policy two-dimensional code through a display interface controlled by the control terminal.
The display interface controlled by the control terminal may be a display interface carried by the control terminal itself, an authorized webpage, a display interface authorized for printing operation and displayed in the form of a poster, and the like. It should be noted that, the example of the display interface for controlling the terminal is only used to illustrate the embodiment of the present application, and is not limited to the embodiment of the present application.
The embodiment of the present application provides a possible implementation manner, where managing a controlled terminal through a first policy identifier may further include:
s102b (not shown in the figure), when receiving a modification instruction carrying second policy information, sending a policy modification request carrying a first policy identifier and the second policy information to a server, so as to instruct the server to send a first update message;
wherein, the modification instruction should carry a first policy identifier and indicate that the first policy identifier corresponds to the second policy information. After receiving the modification instruction, the management and control terminal may generate a third control policy according to the second policy information, and update the control policy corresponding to the first policy identifier in the shared information to the third control policy. Or through a modification policy request which can carry the second policy information and the first policy identifier, instructing the server to generate a third control policy according to the second policy information, updating the control policy corresponding to the first policy identifier in the shared information to be the third control policy according to the generated third control policy, and after the updating is finished, the server sends a first updating message to the controlled terminal. After the controlled terminal receives the first updating message, the controlled terminal can download the third control strategy in time to update the operation which is executed locally.
Illustratively, in the training situation, the management and control terminal receives a modification instruction, where the modification instruction includes second policy information (for example, the policy information is in the form of text information): "call making operation or call answering operation is unavailable between 9:00am and 11:00 am" and "the function of connecting the internet through the SIM card is unavailable between 9:00am and 11:00 am".
Or the control terminal sends the first update message to the controlled terminal. The first update message at least carries a first policy identifier, and is used for notifying the controlled terminal to update the control policy.
Illustratively, the communication state between the management and control terminal and the server should be in a connection state, and when the server cannot smoothly issue the control policy to the controlled terminal or the server does not participate in the specific management of the controlled terminal, the control policy may be sent to the controlled terminal through the management and control terminal. It should be noted that, when the communication state between the controlled terminal and the server is in a no-connection state, and the like, and the server cannot smoothly issue the control policy to the controlled terminal, the control policy may be issued by the control terminal, and the controlled terminal may select to receive and execute the control policy, or may select not to receive, and continue to wait for reestablishing the communication connection with the server, and then receive and execute the control policy issued by the server.
Illustratively, the functions that should be provided for sharing information include: and determining that at least one controlled terminal is in control of the control strategy corresponding to the first strategy identification. For example, a shared record table may be provided, which is identified by the first policy identification and used for recording the second identity of the at least one controlled terminal. The management and control terminal may determine a second identity of the at least one controlled terminal according to the record table, and send the first update message according to the determined second identity.
In this possible implementation, the first update message may also carry a third control policy. When the controlled terminal receives the first update message, the third control policy can be directly obtained from the first update message.
In this possible implementation, managing the controlled terminal by the first policy identifier may further include:
s102c (not shown in the figure), when receiving the revocation instruction, send a revocation policy request carrying the first policy identifier to the server to instruct the server to send a second update message, or send a second update message to the controlled terminal, where the second update message carries the first policy identifier, and is used to notify the controlled terminal to terminate executing a second operation corresponding to the second control policy, and the second control policy is a control policy corresponding to the second operation currently executed by the controlled terminal and corresponds to the first policy identifier.
After the revocation is successful, the management and control terminal can delete the controlled terminal from the management queue according to specific conditions and update the shared information. Illustratively, the second identity of the controlled terminal is deleted from the record table.
According to the terminal management method provided by the embodiment of the application, a control terminal or a server is triggered to send a first updating message through a modification instruction input by a user so as to indicate a controlled terminal to update a current control strategy; or triggering the control terminal or the server to send a second update message through a revocation instruction input by the user to instruct the controlled terminal to terminate executing the operation corresponding to the current control policy, thereby realizing dynamic management.
The embodiment of the present application further provides a possible implementation manner, after the controlled terminal scans the first policy two-dimensional code, or after the control terminal sends the first update message to the controlled terminal, the controlled terminal sends a download request to the control terminal according to the first policy two-dimensional code or the first update message, specifically:
responding to a first downloading strategy request which is sent by the controlled terminal according to the first strategy two-dimensional code and carries the first strategy identification, and allowing the controlled terminal to download the first control strategy;
the first policy identifier may be determined according to the first policy two-dimensional code.
Responding to a first downloading strategy request which is sent by the controlled terminal according to the first updating message and carries the first strategy identification, and allowing the controlled terminal to download a third control strategy;
wherein the first policy identification may be determined from the first update message.
The management and control terminal associates the second identity with the first policy identifier after receiving a download request of the controlled terminal for the first time, wherein the download request at least carries the first policy identifier and the second identity of the controlled terminal. For example, the association operation may be to record the second identity in the shared record table provided in the above embodiment.
