WO2008019556A1 - A method for executing management operation by communication terminal and a terminal and system thereof - Google Patents
A method for executing management operation by communication terminal and a terminal and system thereof Download PDFInfo
- Publication number
- WO2008019556A1 WO2008019556A1 PCT/CN2007/001371 CN2007001371W WO2008019556A1 WO 2008019556 A1 WO2008019556 A1 WO 2008019556A1 CN 2007001371 W CN2007001371 W CN 2007001371W WO 2008019556 A1 WO2008019556 A1 WO 2008019556A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- device capability
- management
- node
- terminal
- state
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/32—Specific management aspects for broadband networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0866—Checking the configuration
- H04L41/0869—Validating the configuration within one network element
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
Definitions
- the present invention relates to the field of communication technologies, and in particular, to a method, terminal and system for a terminal to perform a management operation in a communication system.
- Open Mobile Alliance Device Management provides a new management solution for third-party management and setting of environment and configuration information for terminals in wireless networks, such as mobile terminals and functional objects in terminals. Solve the problems encountered by the terminal during use, perform software installation and upgrade through wireless network, and provide more personalized and personalized services to improve user experience.
- the third party can be the information management department of the mobile operator, service provider or partner.
- FIG. 1 is a system structure diagram of an OMA DM in the prior art, in which a device management (DM) server 103 sends an operation command to a terminal 101 through a DM protocol interface, and a device management proxy unit on the terminal 101.
- DM device management
- 102 Device Management Agent
- the management tree stored on the terminal 101 is an interface for the DM server to manage the terminal through the DM protocol.
- the management tree includes a device management object, and the DM server achieves the purpose of controlling the terminal management object by managing the object on the management tree.
- the operation commands are Get, Replace, Exec, Copy, Delete, and so on.
- the management of software components can be implemented by adding, deleting, modifying, etc. the software component management objects (SCoMO, S of ware Component Management Obj ect) on the terminal.
- Software components include executable applications, dynamic link libraries, and more. These software can be provided by multiple software providers.
- the MO is preset in the terminal, for example, all software components installed on the DMA scanning terminal are generated and associated MOs are added to the management tree; software for the DM server to be sent to the terminal
- the component the MO is generated by the DM server to issue an operation command;
- the terminal's diagnostic monitoring terminal (Diagnostic and Monitoring Enabler) monitors the installation event in the terminal, and the software
- the component information is reported to the DM server, and the DM server issues an operation command to generate the corresponding MO.
- the inventors have found that in the above-mentioned existing DM solution, the operation of the software component MO on the terminal is managed and controlled by the DM server; the device capabilities on the terminal are directly operated by the user.
- the DM server With the strengthening of information confidentiality, in many confidential areas, it is necessary to prohibit the camera equipment on the terminal from using photographing and camera functions. However, it is necessary to supervise that all users are not allowed to use certain equipment on the terminal in the secret area. It is very difficult.
- the embodiments of the present invention provide a method, a terminal, and a system for performing a management operation on a terminal in a communication system, which can centrally manage and control the capabilities of the terminal.
- An embodiment of the present invention provides a method for a terminal to perform a management operation in a communication system, where a terminal operates a target operation node in a device capability management object indicated by a received management operation command; and the target operation node triggers execution corresponding to the target operation node A device capability management operation that migrates a state of the device capability.
- the embodiment of the present invention further provides a terminal for performing a management operation, where the terminal includes a device management agent unit and a device capability management agent unit, where the device management agent unit is configured to indicate the received management operation command. a target operation node operation of the device capability management object; the device capability management agent unit is configured to perform a device capability management operation corresponding to the target operation node operation performed by the device management agent unit, where the device capability management operation is used for migration The state of the device capability.
- the embodiment of the present invention further provides a communication system for implementing terminal management, where the system includes a terminal and a device management server, and the device management server is configured to send a management operation command to the terminal, where the management operation command includes a requesting terminal. Indication information for the operation of the target operation node of the device capability management object;
- the terminal includes a device management agent unit and a device capability management agent unit, where The device management agent unit is configured to operate on a target operation node of the device capability management object indicated by the received management operation command; the device capability management agent unit is configured to perform a target operation node operation performed by the device management agent unit Corresponding device capability management operations, the device capability management operations are used to migrate the state of the device capabilities.
- the terminal can perform operation on the target operation node of the device capability management object according to the management operation command received by the terminal, and trigger execution on the target operation node operation.
- the corresponding device capability management operation further moves the device capability state of the terminal to a state desired by the management operation command initiator.
- the management operation command initiator can centrally manage and control the device capabilities of the terminal through the management operation command, for example, in an area where confidentiality cannot be photographed or downloaded, and the management and control of the terminal device capability status in the area is realized.
- FIG. 1 is a system structural diagram of an OMA DM in the prior art
- Figure 2 is a flow chart of an embodiment of the method of the present invention.
- FIG. 3 is a schematic diagram of a first embodiment of a device capability MO structure of the present invention.
- FIG. 4 is a schematic view showing a second embodiment of the device capability MO structure of the present invention.
- Figure 5 is a schematic view showing a third embodiment of the device capability MO structure of the present invention.
- Figure 6 is a schematic diagram of state transition of commands and device capabilities delivered by the DM server
- FIG. 7 is a schematic diagram of state transitions of commands and device capabilities issued by a user
- Figure 8 is a flow chart of applying the first embodiment of the present invention.
- Figure 9 is a flow chart of a second embodiment to which the present invention is applied.
- Figure 10 is a schematic illustration of an embodiment of the system of the present invention.
- an MO node is stored in a device management tree of the terminal, including device capability MO, software component MO, firmware update MO, connection parameter MO, Scheduling task MO, diagnostic monitoring MO, etc., device capability MO
- the node corresponds to the device capability management operation, and the operation of the device capability MO node on the management tree triggers the device capability management operation corresponding to the node operation.
- Device capabilities are primarily hardware related capabilities, including but not limited to USB, Camera, Bluetooth, Infrared, and more.
- Step S201 The device management agent unit of the terminal operates on the target operation node in the device capability MO of the terminal by using the received management operation command, that is, the terminal operates on the target operation node in the device capability MO indicated in the management operation command.
- Step S202 The operation of the target operation node triggers the device capability management agent unit of the terminal to perform a corresponding device capability management operation, where the device capability management operation migrates the state of the device capability.
- the corresponding device capability operation is triggered by the operation of the target operation node in the device capability MO.
- the structure of the device capability MO is shown in FIG. 3 .
- the child nodes under the Operations node shown in Figure 3 include the Enable node, the Disable node, the Start node, the Stop node, the Update node, and Remove. ) Nodes and often used Ext nodes. Since the Ext node is a general-purpose node, it will not be introduced. The following is a detailed description of the remaining child nodes:
- the Enable node There are two nodes inside the Enable node: ServerlD (Service Identification) node and Code (Code) node.
- the Server1D node stores the device management server identifier, the device management server identifier is written by the terminal, and the device management server has only read permission for the node, and does not modify the permission.
- the Code node is used to store the authentication code entered by the user or device management server that initiated the management operation command.
- one of the device management servers has the highest management authority (the authentication code corresponding to the terminal is stored), if the remaining device management server or the user needs to enable the related device capability of the terminal, then The device management server with the highest management authority needs to send a request, obtain an authentication code from the device management server with the highest management authority, and input the authentication code to the Enable/Code node to enable the device capability of the terminal.
- Disable node There are three nodes inside the Disable node: Keep-Temp (temporary/forced) node, Code node,
- the Keep_Temp node is used to indicate whether the disable is forced or temporarily disabled, and the node is in the form of an indicator.
- the Disable/Code node is used to store an authentication code, which is delivered by the device management server with the highest management authority and is invisible to the user.
- the server wants to enable the device capability of the terminal, it needs to apply for and obtain the authentication code from the device management server that has the highest management right of the terminal. Then, the terminal inputs the user or other device management server through the authentication code stored in the Disable/Code node.
- the authentication code to the Enable/Code node is validated.
- the timeout node stores the duration, which is used to enable the device to automatically enable the device capability if it has not been enabled within the specified time after the forced disable (Keep Disable), thereby avoiding the device capability of the terminal in an abnormal situation. Long-term forced to disable.
- the operations stored on the nodes of Enable, Disable, Start:, Stop, Update, and Remove may be an operation indicator, and the attributes corresponding to each node are shown in Table 1 to Table 12.
- the number of occurrences refers to the number of times the node may appear on the MO of the management tree, and the format is the type of the operation indicator.
- the operation indicator may be a character type or a Boolean type, and the minimum access type is the DM server. The type of operation that the node can perform.
- the Server1D node stores the device management server identifier, the device management server identifier is written by the terminal, and the device management server has only read permission for the node, and is not modified. ⁇ X>/Operation/Enable/Code
- the Code node is used to store an authentication code required by the user or the device management server to enable the capability of the terminal device.
- the Disable node is used to disable device capabilities, and the server with permissions can disable device capabilities by executing this section.
- the Disable node is used to disable device capabilities.
- the disable is divided into Keep Disable and Temp Disable.
- KeepJTemp node you can indicate whether the device capability is forcibly disabled or temporarily disabled.
- the value of the Keep-Temp node indicator can be modified to indicate whether the disable when the Disable node is executed is forced disable or temporarily disabled.
- the Disable/Code node is used to store the device-capable authentication code delivered by the device management server with the highest administrative authority.
- the authentication code is invisible to the user.
- the authentication code input by the user needs to be written into the Enable /Code node, and then the terminal should verify the authentication code under the Enable/Code node according to the authentication code under the Disable/Code node. If the face certificate is valid, it is considered that the enabling of the terminal device capability is valid, otherwise, it is considered invalid.
- the Timeout node is used to store a specified duration of the preset. If the device capability has not been restored to the enabled state within the specified time, the terminal automatically enables the device capability without the device management server being enabled. This kind of processing scheme can avoid the device capability being forcibly disabled for a long time due to abnormal conditions.
- the Start node is used to enable the device capability (the device capability includes the internal device capability and the external device capability), and the server completes the opening of the device capability by performing the operation of the node.
- the device capability includes the internal device capability and the external device capability
- the server completes the opening of the device capability by performing the operation of the node.
- enabling is not the same as Start.
- the camera device capability of the terminal When the terminal performs the enable operation, it only indicates that the terminal has the capability of capturing the device, but the terminal does not actually go to the camera. If you want to actually shoot, you need to perform an open operation.
- enabling is equivalent to turning on. In this case, you only need to set one to enable the node and open the node.
- the Stop node is used to shut down the device capability, and the server completes the shutdown of the device capability by performing the operation of the node.
- the difference between “Stop” and “Disable” is similar to the difference between “Start” and “Enable”, so it will not be described again.
- the Remove node is used to remove device capabilities. ⁇ X>/Status
- the status (Status) node on the device capability management tree at the same level as the Operations node is used to store the current device capability status of the terminal.
- the possible device capability status of the terminal includes Enable, Temp Disable, and Force Disable. (Keep Disable), Ready and Start. Refer to FIG. 6 for the relationship between the device capability management operation triggered by the operation of each target operation node and the state transition of the device capability.
- the device capability status of the terminal includes the following types of management operation commands from the DM server to the target operation node. :
- Enable (Enable) status indicating that the device capability is already enabled.
- Temporarily disable (Temp Disable) status indicating that the device capability of the terminal is temporarily disabled. Users must use the Enable management operation to re-enable the device capability.
- the server can also deliver corresponding management operations (such as Enable or Keep Disable).
- a change in the capability status of the device a state of the "Keep Disable” state, indicating that the device capability of the terminal is forcibly disabled, and the user cannot change the state of the device capability by operating the target operation node on the management tree;
- the change can only be changed by the server issuing the corresponding management operation (such as Enable or Temp Disable).
- the (Start) state indicates that the device capability of the terminal is on.
- the user's operation on the terminal capability is to directly initiate an operation to the device management agent unit through the interaction interface of the terminal, or send a command to the device management agent unit through the smart card on the terminal.
- FIG. 7 For the migration of commands and device capability states for the user to operate the target operation node of the device capability MO on the management tree through the terminal, refer to FIG. 7, wherein, because the user cannot migrate the state of the device capability on the terminal to the forced disable state, Compared with Figure 6, the state of the device capability is only a state of forced disable.
- the operation commands that can be executed also lack the forced disable operation. Because the device capability is in the forced disable state, the permission of the user and the DM server needs to be determined, and the user and the DM server can be executed.
- the management operation is different. When the device capability is in the forced disable state, the user cannot perform any management operation to change its state, that is, the DM server has higher device capability management authority than the user.
- the command operations from the DM server and the command operations from the user are shown in the following table, which shows the various management operations available to the terminal's device capabilities in various states.
- FIG. 3 is only an example, and the device capability management object structure in actual application is not limited thereto, and different structures may be set for terminals having different device capabilities.
- Device capability management object another device capability management object structure is given below.
- FIG. 4 is a schematic diagram of a second embodiment of a device capability management object structure according to the present invention.
- the structure of the device capability management object shown in this embodiment differs from the structure of the first embodiment shown in FIG. 3 mainly in that: in the first embodiment, the two devices, Keep Disable and Temp Disable, can be enabled.
- the force management operations are collectively mapped to the same target operating node (Keep-Temp node); in the second embodiment, the two device capability management operations, Keep Disable and Temp Disable, respectively correspond to one target operating node, that is, the Keep Disable management operation corresponds to For the Keep Disable node, the Temp Disable management operation corresponds to the Temp Disable node.
- the child node (such as the Server1D node, the Code node, and the Timeout node in FIG. 3) is no longer set under the Enable node, the Keep Disable node, and the Temp Disable node, and has already described the structure shown in FIG. It is mentioned that the ServerlD node and the Code node are needed to implement the authentication code related technical solution, and the Timeout node is needed to avoid the abnormal situation and the device capability is forcibly disabled for a long time. Therefore, these nodes are optional nodes.
- the second embodiment shown in 4 is a scheme in which these optional nodes are not provided.
- the other nodes shown in FIG. 4 such as the Start node, the Stop node, the Update node, and the Remove node, are the same as the node of the same name shown in FIG. 3, and therefore will not be described again.
- FIG. 5 is a schematic diagram of a third embodiment of a device capability management object structure according to the present invention.
- the main difference between the third embodiment of the device capability management object structure shown in FIG. 5 and the first embodiment shown in FIG. 3 is that: in the third embodiment, the three device capability management operations of Enable, Keep Disable, and Temp Disable are performed.
- the device corresponds to the same target operation node Enable_Disable node. If the device management server or the user wants to perform the above three device capability management operations, the value of the node needs to be directly modified, and the modified device value management operation is different. For example, if the Enable_Disable node value is changed to 0, the corresponding is the Enable management operation, and the modification to 1 corresponds to the Temp Disable management operation, and the modification to 2 corresponds to the Keep Disable management operation.
- the child nodes under the Operations node include the Policy node, the Start node, the Stop node, the Update node, and the Remove node; the child node under Policy has Enable— Disable, ServerlD, Code, Timeout four child nodes, these four child nodes are leaf nodes, the description of these nodes is as follows:
- the Enable-Disable node can perform three types of device capability management operations: EnaWe, Temp Disable, and Keep Disable device capability management operations.
- the Enable-Disable node can be an indicator node, and its value can be three values.
- the operations performed ie, modifying the node values) differ from the specific device capability management operations that are performed.
- the data structure of the internal node of Policy is as follows:
- the Code node is used to verify the validity of the device capability management operation, and the Code node writes the authentication code by the device management server, and then authenticates the authentication code input by the initiator of the management operation command.
- Timeout node The meaning of the Timeout node is the same as that of the Timeout node in Figure 3, so it will not be described again.
- the first embodiment of the method of the present invention is described in detail below with reference to FIG. 7.
- the related operations of the Enable node in the device capability management object structure shown in FIG. 3 are taken as an example for description.
- Step S601 The external system sends a management operation request to the device capability management server through the browser service interface (WSI, Web Service Interface) protocol.
- WSI Web Service Interface
- Step S602 The device capability management server performs identity verification on the external system and syntax verification of the related management operation, and generates a device capability management operation command corresponding to the device capability management request, and then sends the device capability management operation command to the device. Management server.
- Step S603 The device management server delivers the device capability management operation command to the device management agent unit of the terminal, and the delivery mode of the management operation command is completed by the device management server to the operation of the executable node on the management tree.
- the authentication code (optional) that enables the capability of the terminal device is sent first, and then the Enable node is executed by issuing an executable command, and the target operation node corresponding to the management operation is directly executed, for example:
- each device capability of the terminal corresponds to a set of device capabilities MO
- the management operation command indicates the target operation node in a specific device capability management object, so By managing the path information of the target operation node in the operation command, the terminal can know which specific device capability is to be performed for the management operation.
- Step S604 The device management agent unit operates the node of the device capability MO on the management tree according to the device capability management operation command delivered by the device management server, and executes the corresponding target operation node Enable on the management tree by using a command.
- Step S605 The device management agent unit operates on the target operation node Enable node on the management tree, and triggers the notification device capability management agent unit to perform a device capability management operation corresponding to the Enable node operation.
- the path in operation represents which device or device capability is being operated.
- Step S606 The device capability management agent unit performs the corresponding device capability management operation after receiving the notification of the device management agent unit.
- the device capability management agent unit In order to ensure that the device capability management operation to be performed by the device management agent unit is effective, the device capability management agent unit must first legalize the device capability management operation (ie, validity) before performing the corresponding device capability management operation. )authenticating. On the one hand, the authentication code input by the initiator of the management operation command is verified, mainly to confirm that the management operation command initiator has sufficient authority; on the other hand, whether the device capability management operation is verified in the current state of the terminal device capability For effective management operations, this is mainly because when a device capability of the terminal is in a certain state, only a part of the management operations can be performed.
- the reason for setting the authentication code is to prevent the device management server from being disabled for a long time due to abnormal conditions. In this abnormal situation, the user can obtain the authentication code from the device management server, thereby enabling the device of the terminal to be enabled by itself. Therefore, the technical solution of the embodiment of the present invention is further improved. Of course, if the information indicated by the device capability management operation command received by the terminal is not "Enable", the relevant steps of the authentication code verification are not required.
- the terminal only determines whether the enabling operation to be performed is valid according to the management operation command initiator information. If the terminal recognizes that the initiator is a DM server, it considers that the enabling operation is valid, and then performs the enabling operation; If the initiator is a user, the enable operation is invalid and the enable operation is not performed. Correspondingly, the Enable node and the Disable node in the terminal management tree do not need to create a Code node. When the device capability of the terminal is in the forced disable state, the initiator of the Enable management operation command does not need to input the authentication code, and then the device capability management agent. The unit also has no steps to verify the authentication code.
- Step S607 The device capability management agent unit transmits the device capability management operation result to the device management agent unit.
- Step S608 The device management agent unit sends the device capability management operation result to the device management server by using the DM protocol.
- Step S609 The device management server sends the device capability management operation result to the device capability management server.
- Step S610 The device capability management server sends the device capability management operation result to the external system according to the policy.
- the external system performs subsequent operations based on the results of the device capability management. At this point, the device capability management on the terminal is completed.
- the target operating node may be an executable node or an indicator node.
- the device capability management agent unit When the target operation node on the device capability management tree is an indicator node, the device capability management agent unit generally cannot directly receive the notification message of the device capability management operation of the device management agent unit, and therefore requires a third-party monitoring unit pair.
- the value of the target operational node of the device capability is monitored, and the change of the target operational node value triggers the monitoring unit to notify the device capability management agent unit to perform the corresponding device capability management operation.
- the monitoring unit of the third party can be implemented by a monitoring program, which can be a Scheduling task or a task of diagnostic monitoring.
- Step S701 The external system sends a device capability management operation request to the device capability management server through the WSI protocol.
- Step S702 The device capability management server performs identity verification on the external system, performs syntax verification of related management operations, and generates a device capability management operation command corresponding to the device capability management request, and then sends the device capability management operation command to the device capability management operation command.
- Device management server performs identity verification on the external system, performs syntax verification of related management operations, and generates a device capability management operation command corresponding to the device capability management request, and then sends the device capability management operation command to the device capability management operation command.
- Step S703 The device management server sends the device capability management operation command to the device management agent unit, and the device capability management operation command is sent by the DM server to the indicator node of the device capability MO on the management tree.
- an authentication code that enables the device is issued, and then a Replace command is sent to modify the value of the target operation node corresponding to the capability management operation of the device, for example:
- Step S704 The device management agent unit operates the target operation node Enable node on the device capability management tree according to the enabling operation delivered by the device management server, and the value of the operation node is modified to be true.
- Step S705 After the value of the Enable node is modified, the monitoring unit monitors that the value of the Enable operation node changes.
- Step S706 The monitoring unit notifies the device capability management agent unit to perform a corresponding device capability management operation.
- Step S707 After receiving the notification from the monitoring unit, the device capability management agent unit performs a corresponding device capability operation.
- the device capability management proxy unit first verifies the validity of the management operation before performing the corresponding device capability management operation, where the validity verification includes verifying the authentication code input by the management operation initiator, and Whether the device capability management operation is valid in the current state of the terminal device capability.
- Step S708 The device capability management agent unit transmits the device capability management operation result to the device management agent unit.
- Step S709 The device management agent unit sends the device capability management operation result to the device management server by using the DM protocol.
- Step S710 The device management server sends the device capability management operation result to the device capability management server.
- Step S711 The device capability management server sends the device capability management operation result to the external system according to the policy.
- the external system performs subsequent operations based on the results of the device capability management operations. At this point, the device capability management on the terminal is completed.
- the management operation performed is a Start operation or a Stop operation on the device capability, and the Start operation or the Stop operation is called For use.
- API Application Programming Interface
- step S707 of the second embodiment after receiving the device capability management operation, the device capability management proxy unit needs to know the current device capability state information of the terminal, and the current device capability state information is the status node of the device capability MO. On the other hand, it is necessary to obtain the device capability management operation information corresponding to the target operation node from the device management agent unit.
- the learned current device capability status is the enabled state or the enabled state, and the learned current device capability management operation is an open operation or a closed operation (ie, the current management operation is a use operation), whether the device capability management operation is from the DM server or Users need to implement the device capability management operation through AH.
- the device capability can be determined according to the state of the device capability currently described by the terminal and the device capability management operation to be performed (ie, the device capability management operation corresponding to the operation of the target operation node). Whether the management operation can be performed, that is, whether it is a valid device capability management operation. Specific discriminating, performing device capability management operations, and status of device capabilities The migration process is as follows:
- the device capability management operation is the shutdown operation, it is determined that the device capability management operation is effective, and then the device capability management operation is performed, that is, the device capability is disabled, and the device capability is migrated. To the enabled state;
- the device capability management operation is not the shutdown operation, it is determined that the device capability management operation is invalid. If the current device capability status of the terminal is the enabled state, the device capability management operation is the open operation. The device capability management operation is determined to be effective, and then the device capability management operation is performed, that is, the device capability is enabled, and the state of the device capability is moved to the enabled state;
- the device capability management operation is determined to be effective, and then the device capability management operation is performed, that is, the device capability is temporarily disabled, and the device capability is The state is migrated to a temporarily disabled state; If the status of the device capability of the terminal is the enabled state, and the device capability management operation is a forced disable operation, it is determined that the device capability management operation is effective, and then the device capability management operation is performed, that is, the device capability is forcibly disabled, and the device capability is State transition to forced disable state;
- the device capability management operation is the removal operation, determining that the device capability management operation is effective, and then performing the device capability management operation, that is, removing the device capability of the terminal, the device The state of capability migrates to the ready state;
- the device capability management operation is not the start operation, the temporary disable operation, the forced disable operation, or the remove operation, it is determined that the device capability management operation is invalid;
- the device capability management operation determines that the device capability management operation is effective, and then performing the device capability management operation, that is, enabling the device capability, the device capability state migration To the enabled state;
- the management operation is invalid
- the device capability management operation is determined to be effective, and then the device capability management operation is performed, that is, the device capability is enabled, and the device capability state is migrated to the enabled state;
- the device capability management operation is an update operation, determining that the device capability management operation is effective, and then performing the device capability management operation, that is, updating the device capability of the terminal, the device capability The state remains in the ready state;
- the device capability management operation is not the enable operation or the update operation, the device capability management operation is determined to be invalid;
- the user and the device capability management server have different operation rights. For such operations, it is determined whether the initiator of the management operation command corresponding to the device capability management operation is from the user or from the device management server. . Specifically, it is determined whether the capability management operation of the device is valid in combination with the state of the current device capability, the device capability management operation to be performed, and the initiator information of the management operation command.
- the specific discriminating of these aspects is in no particular order. The discriminating process is as follows:
- the management operation command received by the terminal comes from The user, that is, the command sent by the user through the terminal, and the state of the device capability currently corresponding to the terminal is a forced disable state, it is determined that the device capability management operation is invalid.
- the management command is from the user, but the authentication code input to the user is valid (indicating that the user has been authorized from a device management server having a higher management authority), It is determined that the device capability management operation is effective; conversely, if the authentication code input by the user is invalid, it is determined that the device capability management operation is invalid.
- the notification is The device capability management agent unit enables the device capability, and the state of the device capability of the terminal is migrated to the enabled state; or, the state of the current device capability is a forced disable state, and the device capability management operation is a temporary disable operation, the device capability management is notified
- the proxy unit temporarily disables the device capability, and the state of the device capability of the terminal transitions to the temporarily disabled state.
- the terminal can not issue the correct management operation command to the terminal. Even if the issued management operation command is correct, the terminal can recognize the terminal. It does not have administrative rights, and then determines that the management operation command issued by it is invalid.
- the terminal device capabilities can be managed according to the actual situation, but only one device management server with the highest device capability management authority has the device device enabled to be disabled in a certain device capability of the terminal. Permissions for device capabilities. Then, only the enable operation corresponding to the management operation command delivered by the device management server with the highest device capability management authority (the current device capability is in the forced disable state) is valid; other device management servers that do not have the highest device capability management authority are delivered. The enable operation corresponding to the management operation command (current device capability is in the forced disable state) is invalid.
- FIG. 10 is a schematic diagram of an embodiment of a communication system for implementing terminal management according to the present invention.
- the communication system mainly includes a terminal 800 and a device management server 803.
- the device management server 803 is configured to send a management operation command to the terminal 800 (specifically, the device management proxy unit 802), where the management operation command includes indication information that requires the terminal to operate the target operation node of the device capability management object, for example, can represent the target. Operation node name information, if The target operation node on the terminal management tree is an indicator node, and the indication information may also include information indicating the modified value of the target operation node.
- Terminal 800 further includes a device management agent unit 802 and a device capability management agent unit 801.
- the device management agent unit 802 is configured to operate on the target operation node in the device capability management object MO indicated by the received management operation command.
- the device capability management agent unit 801 is configured to perform a device capability management operation corresponding to the target operation node operation performed by the device management agent unit 802, the device capability management operation for migrating the state of the device capability.
- the target operation node in this embodiment may be an executable node, and the device management agent unit 802 operates on the target operation node to directly execute the target operation node, and the target node operation trigger device management agent unit 802 notifies the device capability management agent unit 801. Perform the corresponding device capability management operations.
- the target operational node may also be an indicator node, and the device management proxy unit 802 operates on the target operational node to specifically modify the value of the target operational node.
- the terminal 800 further includes a monitoring unit 804, where the monitoring unit 804 is configured to monitor the value of the target operating node in the device capability management object, and monitor the value of the target operating node. After the change, the device capability management is notified to perform the corresponding device capability management operation.
- the communication system in the embodiment of the present invention further includes an external system 805 and a device capability management server 806.
- the external system 805 is configured to send a device capability management operation request to the device capability management server 806.
- the device capability management server 806 receives the device capability management operation request of the external system 805, and generates a device capability management operation request corresponding to the device.
- the management operation command for the operation of the target operation node is sent to the device management server 803.
- device capability management server 806 is also used to authenticate external system 805.
- the device capability management server 806 can also be integrated into the device management server 803. Further, the device management server 803 authenticates the external system 805, receives the device capability management operation request of the external system 805, and generates a corresponding response. The device capability management operation command then sends the generated device capability management operation command to the terminal 800.
- the device capability management operation performed by the device capability management agent unit 801 is specifically an update operation, a removal operation, an open operation, an enable operation, a close operation, a temporary disable operation, or a forced disable operation.
- the device capability management agent unit 801 migrates the state of the device capability to the ready state, the enabled state, the enabled state, the temporarily disabled state, or the forced disabled state by the device capability management operation.
- the relationship between the device capability management operation and the state transition has been described in detail in the previous section, so it will not be described here.
- the device capability management agent unit 801 specifically includes a validity discriminating unit and a device capability management operation executing unit.
- the validity determining unit is configured to determine whether the device capability management operation corresponding to the target operation node operation performed by the device management agent unit 802 is valid; and the device capability management operation execution unit is configured to determine the result of the validity determining unit.
- the device capability management operation is performed in an efficient manner.
- the validity discriminating unit further includes an obtaining unit 807, a state recognizing unit 808, an initiator recognizing unit 809, a management operation recognizing sheep element 8 10, and a right discriminating unit 8 1 4 .
- the obtaining unit 807 is configured to acquire current device capability status information of the terminal, initiator information of the management operation command, and device capability management operation information corresponding to the target operation node operation performed by the device management proxy unit;
- the status identifying unit 808 is configured to identify the current device capability status from the current device capability status information of the terminal provided by the obtaining unit 807, and send the status of the identified current device capability to the authority determining unit 814.
- the initiator identifying unit 809 is configured to identify, from the management operation command originator information provided by the obtaining unit 807, whether the initiator is the device management server 803 or the user, and send the identification result to the authority determining unit 814.
- the management operation identifying unit 810 is configured to identify the device capability management operation corresponding to the target operation node operation performed by the device management agent unit 802 from the device capability management operation information provided by the acquisition unit 807, and send it to the authority determination unit 814.
- the authority discriminating unit 814 is configured to determine, according to the discriminating basis obtained therefrom, whether the device capability management operation corresponding to the target operation node operation performed by the device management proxy unit 802 is valid, and the discriminating basis includes the state identifying unit 808 and the initiator identifying unit. 809 and management information provided by the operation recognition unit 810. If the authority discriminating unit 814 discriminates the device capability management to be performed based on the discriminating basis The operation (i.e., the device capability management operation corresponding to the target operation node operation by the device management agent unit 802) is valid, and the device capability management operation execution unit 811 is notified.
- the device capability management operation execution unit 811 is specifically configured to execute the device capability management operation when the determination result of the authority determination unit 814 is valid.
- the specific decision situation of the authority discriminating unit 814, the execution status of the device capability management operation execution unit 811, and the migration status of the terminal device capability status are as follows:
- the authority discriminating unit 814 notifies the device capability management operation execution unit 811 to perform the open operation, and the state of the device capability transitions to the on state; if the device capability management When the operation is the shutdown operation and the state of the current device capability is the on state, the authority determination unit 814 notifies the device capability management operation execution unit 811 to perform the shutdown operation, and the state of the device capability transitions to the closed state.
- the terminal 800 further includes an API unit 812, configured to migrate the state of the device capability through the application interface API function after receiving the opening or closing operation of the device capability management operation execution unit 811.
- the authority determining unit 814 notifies the device capability management operation execution unit 811 to temporarily disable the device capability, and the state of the device capability transitions to the temporary disabled state;
- the authority determining unit 814 notifies the device capability management operation execution unit 811 to remove the device capability driver, and the state of the device capability transitions to the ready state;
- the authority discriminating unit 814 notifies the device capability management operation execution unit 811 to enable the device capability, and the state of the device capability is migrated to the enabled state;
- the authority discriminating unit 814 notifies the device capability management operation execution unit 811 to enable the device capability, and the state of the device capability transitions to the enabled state;
- the authority discriminating unit 814 notifies the device capability management operation execution unit 811 to update its device capability driver, and the state of the device capability remains in the ready state;
- the current device can The state of the force is a state of forced disabling, and the authority discriminating unit 814 notifies the device capability management operation execution unit 811 that the device capability management operation is invalid.
- the authority determining unit 814 notifies the device capability management operation to execute.
- Unit 811 enables the device capability and the state of the device capability transitions to the enabled state.
- the validity discriminating unit described above is mainly for a technical solution in which the terminal device capability is forcibly disabled for a long period of time without considering the abnormal situation. If the scheme of the authentication code face-related related technology is set in consideration of the abnormal situation, the validity discriminating unit in the device capability management proxy unit 810 is mainly based on the authentication code pre-stored in the terminal, and the management operation command initiator input is discriminated. Whether the authentication code is valid, and validating the device capability management operation to be performed according to the current device capability status.
- the device capability management operation to be performed is an enable operation or a temporary disable operation, and the authentication code input by the management operation command initiator (which may be the device management server 803 may also be the user) is verified. If it is valid, the validity judging unit judges that the device capability management operation is valid, and further notifies the device capability management operation execution unit 811 to perform the corresponding operation.
- the present invention also discloses a terminal for performing a management operation.
- the structural embodiment of the terminal is described in detail in the terminal 800 of the communication system embodiment, and therefore will not be described again.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009523134A JP4856246B2 (ja) | 2006-08-11 | 2007-04-24 | 通信端末によりマネジメント動作を実行する方法、端末、およびこれらのシステム |
EP07720944A EP2051440B1 (en) | 2006-08-11 | 2007-04-24 | A method for executing management operation by communication terminal and a terminal and system thereof |
US12/053,750 US7953836B2 (en) | 2006-08-11 | 2008-03-24 | Method for executing managment operation by communication terminal and a terminal and system thereof |
US13/149,302 US8700757B2 (en) | 2006-08-11 | 2011-05-31 | Method for executing management operation by communication terminal and a terminal and system thereof |
US14/184,405 US9838267B2 (en) | 2006-08-11 | 2014-02-19 | Method for executing management operation by communication terminal and a terminal and system thereof |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610115238.4 | 2006-08-11 | ||
CN2006101152384A CN101123785B (zh) | 2006-08-11 | 2006-08-11 | 一种通信系统中管理终端的方法和系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/053,750 Continuation US7953836B2 (en) | 2006-08-11 | 2008-03-24 | Method for executing managment operation by communication terminal and a terminal and system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008019556A1 true WO2008019556A1 (en) | 2008-02-21 |
Family
ID=39081917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2007/001371 WO2008019556A1 (en) | 2006-08-11 | 2007-04-24 | A method for executing management operation by communication terminal and a terminal and system thereof |
Country Status (6)
Country | Link |
---|---|
US (3) | US7953836B2 (zh) |
EP (1) | EP2051440B1 (zh) |
JP (1) | JP4856246B2 (zh) |
KR (1) | KR101209315B1 (zh) |
CN (2) | CN101123785B (zh) |
WO (1) | WO2008019556A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012510120A (ja) * | 2008-11-27 | 2012-04-26 | ▲華▼▲為▼▲終▼端有限公司 | デバイス管理サーバ、デバイス管理クライアント、およびターゲットオペレーションオブジェクトを位置特定する方法 |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100641238B1 (ko) * | 2004-07-09 | 2006-11-02 | 엘지전자 주식회사 | 장치 관리 시스템 및 그 시스템에서의 장치관리 명령스케줄링 방법 |
CN101123785B (zh) | 2006-08-11 | 2013-01-23 | 华为技术有限公司 | 一种通信系统中管理终端的方法和系统 |
CN101437071B (zh) * | 2007-11-15 | 2011-09-28 | 华为技术有限公司 | 终端设备管理树管理对象实例化的方法及设备 |
KR100925441B1 (ko) * | 2008-01-07 | 2009-11-06 | 엘지전자 주식회사 | 분산형 가상자원블록 스케쥴링 방법 |
CN101686458B (zh) * | 2008-09-28 | 2013-06-12 | 华为技术有限公司 | 一种终端配置和管理方法及终端装置 |
CN101730099B (zh) * | 2008-10-14 | 2013-03-20 | 华为技术有限公司 | 基于权限控制的终端管理方法及装置 |
KR101506040B1 (ko) * | 2009-04-02 | 2015-03-25 | 삼성전자주식회사 | 복수 개의 dm 관리권한자를 지원하기 위한 장치 및 방법 |
US9026582B2 (en) * | 2010-03-23 | 2015-05-05 | Htc Corporation | Device management methods and related apparatus for enhancing applicability of status messages in response to commands |
US9237504B2 (en) * | 2010-08-26 | 2016-01-12 | Nec Corporation | Communication system, information processing device and femto base station therein, method and program for controlling the sames, and method of transmitting information to femto base station |
CN102142980B (zh) * | 2010-10-27 | 2014-05-07 | 华为技术有限公司 | 远程管理传感网络拓扑的方法及网关 |
JP5668512B2 (ja) * | 2011-02-15 | 2015-02-12 | ソニー株式会社 | 情報処理装置、及び、情報処理方法 |
CN102904742B (zh) * | 2011-07-29 | 2015-10-07 | 华为终端有限公司 | 对可执行节点的操作方法及系统 |
KR20150031225A (ko) * | 2012-06-22 | 2015-03-23 | 엘지전자 주식회사 | 무선 통신 시스템에서 서버를 활성화 또는 비활성화하기 위한 방법 및 장치 |
US9202070B2 (en) * | 2012-10-31 | 2015-12-01 | Broadcom Corporation | Input/output gatekeeping |
CN105744509A (zh) * | 2014-12-08 | 2016-07-06 | 中兴通讯股份有限公司 | 一种管理终端的方法、设备和系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1531252A (zh) * | 2002-10-15 | 2004-09-22 | �������ؼ��ô�˾ | 管理网络节点的方法和设备 |
CN1852132A (zh) * | 2005-07-08 | 2006-10-25 | 华为技术有限公司 | 一种网络设备的维护方法 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0710914B1 (en) * | 1994-11-04 | 2000-05-03 | Canon Information Systems, Inc. | Smart programming of flash memory |
US7165152B2 (en) * | 1998-06-30 | 2007-01-16 | Emc Corporation | Method and apparatus for managing access to storage devices in a storage system with access control |
US7617238B2 (en) * | 2003-07-11 | 2009-11-10 | Nippon Telegraph And Telephone Corporation | System management method, system management device, system management program, and storage medium containing system management program |
US7400642B2 (en) * | 2003-08-29 | 2008-07-15 | Samsung Electronics Co., Ltd | Apparatus and method for controlling operational states of medium access control layer in a broadband wireless access communication system |
TW200527870A (en) * | 2004-01-14 | 2005-08-16 | Nec Corp | Encrypted communication method, encrypted communication system, node device and program |
CA2555183C (en) | 2004-02-14 | 2014-12-09 | Nokia Corporation | A method for configuring an electronic device |
US7295827B2 (en) * | 2004-03-31 | 2007-11-13 | Intel Corporation | Mobile station dynamic power saving control |
US8392545B2 (en) * | 2004-07-01 | 2013-03-05 | Nokia Corporation | Device management system |
US8073960B2 (en) * | 2004-07-01 | 2011-12-06 | Nokia Corporation | Arranging management operations in management system |
JP2008506179A (ja) * | 2004-07-09 | 2008-02-28 | エルジー エレクトロニクス インコーポレイティド | 装置管理システム及びそのシステムにおける装置管理命令スケジューリング方法 |
US20060136338A1 (en) * | 2004-12-16 | 2006-06-22 | Intel Corporation | Techniques for filtering attempts to access component core logic |
US20080059605A1 (en) * | 2006-01-20 | 2008-03-06 | Shaul Shalev | Systems and methods for operating communication processes using a personalized communication web server |
CN101123785B (zh) | 2006-08-11 | 2013-01-23 | 华为技术有限公司 | 一种通信系统中管理终端的方法和系统 |
-
2006
- 2006-08-11 CN CN2006101152384A patent/CN101123785B/zh active Active
-
2007
- 2007-04-24 JP JP2009523134A patent/JP4856246B2/ja active Active
- 2007-04-24 CN CNA2007800002560A patent/CN101313512A/zh active Pending
- 2007-04-24 WO PCT/CN2007/001371 patent/WO2008019556A1/zh active Application Filing
- 2007-04-24 EP EP07720944A patent/EP2051440B1/en active Active
- 2007-04-24 KR KR1020087008907A patent/KR101209315B1/ko active IP Right Grant
-
2008
- 2008-03-24 US US12/053,750 patent/US7953836B2/en active Active
-
2011
- 2011-05-31 US US13/149,302 patent/US8700757B2/en active Active
-
2014
- 2014-02-19 US US14/184,405 patent/US9838267B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1531252A (zh) * | 2002-10-15 | 2004-09-22 | �������ؼ��ô�˾ | 管理网络节点的方法和设备 |
CN1852132A (zh) * | 2005-07-08 | 2006-10-25 | 华为技术有限公司 | 一种网络设备的维护方法 |
Non-Patent Citations (5)
Title |
---|
"Open Mobile Alliance, OMA-TS-CDM-TNDS-V1_2-20060406-C", OMA DEVICE MANAGEMENT TREE AND DESCRIPTION SERIALIZATION, CANDIDATE VERSION 1.2, 6 April 2006 (2006-04-06), XP008102104, Retrieved from the Internet <URL:http://www.openmobilealliance.org/release_program/docs/DM/V1_2-20060424-C-OMA-TS-DM-TNDS-V1_2-20060406-C.pdf> * |
"Open Mobile Alliance, OMA-TS-DM-Protocol-V1_2-20060424-C", OMA DEVICE MANAGEMENT PROTOCOL, CANDIDATE VERSION 1.2, 24 April 2006 (2006-04-24), XP008102101, Retrieved from the Internet <URL:http://www.openmobilealliance.org/release_program/docs/DM/V1_2-20060424-C/OMA-TS-DM-Protocol-V1_2-20060424-C.pdf> * |
"Open Mobile Alliance, OMA-TS-DM-RepPro-V1_2-20060406-C", OMA DEVICE MANAGEMENT REPRESENTATION PROTOCOL, CANDIATE VERSION 1.2, 6 April 2006 (2006-04-06), XP008102103, Retrieved from the Internet <URL:http://www.openmobilealliance.org/release_program/docs/DM/V1_2-20060424-C/OMA-TS-DM-RepPro-V1_2-20060406-C.pdf> * |
"Open Mobile Alliance, OMA-TS-DM-TND-V1_2-20060424-C", OMA DEVICE MANAGEMENT TREE AND DESCRIPTION, CANDIDATE VERSION 1.2, 24 April 2006 (2006-04-24), XP008102102, Retrieved from the Internet <URL:http://www.openmobilealliance.org/release_program/docs/DM/V1_2-20060424-C/OMA-TS-DM-TND-V1_2-20060424-C.pdf> * |
See also references of EP2051440A4 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012510120A (ja) * | 2008-11-27 | 2012-04-26 | ▲華▼▲為▼▲終▼端有限公司 | デバイス管理サーバ、デバイス管理クライアント、およびターゲットオペレーションオブジェクトを位置特定する方法 |
KR101264819B1 (ko) * | 2008-11-27 | 2013-05-22 | 후아웨이 디바이스 컴퍼니 리미티드 | 표적 동작 객체를 찾아내기 위한 장치 관리 서버, 클라이언트 및 방법 |
JP2014029727A (ja) * | 2008-11-27 | 2014-02-13 | Huawei Device Co Ltd | デバイス管理サーバ、デバイス管理クライアント、およびターゲットオペレーションオブジェクトを位置特定する方法 |
US8732280B2 (en) | 2008-11-27 | 2014-05-20 | Huawei Device Co., Ltd. | Device management server, device management client, and method for locating a target operation object |
US9009278B2 (en) | 2008-11-27 | 2015-04-14 | Huawei Device Co., Ltd. | Device management server, device management client, and method for locating a target operation object |
JP2015079521A (ja) * | 2008-11-27 | 2015-04-23 | ホアウェイ・デバイス・カンパニー・リミテッド | デバイス管理サーバ、デバイス管理クライアント、およびターゲットオペレーションオブジェクトを位置特定する方法 |
US9350611B2 (en) | 2008-11-27 | 2016-05-24 | Huawei Device Co., Ltd. | Apparatus and method for locating a target operation object |
Also Published As
Publication number | Publication date |
---|---|
US20140173083A1 (en) | 2014-06-19 |
KR20080057277A (ko) | 2008-06-24 |
JP2010500792A (ja) | 2010-01-07 |
US20080189404A1 (en) | 2008-08-07 |
CN101313512A (zh) | 2008-11-26 |
US9838267B2 (en) | 2017-12-05 |
US8700757B2 (en) | 2014-04-15 |
EP2051440A4 (en) | 2009-08-26 |
CN101123785A (zh) | 2008-02-13 |
US7953836B2 (en) | 2011-05-31 |
CN101123785B (zh) | 2013-01-23 |
KR101209315B1 (ko) | 2012-12-06 |
JP4856246B2 (ja) | 2012-01-18 |
EP2051440B1 (en) | 2012-06-13 |
US20110231538A1 (en) | 2011-09-22 |
EP2051440A1 (en) | 2009-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008019556A1 (en) | A method for executing management operation by communication terminal and a terminal and system thereof | |
USRE49585E1 (en) | Certificate based profile confirmation | |
KR102406757B1 (ko) | 보안 모듈의 가입자 프로파일 프로비저닝 방법 | |
KR101030185B1 (ko) | 단말기 장치들의 관리 방법 | |
WO2009015585A1 (fr) | Procédé, système et terminal pour contrôle de droit dans la gestion d'un dispositif | |
KR101113122B1 (ko) | 사용자 및/또는 소유자를 위한 오페이크 관리 데이터용 옵션들을 모델링하기 위한 방법 및 시스템 | |
JP5667817B2 (ja) | アプリケーション管理システム | |
CN107852603A (zh) | 终端认证的方法及设备 | |
JP2022535658A (ja) | ユーザデバイスの遠隔管理 | |
US20080178267A1 (en) | Method and system for simplifying role based authorization profile implementation | |
CN110545225A (zh) | 一种本地和互联网的设备认证授权机制 | |
WO2010124476A1 (zh) | 请求切换网络运营商的处理方法、装置及系统 | |
KR20070089970A (ko) | 다중 구성들을 구비한 장치에서 구성들의 사용 | |
WO2009033431A1 (fr) | Procédé pour effacer des données de terminal et dispositif de terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780000256.0 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020087008907 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07720944 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007720944 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009523134 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |