WO2014032241A1 - 终端控制方法和装置、以及终端 - Google Patents
终端控制方法和装置、以及终端 Download PDFInfo
- Publication number
- WO2014032241A1 WO2014032241A1 PCT/CN2012/080723 CN2012080723W WO2014032241A1 WO 2014032241 A1 WO2014032241 A1 WO 2014032241A1 CN 2012080723 W CN2012080723 W CN 2012080723W WO 2014032241 A1 WO2014032241 A1 WO 2014032241A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- terminal
- time
- information
- control information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 74
- 238000012545 processing Methods 0.000 claims description 4
- 238000012552 review Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 23
- 238000007726 management method Methods 0.000 description 9
- 230000000977 initiatory effect Effects 0.000 description 4
- 230000011664 signaling Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
Definitions
- the present invention relates to communications technologies, and in particular, to a terminal control method and apparatus, and a terminal. Background technique
- Embodiments of the present invention provide a terminal control method and apparatus, and a terminal, to implement control of an application time of an application on a terminal.
- a first aspect of the present invention provides a terminal control method, including:
- the obtaining the time control information corresponding to the application identifier of the application on the terminal according to the terminal identifier includes: acquiring an application identifier corresponding to the terminal identifier according to the terminal identifier
- the application identifier is an application identifier of the application on the terminal; and the time control information corresponding to the application identifier is obtained according to the application identifier.
- the time control information includes usage time information of the application, so that the terminal controls usage time of the application according to the usage time information.
- the time control information further includes access time information of the data to be accessed by the application, so that the terminal controls, according to the usage time information of the application and the access time information of the data. The time of use of the application.
- the method before the sending the time control information to the terminal, the method further includes: receiving an application registration request sent by the terminal, where the application registration request carries an application applied on the terminal The identifier and the terminal identifier are stored; the corresponding relationship between the application identifier and the terminal identifier is stored, and the time control information corresponding to the application identifier is set, so that the time control information is obtained according to the terminal identifier.
- the method before the setting the time control information corresponding to the application identifier, the method further includes: reviewing, by the application corresponding to the application identifier, if the application is a remote desktop class Application or cloud application, the time control letter of the application is no longer set
- the method further includes: receiving an application start request sent by the terminal to initiate an application, where the application is currently in a disabled state Applying, according to the application launching application, sending, to the terminal, a startup instruction for initiating the application, so that the terminal sets the application to an available state according to the startup instruction.
- the method further includes: acquiring, corresponding to the application identifier, The address access restriction information controls the access address of the application according to the address access restriction information.
- Another aspect of the present invention provides a terminal control method, including:
- the terminal controls the usage time of the application corresponding to the application identifier according to the time control information and the local time.
- the receiving, by the terminal, the time control information that is sent by the terminal control device and corresponding to the application identifier of the application on the terminal includes: receiving, by the terminal The time control information sent by the terminal control device, the time control information includes usage time information of an application on the terminal; the terminal controls usage of the application according to usage time information of the application and local time The time includes: setting the application to an available state if the local time is within an application available time range defined by the usage time information; otherwise, setting the application to a disabled state.
- the method before the controlling the usage time of the application according to the usage time information of the application and the local time, the method further includes: performing time synchronization on the time synchronization server to obtain the local time .
- the received time control information further includes: access time information of the data accessed by the application; after the receiving the time control information sent by the terminal control device, further including Controlling the usage time of the application according to the usage time information of the application, the access time information of the data, and the local time, including: if the local time is within the application available time range defined by the usage time information of the application, Further, in the data available time range defined by the access time information of the data, the application is set to an available state; otherwise, the application is set to a disabled state.
- the method further includes: sending, to the terminal control device, an application start request for requesting to start an application, where the application is currently disabled locally Receiving; receiving, by the terminal control device, a startup instruction for initiating the application, and setting the application to an available state according to the startup instruction.
- the method further includes: receiving address access restriction information corresponding to the application sent by the terminal control device, and accessing according to the address Restricted information controls access addresses when using an app.
- Still another aspect of the present invention provides a terminal control apparatus, including:
- a terminal identifier receiving unit configured to receive a terminal identifier sent by the terminal, and apply time control information corresponding to the identifier
- An application time sending unit configured to send the time control information to the terminal, so that the terminal controls use of an application corresponding to the application identifier according to the time control information Time.
- the application time obtaining unit is configured to obtain, according to the terminal identifier, an application identifier corresponding to the terminal identifier, where the application identifier is an application identifier of an application on the terminal. Obtaining time control information corresponding to the application identifier according to the application identifier.
- the time control information includes usage time information of the application, so that the terminal controls usage time of the application according to the usage time information.
- the time control information further includes access time information of the data accessed by the application, so that the terminal controls, according to the usage time information of the application and the access time information of the data. The time of use of the application.
- the terminal identifier receiving unit is specifically configured to receive an application registration request sent by the terminal, where the application registration request carries an application identifier and the terminal identifier applied by the terminal;
- the method further includes: a control information setting unit, configured to store a correspondence between the application identifier and the terminal identifier, and set the time control information corresponding to the application identifier, so that the terminal time control unit is configured according to the terminal identifier Obtain the time control information.
- control information setting unit is further configured to: review an application corresponding to the application identifier received by the terminal identifier receiving unit, if the application is a remote desktop application or a cloud application. , the time control information of the application is no longer set.
- the method further includes: a special instruction processing unit, configured to receive an application start request sent by the terminal to initiate an application, where the application is an application currently in a disabled state; And according to the application launching application, sending, to the terminal, a startup instruction for initiating the application, so that the terminal sets the application to an available state according to the startup instruction.
- a special instruction processing unit configured to receive an application start request sent by the terminal to initiate an application, where the application is an application currently in a disabled state; And according to the application launching application, sending, to the terminal, a startup instruction for initiating the application, so that the terminal sets the application to an available state according to the startup instruction.
- the method further includes: an access address control unit, configured to acquire address access restriction information corresponding to the application identifier, and control an access address of the application according to the address access restriction information .
- Yet another aspect of the present invention is to provide a terminal, including:
- a terminal identifier sending unit configured to send, to the terminal control device, a terminal identifier of the terminal, Applying time control information corresponding to the identifier
- An application time receiving unit configured to receive the time control information sent by the terminal control device
- the application time control unit is configured to control, according to the time control information and the local time, an application time of the application that is determined by the application identifier.
- the time control information includes usage time information of an application on the terminal, and the application time control unit is specifically configured to control, according to the usage time information of the application and the local time.
- the usage time of the application includes: if the local time is within the application available time range defined by the usage time information, setting the application to an available state; otherwise, setting the application to a disabled state.
- the method further includes: a time synchronization unit, configured to perform time synchronization with the time synchronization server to obtain the local time.
- the time control information received by the information receiving subunit further includes: access time information of the data accessed by the application; the application management subunit, specifically used according to the The usage time information of the application, the access time information of the data, and the local time control the usage time of the application, include: if the local time is within the application available time range defined by the usage time information of the application, If the data access time information defined by the access time information of the data is within the available time range, the application is set to an available state; otherwise, the application is set to a disabled state.
- the method further includes: an access address control unit, configured to receive address access restriction information corresponding to the application sent by the terminal control device, and use the application according to the address access restriction information The access address is controlled.
- FIG. 1 is a system architecture diagram of an application of an embodiment of a terminal control method according to the present invention
- 2 is a schematic flowchart of an embodiment of a terminal control method according to the present invention
- FIG. 3 is a schematic flowchart of another embodiment of a terminal control method according to the present invention.
- FIG. 4 is a schematic signaling diagram of still another embodiment of a terminal control method according to the present invention.
- FIG. 5 is a schematic diagram 1 of a screen setting of a mobile office device in another embodiment of a terminal control method according to the present invention.
- FIG. 6 is a second schematic diagram of a mobile office equipment screen setting in another embodiment of the terminal control method according to the present invention.
- FIG. 7 is a schematic diagram of a device relationship according to still another embodiment of a terminal control method according to the present invention.
- FIG. 8 is a schematic signaling diagram of still another embodiment of a terminal control method according to the present invention.
- FIG. 9 is a schematic structural diagram of an embodiment of a terminal control apparatus according to the present invention.
- FIG. 10 is a schematic structural diagram of another embodiment of a terminal control apparatus according to the present invention.
- FIG. 1 is a schematic structural diagram of an embodiment of a terminal according to the present invention.
- FIG. 12 is a schematic structural diagram of another embodiment of a terminal according to the present invention.
- FIG. 13 is a structural diagram of an entity of an embodiment of a terminal control apparatus according to the present invention.
- FIG. 14 is a structural diagram of an entity of a terminal embodiment of the present invention.
- the terminal control method of the embodiment of the present invention is used between the terminal control device and the terminal.
- FIG. 1 is a system architecture diagram of an application of the terminal control method according to the present invention.
- the control of the terminal by the terminal control device actually controls the use time of the application on the terminal.
- the terminal control device 11 can acquire time control information corresponding to the application on the terminal, and control the use time of the application on the terminal 12 based on the time control information.
- the specific application scenario may be, for example, that the terminal control device 11 in the enterprise controls each terminal 12 in the mobile office, and controls the usage time of each application on the terminal 12, such as an office type application and an entertainment type application, to prevent employees from working.
- Time entertainment, work supervision; or, the terminal control device 11 (such as a home gateway) in the home can control the usage time of the specific application on the terminal 12, for example, the use of the application "game” on the tablet.
- the time limit is 7:00 ⁇ 9:00 to prevent children from over-entertaining and affecting learning.
- the application is distinguished by an application identifier (ie, an APP ID), and the ratio is different.
- an application identifier ie, an APP ID
- APP ID 1 corresponds to time control information 1
- APP ID2 corresponds to time control information 2
- the APP ID here is information that uniquely identifies an application, and has nothing to do with the terminal where the application is located.
- an application is installed in both the mobile phone and the PAD, but the version number in the mobile phone and the PAD is The difference, or the specific changes to the application due to the need to adapt to certain specific functions on the terminal, causes the application on the mobile phone and the PAD to be functionally different; however, despite the mobile phone and the PAD
- the application has the above differences, which still belong to the same application and have the same APP ID. 4
- the application on the mobile phone is referred to as the first application
- the application on the PAD is referred to as the second application
- the APP IDs of the first application and the second application are the same.
- the time control information corresponding to the application or some information corresponding to the application is identified by the APP ID.
- the terminal control method of the embodiment of the present invention will be described in detail below.
- FIG. 2 is a schematic flowchart of a method for controlling a terminal according to an embodiment of the present invention.
- the method in this embodiment is performed by a terminal control device.
- the method may include:
- the terminal control device receives the terminal identifier of the terminal, for example, when the terminal first connects the terminal control device, the terminal sends the terminal identifier to the terminal control device; or, after the terminal connects with the terminal control device, At some time, when it is desired to control the use time of the terminal, the terminal transmits its own terminal identifier to the terminal control device and the like.
- the terminal identifier is information that can uniquely identify the terminal. For example, for a tablet, a serial number of a central processing unit (CPU) can be used as a terminal identifier of the tablet.
- CPU central processing unit
- the time control information is obtained according to the terminal identifier, where the time control information is time control information corresponding to the application identifier of the application on the terminal;
- the terminal control device may obtain an application identifier corresponding to the terminal identifier according to the identifier of the terminal, where the application identifier is an application identifier of the application on the terminal. For example, if the terminal is loaded with the application A and the application B, and the terminal has registered the two applications in the terminal control device, the terminal control device can actually store the corresponding relationship between the terminal and the application loaded by the terminal. For example, the terminal a - application A, application B can be recorded. Of course, the correspondence between the above records is the correspondence between the terminal identifier and the application identifier. At this time, in this step, after receiving the terminal identifier, the terminal control device may acquire the application identifier corresponding to the terminal identifier.
- the terminal control device may obtain the time control information corresponding to the application identifier, where the time control information is used to limit the usage time of the application corresponding to the application identifier, for example, to limit the time period of the application A between 8:00 and 12:00. use.
- the time control information may be set by the terminal control device when the terminal registers the application, or the terminal control device may update the time control information of the application at any time according to actual needs.
- the time control information may be usage time information of the application, and the usage time described herein refers to an application that is in an available state, that is, allowed to start. time.
- the usage time described herein refers to an application that is in an available state, that is, allowed to start. time.
- Email can be limited by the time control information of "Email". It can be started when the working time is 8: 00 ⁇ 17:00, and the employee can be started. For the entertainment type application "game”, you can pass the "Email".
- the game's time control information defines that it is available after 17:00 of non-working time; the terminal control device can control the usage time of each application on the terminal accordingly.
- the terminal control device sends the time control information to the terminal, so that the terminal controls the usage time of the application corresponding to the application identifier according to the time control information.
- the terminal control device sends the time control information to the terminal, and the terminal can control the usage time of the terminal according to the time control information.
- the execution process of the specific terminal control method will be described in detail in the following embodiments in combination with a specific application scenario; by setting the time control information of the application, and controlling the information to the terminal according to the time by the terminal control device.
- the application time is controlled, the control and management capabilities of the terminal are enhanced, and the refined management of the terminal is realized, and the control and management capabilities of the service level (ie, application level) are realized.
- FIG. 3 is a schematic flowchart of another embodiment of a terminal control method according to the present invention.
- the method in this embodiment is performed by a terminal.
- the method may include:
- the terminal sends a local terminal identifier to the terminal control device.
- the terminal may send its own terminal identifier to the terminal control device when connecting to the terminal control device; for example, for the tablet computer, the serial number of its CPU may be reported as its terminal identifier.
- the terminal receives the time control information sent by the terminal control device, where the time control information is time control information corresponding to the application identifier of the application on the terminal, where the time control information is obtained by the terminal control device according to the terminal identifier. ;
- the terminal control device After receiving the terminal identifier, the terminal control device acquires time control information of the application identifier corresponding to the terminal identifier, and sends the time control information to the terminal.
- the terminal controls, according to the time control information and the local time, a usage time of the application corresponding to the application identifier.
- the terminal After receiving the time control information sent by the terminal control device, the terminal controls the usage time of the application on the terminal according to the time control information and the local time of the terminal.
- the application's time control information indicates that the application's usage time is 8:00-12:00, and the B' terminal will determine the local time, that is, the current time of the terminal, for example, 9:00, and then combine the above time.
- Control information 8:00-12:00 determine whether the application is set to be in normal use.
- the terminal control method in the embodiment of the present invention is described in detail below with reference to a specific application scenario.
- the mobile office scenario is taken as an example.
- the specific implementation is not limited thereto, and other similar needs are needed on the terminal.
- the scenarios in which the application's usage time is controlled can be applied.
- the mobile office scenario is taken as an example.
- the terminal in the scenario may be a mobile office device in the enterprise, such as a smart phone or a tablet computer.
- the enterprise may control the use time of each mobile office device by using the terminal control device.
- the enterprise mainly defines the usage time of the application in the mobile office device.
- FIG. 4 is a schematic diagram of signaling of a terminal control method according to another embodiment of the present invention. As shown in FIG. 4, the method may include:
- the mobile office device sends a login request to the terminal control device, where the login request carries the terminal identifier of the mobile office device.
- the mobile office equipment of the enterprise When the mobile office equipment of the enterprise starts to work, it needs to log in to the terminal control device of the enterprise, and carries the terminal identifier of the mobile office device, for example, it may be The serial number of the standby CPU.
- the enterprise pre-registers the terminal identifiers of the mobile office devices in the enterprise in the terminal control device, and when the mobile office device logs in, queries whether the terminal control device stores the terminal device according to the reported terminal identifier, and if there is storage, It indicates that the mobile office device belongs to a legitimate user of the enterprise, otherwise the device can be denied login; if the mobile office device cannot log in to the terminal control device, the server information in the enterprise network that needs to be accessed by each application provided by the terminal control device cannot be used. Can not enter the corporate network to ensure the security of the corporate network.
- the mobile office device sends an application registration request to the terminal control device, and carries an application identifier applied by the mobile office device and a terminal identifier.
- the application installed on the mobile office device needs to be registered with the terminal control device.
- the mobile office device can set an application management sub-unit in its own state, and can record whether the application is reported or not. , the record is "reported”; if the application has not been uploaded, the record "not 4", , the mobile office device can send an application registration request to the terminal control device according to this, and notify the terminal of the unreported application.
- Control device The mobile office device can be configured to register the application with the terminal control device after installing the application.
- the application identifier is information that can uniquely identify the application; the application identifier and the terminal identifier are reported in the application registration request, so that the terminal control device knows which mobile office device the reported application belongs to. Therefore, the corresponding relationship between the application identifier and the terminal identifier is stored, for example, an application "stealing food" on the mobile office device A.
- the terminal control device sets time control information of the application.
- the terminal control device After receiving the application registered by the mobile office device, the terminal control device sets time control information of the application, where the time control information is used to limit the usage time of the application.
- An example is as follows: Assume that the application "mail" on the mobile office device belongs to an office application, and can be used for both working hours and non-working hours, or limited to use only during working hours, etc., in this embodiment, Both working hours and