It should be noted that the control terminal may also actively send policy information to the controlled terminal. In this case, the controlled terminal that needs to be managed is recorded in the record table in advance, and the control terminal actively sends the control policy to the controlled terminal according to the record table.
An embodiment of the present application further provides a terminal management method, which is applied to a server, and as shown in fig. 2, the method includes:
s201, responding to a policy control request which is sent by a management and control terminal and carries first policy information, determining a first policy identifier corresponding to the first policy information, and feeding back the first policy identifier;
the policy control request further carries a time identifier and a first identity identifier of the management and control terminal, and the server may generate the first policy identifier according to the first identity identifier and the time identifier. In general, a server may receive a policy control request sent by at least one management and control terminal at the same time point, or receive multiple policy control requests sent by the same management and control terminal at different time points, where each policy control request needs to generate a policy identifier correspondingly, so as to manage a controlled terminal according to the policy identifier. The time identifier may be time information for the management and control terminal to send the policy control request, for example, a timestamp corresponding to the initiation request. The policy control request may also be combined with other information besides the time identifier and the first identity identifier, and for simplicity and convenience of description, details are not described herein again.
After receiving the policy control request, if the policy control request carries the first policy information, the corresponding control policy needs to be generated according to the first policy information. The first policy information in the policy control request corresponds to the generated first policy identifier, and accordingly, the first policy identifier corresponds to the control policy generated by the server. And the server updates the first strategy identification, the corresponding control strategy and the corresponding relation of the first strategy identification and the corresponding control strategy into the shared information.
In addition, the control policy corresponding to the first policy identifier in the current time sharing information may be identified as the first control policy. The first control policy may be the corresponding control policy generated according to the first policy information.
And S202, managing the controlled terminal through the first strategy identifier. Wherein, S202 includes S202a (not shown), S202b (not shown), and S202c (not shown), as follows:
s202a, when receiving a second downloading strategy request carrying a first strategy identification sent by the controlled terminal, allowing the controlled terminal to download the first control strategy;
the server associates the second identity identifier with the first policy identifier after receiving a download request of the controlled terminal for the first time, wherein the download request at least carries the first policy identifier and the second identity identifier of the controlled terminal. For example, the association operation may be to record the second identity in the shared record table provided in the above embodiment.
It should be noted that the server may also actively issue the control policy to the controlled terminal. In this case, the controlled terminal that needs to be managed should be recorded in advance in the record table. And the server actively issues a control strategy to the controlled terminal according to the record table.
Alternatively, the first and second electrodes may be,
s202b, when receiving a policy modification request carrying a first policy identifier and second policy information sent by a control terminal, sending a first update message carrying at least the first policy identifier to a controlled terminal, where the first update message is used to notify the controlled terminal to update a control policy.
And after receiving the strategy modification request, generating a third control strategy according to the second strategy information, and updating the control strategy corresponding to the first strategy identifier into the third control strategy. Or, when the management and control terminal has updated the control policy corresponding to the first policy identifier in the shared information according to the second policy information, the modification policy request may not carry the second policy information, and then the server only needs to send the first update message.
Before the first updating message is sent, at least one second identity corresponding to the first strategy identity is determined, and at least one controlled terminal corresponding to the at least one second identity is determined. For example, the server may determine a second identity of the at least one controlled terminal according to the record table, and send the first update message according to the determined second identity. The first update message may carry a first policy identification. After receiving the first updating message, the controlled terminal sends a second downloading strategy request carrying the first strategy identification to the server; the server responds to the second downloading strategy request, and allows the controlled terminal to download a third control strategy. When the server sends the first update message, the first update message may also carry a third control policy, and the controlled terminal may directly obtain the third control policy by receiving the first update message.
Or, S202c, when receiving the revocation instruction, sends a revocation policy request carrying the first policy identifier to the server to instruct the server to send a second update message; or sending a second updating message to the controlled terminal.
The second update message carries a first policy identifier, and is used to notify the controlled terminal to terminate executing a second operation corresponding to a second control policy, where the second control policy is a control policy corresponding to a second operation currently executed by the controlled terminal and corresponds to the first policy identifier.
Before sending the second updating message, determining at least one second identity corresponding to the first policy identity, and determining at least one controlled terminal corresponding to the at least one second identity. For example, the server may determine a second identity of the at least one controlled terminal according to the record table, and send a second update message according to the determined second identity.
After receiving the policy revocation request, the server may immediately feed back to the management and control terminal, and has received the policy revocation request; or after the second updating message is sent to the controlled terminal, a message that the revocation operation has been performed or the revocation is successful may also be sent to the regulating terminal. After receiving any of the foregoing messages, the policing terminal may interpret that the revocation policy is successful.
In an embodiment of the present application, a terminal management method is further provided, which is applied to a controlled terminal, and as shown in fig. 3, the method includes:
s301, a first strategy identifier is determined by scanning a first strategy two-dimensional code displayed by a management and control terminal;
s302, corresponding operation is executed according to the first strategy identification.
In a possible implementation manner provided in the embodiment of the present application, S302 further includes: s302a (not shown), S302b (not shown), and S302c (not shown). In particular, the amount of the solvent to be used,
s302a, when it is determined that there is no control policy corresponding to the first policy identifier in the controlled terminal, acquiring a first control policy according to the first policy identifier, where the first control policy is a control policy corresponding to the first policy identifier in the shared information at the current time, and the shared information is information shared between the control terminal and the server; and determining and executing a first operation corresponding to the first control strategy.
It should be noted that at most one control policy exists in the controlled terminal and corresponds to the first policy identifier, and an operation corresponding to the control policy should be in an execution state.
The obtaining of the first control policy according to the first policy identifier may include:
scanning a first strategy two-dimensional code displayed by a control terminal, and determining a first strategy identifier according to the first strategy two-dimensional code; and sending a first downloading strategy request to the control terminal according to the first strategy identifier, or sending a second downloading strategy request to the server, and downloading the first control strategy from the control terminal or the server, wherein the first downloading strategy identifier is carried in both the first downloading strategy request and the second downloading strategy request.
When the controlled terminal executes the first operation, the first operation is executed with the highest priority.
For example, when the first control policy in the shared information is a control policy generated according to the first policy information, the first operation may be: telephone functions are not available, specific time: [ 9:00am-11:00am ]. After the controlled terminal acquires the first control strategy, the controlled terminal executes the first operation, so that the second operation executed by the controlled terminal at the current moment is substantially the first operation, the control strategy corresponding to the second operation is the first control strategy, and the second control strategy corresponds to the first strategy identifier. Before the controlled terminal executes the second operation, other operations corresponding to other control policies have been executed, specifically: the function of connecting the internet through the SIM card is unavailable, and the specific time is: (8: 00am-10:00 am); telephone functions are not available, specific time: [ 8:00am-10:00am ]. After the first operation is executed, the control operation currently executed by the controlled terminal is as follows: the function of connecting the internet through the SIM card is unavailable, and the specific time is: (8: 00am-10:00 am); telephone functions are not available, specific time: [ 9:00am-11:00am ].
Alternatively, the first and second electrodes may be,
s303b, when receiving the first update message carrying the first policy identifier, updating the control policy according to the first policy identifier.
The updating of the control strategy specifically includes:
when the first update message carries a third control strategy, re-determining the control strategy corresponding to the first strategy identifier as the third control strategy, and executing a third operation corresponding to the third control strategy; when the first update message does not carry the third control strategy, a download request is sent to the control terminal or the server according to the first strategy identifier to obtain the third control strategy, the control strategy corresponding to the first strategy identifier is determined again to be the third control strategy, and a third operation corresponding to the third control strategy is executed.
Illustratively, the third control strategy is: telephone functions are not available, specific time: [ 10:00am-15:00pm ]. And the operation currently executed by the controlled terminal comprises a second operation determined according to a second control strategy, and the second control strategy corresponds to the first strategy identification. In addition, the operation currently executed by the controlled terminal also includes the operation corresponding to other control strategies: the function of connecting the internet through the SIM card is unavailable, and the specific time is: [ 8:00am-10:00am ]. Then, in combination with the other operation and the second operation, the control operation currently performed by the controlled terminal is: the function of connecting the internet through the SIM card is unavailable, and the specific time is: (8: 00am-10:00 am); telephone functions are not available, specific time: [ 9:00am-11:00am ]. After the third operation is executed, the control operation currently executed by the controlled terminal is as follows: the function of connecting the internet through the SIM card is unavailable, and the specific time is: (8: 00am-10:00 am); telephone functions are not available, specific time: [ 10:00am-15:00pm ].
Alternatively, the first and second electrodes may be,
s303c, when receiving the second update message carrying the first policy identifier, terminating executing a second operation corresponding to a second control policy according to the first policy identifier, where the second control policy is a control policy corresponding to the currently executed second operation and corresponds to the first policy identifier.
Illustratively, when the second control policy is a control policy generated according to the first policy information, the second operation is: telephone functions are not available, specific time: [ 9:00am-11:00am ]. In addition, the operation currently executed by the controlled terminal also includes the operation corresponding to other control strategies: the function of connecting the internet through the SIM card is unavailable, and the specific time is: [ 8:00am-10:00am ]. In combination with other operations and the second operation, the control operation currently executed by the controlled terminal is: the function of connecting the internet through the SIM card is unavailable, and the specific time is: (8: 00am-10:00 am); telephone functions are not available, specific time: [ 10:00am-15:00pm ]. After the second operation is cancelled, the control operation currently executed by the controlled terminal is as follows: the function of connecting the internet through the SIM card is unavailable, and the specific time is: [ 8:00am-10:00am ].
And after the controlled terminal cancels the second operation, feeding back the processing details of cancellation to the server or the control terminal.
Based on the terminal management method respectively applied to the management and control terminal, the server and the controlled terminal in the above embodiments of the present application, a specific embodiment is provided in this application with reference to an interaction process diagram of three parties (such as fig. 4 in the drawings of the specification), and a detailed description is performed on the technical solution of the embodiment of the present application:
in the interaction diagram shown in fig. 4, a total of 3 interaction processes are shown: initiating a policy control procedure, modifying the policy control procedure, and revoking the policy control procedure. The specific operations of the tube control terminal, the server and the controlled terminal are further described below with respect to the 3 interactive processes. It should be noted that, in addition to further illustrating the steps shown in the figures, other steps not shown in the flow chart are added to the following description.
(1) A policy control procedure is initiated. Including S1000-S1007.
S1000, the control terminal receives a control instruction, and the instruction carries first strategy information.
The control instruction carrying the first policy information may be derived from selection or input of a user, or may be derived from other preset legal approaches.
S1001: the management and control terminal sends a policy control request to the server, wherein the request carries first policy information and a first identity identifier.
S1002, the server generates and feeds back a first strategy identifier.
The policy control request may also carry a time identifier. And after receiving the strategy control request, the server generates a first strategy identifier according to the first identity identifier and the time identifier carried in the strategy control request.
And the server generates a first control strategy according to the first strategy information and determines the corresponding relation between the first strategy identification and the first control strategy.
During the execution of steps S1000 and S1002, a sharing mechanism should be established between the servers or the management and control terminals, and the sharing mechanism mainly includes shared information. The sharing information includes determining a first control policy corresponding to the first policy identification, and at most one control policy should exist corresponding to the first policy identification. The first control policy may be generated according to the first policy information, or may be generated according to policy information carried in the modification instruction. The shared information further includes determining a controlled terminal to be managed, specifically, recording a second identity of the controlled terminal through a record table. The shared information further includes a record of the first policy identifier and the first identity identifier of the control terminal, so as to distinguish policy identifiers corresponding to other control policies initiated by the control terminal. Through the sharing mechanism, the server and the control terminal can cooperatively manage the controlled terminal, specifically, issue a policy, modify the policy, revoke the policy and the like.
S1003, the management and control terminal generates and displays the first strategy two-dimensional code.
After receiving the first policy identifier, the management and control terminal generates a first policy two-dimensional code according to the first policy identifier.
The control terminal can also display the first strategy two-dimensional code in a picture form through a display interface controlled by the control terminal so that the controlled terminal can scan and acquire the first control strategy.
S1004, the controlled terminal acquires the first strategy identification.
Specifically, the controlled terminal may scan the first policy two-dimensional code displayed by the control terminal, and analyze the first policy two-dimensional code in the form of the picture according to the prior art, so as to obtain the first policy identifier. The controlled terminal sends a download request to the managing terminal or the server according to the first policy identifier, as in S1005a, S1005 b.
S1005a, the controlled terminal sends a first downloading strategy request to the control terminal.
S1005b, the controlled terminal sends a second download policy request to the server.
The controlled terminal sends a downloading strategy request to the control terminal or the server, wherein the request carries the first strategy identifier and the second identity identifier of the controlled terminal.
S1006, the control terminal or the server feeds back the first control strategy.
And the control terminal or the server determines a first control strategy from the shared information according to the first strategy identification carried in the download request, and then allows the controlled terminal to download the first control strategy.
In addition, the control terminal or the server records the second identity of the controlled terminal which feeds back the first control strategy for the first time in the shared recording table.
And S1007, the controlled terminal determines a second operation corresponding to the second policy information and executes the second operation.
In addition to the above-mentioned obtaining of the first control policy by scanning the two-dimensional code, after the sharing mechanism is established, the management and control terminal or the server may issue the first control policy to the specified controlled terminal through the second identity of the controlled terminal recorded in advance in the record table.
(2) The policy control is modified. Including S2000-S2004.
S2000, the management and control terminal receives a modification instruction, wherein the modification instruction carries a first strategy identifier and new strategy information: second policy information.
After receiving the instruction, the management and control terminal may select to generate a third control policy according to the second policy information, replace the control policy corresponding to the first policy identifier in the shared information as the third control policy, and then execute S2001 a; alternatively, the second control policy may be sent to the server, and the server processes the generation and replacement transaction, specifically, S2001b1 is executed.
S2001a, the control terminal sends a first updating message to the controlled terminal.
S2001b1, the management and control terminal sends a policy modification request to the server, where the request carries the first policy identifier and the second policy information.
And the server generates a third control strategy according to the second strategy information, and replaces the control strategy corresponding to the first strategy identifier in the shared information to be the third control strategy.
S2001b2, the server sends a first update message to the controlled terminal.
The first update message at least carries a first policy identifier to instruct the controlled terminal to acquire a third control policy according to the first policy identifier and replace a second operation corresponding to a second control policy being executed by the controlled terminal, wherein the second control policy corresponds to the first policy identifier. The first update message may also carry a third control policy, and the controlled terminal may directly obtain the third control policy.
It should be noted that at most one control policy corresponding to the first policy identifier exists in the controlled terminal, and the operation corresponding to the control policy is in an execution state, that is, the second control policy and the second operation.
In addition, before the execution of S2001a or S2001b2, the policing terminal or the server determines a second identity of at least one controlled terminal according to the shared record table, and then transmits a first update message according to the second identity.
The controlled terminal, after receiving the first update message, may perform S2002a or S2002 b:
s2002a, the controlled terminal sends a first downloading strategy request to the control terminal.
S2002b, the controlled terminal sends a second download policy request to the server.
In addition, if the third control policy is carried in the first update message, S2002a and S2002b may be omitted, and S2004 is directly executed.
And S2003, the control terminal or the server feeds back a third control strategy to the controlled terminal.
And S2004, the controlled terminal receives the third control strategy, and determines and executes a third operation corresponding to the third control strategy.
In addition, before the third operation is executed, a second operation corresponding to a second control strategy is being executed in the controlled terminal, and the second control strategy corresponds to the first strategy identification. At this point, the second operation should be undone.
(3) And (4) revoking the policy control. Including the processes S3000-S3002.
S3000, the control terminal receives a revocation instruction, and the instruction carries the first strategy identification.
According to the withdrawal instruction, the administrative terminal may execute S3001a, and also S3001b1-S3001b 3:
s3001a, the control terminal sends a second update message to the controlled terminal.
S3001b1, the management and control terminal sends a request for revoking the policy to the server, and the request carries the first policy identifier.
S3001b2, the server sends a second update message to the controlled terminal.
The first policy identification is carried in the second update message in S3001a and S3001b 2.
Before sending the second update message, the management and control terminal or the server determines a second identity of at least one controlled terminal according to the shared record table, and then sends the second update message according to the second identity.
S3001b3, after the server receives the revocation policy request, the server may immediately feed back processing information of the revocation operation to the administrative terminal.
And S3002, after receiving the second update message, the controlled terminal cancels the second operation corresponding to the currently running second control strategy, and the second control strategy corresponds to the first strategy identifier. It should be noted that, as a terminal, compared to a server, the security, stability and function of the management and control terminal are inferior, and therefore, in the operation of issuing a policy and maintaining shared information, the management and control terminal mostly depends on the server. However, although the server is powerful enough, there are many controlled terminals involved, and the controlled terminals may exist in a remote area, so that the controlled terminals cannot communicate with the server, and the control policy may not be issued in place in time. And as the controlled terminal, the terminal can also select not to receive the strategy issued by the control terminal according to the self execution capacity or environment until the terminal recovers communication with the server, and receives the control strategy issued by the server. In addition, at a designated place, after the control terminal and the server determine the policy identifier, the control terminal directly manages the controlled terminal.
The terminal management method is respectively applied to a control terminal, a server and a controlled terminal. After receiving the control instruction, the control terminal determines a first policy identifier through the server, and determines a control policy corresponding to the first policy identifier. The control terminal generates and displays the first strategy two-dimensional code according to the first strategy identifier, and receives the scanning of the controlled terminal to acquire the second strategy information, so that the controlled terminal can acquire the control strategy in any place or under any situation as long as the controlled terminal has the function of scanning the two-dimensional code, and is not limited by the environment. In addition, when the control strategy is issued to the controlled terminal, the control strategy can be issued to the controlled terminal through the control terminal besides the traditional issuing through the server, and an issuing mode is provided. In addition, whether the server or the control terminal sends the policy information to the controlled terminal, sends the policy information according to the policy modification instruction, and cancels the operation according to the policy cancellation instruction, and the technical means also makes the management for the controlled terminal more flexible. Therefore, the terminal management method provided by the application can break through fence limitations of geographic positions, Wifi and the like, and is flexibly applied to management of the pipe control terminal in various situations and places.
An embodiment of the present application provides a management and control apparatus, as shown in fig. 5, the management and control apparatus 50 may include: a transceiver module 501, a management module 502, and a presentation unit 5021 included in the management module 502, wherein,
the transceiver module 501 is configured to receive a control instruction carrying first policy information and input by a user, and send a policy control request to a server in response to the control instruction, so as to determine a first policy identifier, where the first policy identifier corresponds to the first policy information.
And the management module 502 is configured to manage the controlled terminal through the first policy identifier fed back by the server.
In the embodiment of the present application, a possible implementation manner is provided, where the management module 502 includes a presentation unit 5021, and the management module 502 manages the controlled terminal through the first policy identifier fed back by the server through the presentation unit 5021, and is specifically configured to:
the displaying unit 5021 displays a first policy two-dimensional code corresponding to a first policy identifier of the second update message, so that the controlled terminal can scan to obtain a first control policy, where the first control policy is a control policy corresponding to the first policy identifier in the shared information at the current time, and the shared information is information shared between the control terminal and the server.
In the embodiment of the present application, a possible implementation manner is provided, and the management module 502 is further specifically configured to, in managing the controlled terminal through the first policy identifier fed back by the server:
when receiving a modification instruction carrying second policy information, sending a modification policy request carrying a first policy identifier and the second policy information to a server through a transceiver module 501 to instruct the server to send a first update message, or sending the first update message to a controlled terminal, wherein the first update message at least carries the first policy identifier and is used for notifying the controlled terminal to update a control policy;
alternatively, the first and second electrodes may be,
when receiving the revocation instruction, the transceiver module 501 sends a revocation policy request carrying the first policy identifier to the server to instruct the server to send a second update message, or sends the second update message to the controlled terminal, where the second update message carries the first policy identifier and is used to notify the controlled terminal to terminate executing a second operation corresponding to a second control policy, and the second control policy is a control policy corresponding to a second operation currently executed by the controlled terminal and corresponds to the first policy identifier.
The apparatus 50 of this embodiment may execute the terminal management method applied to the management control terminal shown in the foregoing embodiments of this application, which is similar to the foregoing implementation principles and is not described herein again.
The embodiment of the present application provides a controlled device, and as shown in fig. 6, the controlled device 60 may include: a determination module 601, an acquisition module 602, an execution module 603, and a scanning unit 6011 in the determination module 601, wherein,
the scanning unit 6011 is configured to scan the first policy two-dimensional code displayed by the management and control terminal;
the determining module 601 is configured to determine a first policy identifier by scanning a first policy two-dimensional code displayed by a management and control terminal;
the executing module 603 is configured to execute a corresponding operation according to the first policy identifier.
In the embodiment of the present application, a possible implementation manner is provided, and the executing module 603 is specifically configured to, in executing a corresponding operation according to the first policy identifier:
when it is determined that there is no control policy corresponding to the first policy identifier in the controlled terminal, the obtaining module 602 obtains the first control policy according to the first policy identifier, where the first control policy is a control policy corresponding to the first policy identifier in the shared information at the current time, and the shared information is information shared between the control terminal and the server;
determining and executing a first operation corresponding to the first control strategy through a determining module 601;
alternatively, the first and second electrodes may be,
when a first updating message carrying a first strategy identifier is received, updating a control strategy according to the first strategy identifier;
alternatively, the first and second electrodes may be,
and when a second updating message carrying the first strategy identification is received, terminating executing a second operation corresponding to a second control strategy according to the first strategy identification, wherein the second control strategy is a control strategy corresponding to the currently executed second operation and corresponds to the first strategy identification.
The apparatus 60 of this embodiment can execute the terminal management method applied to the controlled terminal shown in the foregoing embodiments of this application, and the implementation principles thereof are similar and will not be described herein again.
An embodiment of the present application provides a terminal device, and the terminal device includes:
a processor; and
a memory configured to store machine readable instructions which, when executed by the processor, cause the processor to perform a terminal management method applied to a policing terminal as shown in the foregoing method embodiments.
An embodiment of the present application provides a terminal device, and the terminal device includes:
a processor; and
a memory configured to store machine readable instructions which, when executed by the processor, cause the processor to perform a terminal management method applied to a controlled terminal as shown in the foregoing method embodiments.
The embodiment of the present application provides a computer-readable storage medium, which is used for storing computer instructions, when the computer instructions are run on a computer, the computer may be enabled to execute a terminal management method applied to a management and control terminal, which is shown in the foregoing method embodiment.
The embodiment of the present application provides a computer-readable storage medium, which is used for storing computer instructions, and when the computer instructions are run on a computer, the computer is enabled to execute the terminal management method applied to the controlled terminal, which is shown in the foregoing method embodiment.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A terminal management method is applied to a control terminal and comprises the following steps:
responding to a control instruction carrying first policy information, and sending a policy control request to a server to determine a first policy identifier corresponding to the first policy information;
and managing the controlled terminal through the first strategy identification fed back by the server.
2. The method of claim 1, wherein managing the controlled terminal via the first policy identity comprises:
and displaying a first policy two-dimensional code corresponding to the first policy identifier so that the controlled terminal can scan to acquire a first control policy, wherein the first control policy is a control policy corresponding to the first policy identifier in shared information at the current moment, and the shared information is information shared between the control terminal and the server.
3. The method according to claim 1 or 2, wherein the managing the controlled terminal by the first policy identification further comprises:
when a modification instruction carrying second policy information is received, sending a modification policy request carrying a first policy identifier and the second policy information to the server to instruct the server to send a first update message, or sending a first update message to the controlled terminal, wherein the first update message at least carries the first policy identifier and is used for notifying the controlled terminal to update a control policy;
alternatively, the first and second electrodes may be,
when a revocation instruction is received, sending a revocation policy request carrying the first policy identifier to the server to instruct the server to send a second update message, or sending the second update message to the controlled terminal, where the second update message carries the first policy identifier and is used to notify the controlled terminal to terminate executing a second operation corresponding to a second control policy, and the second control policy is a control policy corresponding to the second operation currently executed by the controlled terminal and corresponds to the first policy identifier.
4. A terminal management method is applied to a server and comprises the following steps:
responding to a policy control request which is sent by a control terminal and carries first policy information, determining a first policy identifier corresponding to the first policy information, and feeding back the first policy identifier;
when a second downloading strategy request carrying the first strategy identification and sent by a controlled terminal is received, sending a first control strategy to the controlled terminal, wherein the first control strategy is a control strategy corresponding to the first strategy identification in shared information at the current moment, and the shared information is information shared between the control terminal and a server;
alternatively, the first and second electrodes may be,
when a policy modification request which is sent by the control terminal and carries the first policy identifier and the second policy information is received, sending a first update message which at least carries the first policy identifier to the controlled terminal, wherein the first update message is used for informing the controlled terminal of updating the control policy;
alternatively, the first and second electrodes may be,
and when a policy revocation request sent by the control terminal is received, sending a second update message carrying the first policy identifier to the controlled terminal, wherein the second update message is used for notifying the controlled terminal to terminate executing a second operation corresponding to a second control policy, and the second control policy is a control policy corresponding to the second operation currently executed by the controlled terminal and corresponds to the first policy identifier.
5. A terminal management method is applied to a controlled terminal and comprises the following steps:
determining a first strategy identifier by scanning a first strategy two-dimensional code displayed by a control terminal;
and executing corresponding operation according to the first strategy identification.
6. The method of claim 5, wherein performing the corresponding operation according to the first policy identifier comprises:
when it is determined that there is no control policy corresponding to the first policy identifier in the controlled terminal, acquiring a first control policy according to the first policy identifier, where the first control policy is a control policy corresponding to the first policy identifier in shared information at the current time, and the shared information is information shared between the control terminal and the server;
determining and executing a first operation corresponding to the first control strategy;
alternatively, the first and second electrodes may be,
when a first updating message carrying the first strategy identification is received, updating a control strategy according to the first strategy identification;
alternatively, the first and second electrodes may be,
and when a second updating message carrying the first strategy identification is received, terminating executing a second operation corresponding to a second control strategy according to the first strategy identification, wherein the second control strategy is a control strategy corresponding to the currently executed second operation and corresponds to the first strategy identification.
7. A management device, comprising:
the system comprises a receiving and sending module, a sending and receiving module and a sending and receiving module, wherein the receiving and sending module is used for receiving a control instruction carrying first strategy information and responding to the control instruction and sending a strategy control request to a server so as to determine a first strategy identifier corresponding to the first strategy information;
and the management module is used for managing the controlled terminal through the first strategy identifier fed back by the server.
8. A controlled device, comprising:
the determining module is used for determining a first strategy identifier by scanning a first strategy two-dimensional code displayed by the control terminal;
and the execution module is used for executing corresponding operation according to the first strategy identifier.
9. A terminal device, characterized in that the terminal device comprises:
a processor; and
a memory configured to store machine-readable instructions that, when executed by the processor, cause the processor to perform the terminal management method of any of claims 1-3, or claims 5-6.
10. A computer-readable storage medium for storing computer instructions which, when executed on a computer, cause the computer to perform the terminal management method of any one of claims 1 to 3 or claims 5 to 6.
CN202110705901.0A 2021-06-24 2021-06-24 Terminal management method, device, equipment and storage medium Active CN113438602B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110705901.0A CN113438602B (en) 2021-06-24 2021-06-24 Terminal management method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110705901.0A CN113438602B (en) 2021-06-24 2021-06-24 Terminal management method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113438602A true CN113438602A (en) 2021-09-24
CN113438602B CN113438602B (en) 2023-09-22

Family

ID=77754007

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110705901.0A Active CN113438602B (en) 2021-06-24 2021-06-24 Terminal management method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113438602B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115883259A (en) * 2023-02-23 2023-03-31 成都万创科技股份有限公司 Mobile equipment management and control method and device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801964A (en) * 2006-01-10 2006-07-12 北京神州信标科技有限公司 System and method for providing service for mobile terminal using identify code
CN101132391A (en) * 2006-08-22 2008-02-27 华为技术有限公司 System and method for controlling application
US20090295911A1 (en) * 2008-01-03 2009-12-03 International Business Machines Corporation Identifying a Locale for Controlling Capture of Data by a Digital Life Recorder Based on Location
CN104750458A (en) * 2013-12-26 2015-07-01 三亚中兴软件有限责任公司 Control method, control device, monitoring processing method and monitoring processing device for terminal application
CN105451217A (en) * 2014-09-24 2016-03-30 中兴通讯股份有限公司 Terminal device control method, terminal device and terminal device control system
CN106941411A (en) * 2017-01-24 2017-07-11 北京元心科技有限公司 Terminal management-control method and system
CN107241298A (en) * 2016-03-29 2017-10-10 阿里巴巴集团控股有限公司 One kind application management-control method, terminal and system
CN108900716A (en) * 2018-07-25 2018-11-27 努比亚技术有限公司 A kind of conference management apparatus, method and computer readable storage medium
CN108954661A (en) * 2018-08-01 2018-12-07 宁波奥克斯电气股份有限公司 A kind of air conditioner Authority sharing control method, device and server
CN109917667A (en) * 2019-03-31 2019-06-21 广东美的制冷设备有限公司 Household appliance and its control authority sharing method, controlling terminal and storage medium
CN110851244A (en) * 2019-09-15 2020-02-28 广西信恒科技有限公司 Intelligent terminal application management method and system based on time strategy

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801964A (en) * 2006-01-10 2006-07-12 北京神州信标科技有限公司 System and method for providing service for mobile terminal using identify code
CN101132391A (en) * 2006-08-22 2008-02-27 华为技术有限公司 System and method for controlling application
US20090295911A1 (en) * 2008-01-03 2009-12-03 International Business Machines Corporation Identifying a Locale for Controlling Capture of Data by a Digital Life Recorder Based on Location
CN104750458A (en) * 2013-12-26 2015-07-01 三亚中兴软件有限责任公司 Control method, control device, monitoring processing method and monitoring processing device for terminal application
CN105451217A (en) * 2014-09-24 2016-03-30 中兴通讯股份有限公司 Terminal device control method, terminal device and terminal device control system
CN107241298A (en) * 2016-03-29 2017-10-10 阿里巴巴集团控股有限公司 One kind application management-control method, terminal and system
CN106941411A (en) * 2017-01-24 2017-07-11 北京元心科技有限公司 Terminal management-control method and system
CN108900716A (en) * 2018-07-25 2018-11-27 努比亚技术有限公司 A kind of conference management apparatus, method and computer readable storage medium
CN108954661A (en) * 2018-08-01 2018-12-07 宁波奥克斯电气股份有限公司 A kind of air conditioner Authority sharing control method, device and server
CN109917667A (en) * 2019-03-31 2019-06-21 广东美的制冷设备有限公司 Household appliance and its control authority sharing method, controlling terminal and storage medium
CN110851244A (en) * 2019-09-15 2020-02-28 广西信恒科技有限公司 Intelligent terminal application management method and system based on time strategy

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115883259A (en) * 2023-02-23 2023-03-31 成都万创科技股份有限公司 Mobile equipment management and control method and device
CN115883259B (en) * 2023-02-23 2023-04-28 成都万创科技股份有限公司 Mobile equipment management and control method and device

Also Published As

Publication number Publication date
CN113438602B (en) 2023-09-22

Similar Documents

Publication Publication Date Title
CN101600076B (en) Video editing system, video editing server and communication terminal
JP3949678B2 (en) Centralized contact list
CN1561631B (en) Method for providing communication information of a communication unit and devices for carrying out said method
CN104093136A (en) Method and system for obtaining virtual numbers and virtual number service platform
CN105592168A (en) Remotely locating and commanding a mobile device
CN102413169A (en) Cloud address list establishing and maintenance method and system thereof
US9398101B2 (en) Systems and methods for communicating
CN111224795B (en) Group application processing method and device, electronic equipment and storage medium
JP2008092531A (en) Function updating system, and function updating method
CN104468469A (en) Method and system for arranging by using mobile terminal
US20110196953A1 (en) Contact manager method and system
CN101005710B (en) Method and system for realizing position service in radio communication network and position service platform
CN113438602A (en) Terminal management method, device, equipment and storage medium
CN105120117A (en) Call interaction method and device
KR20140039808A (en) Wireless communication system in wifi environment for vessels
CN110807537A (en) Conference room reservation processing method and device, electronic equipment and storage medium
JP2012088860A (en) Service providing system and service providing method
JP4527772B2 (en) Mobile communication system and portable terminal
KR20060030631A (en) Apparatus and method of share album service
CN112188401B (en) Positioning communication method and device based on Geographic Information System (GIS)
WO2016131257A1 (en) Method and device for information storage, acquisition, and processing
KR102353933B1 (en) Operation method of call app for business visit management, operation method of call monitoring app for business visit management, business visit management system and application stored in computer-readable storage media
JP4772644B2 (en) Message message distribution system and message message distribution method
JP2010074359A (en) Schedule notification system, schedule notifying method, and schedule notification program
CN101908167A (en) Device customizing system, device customizing method and authentication proxy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant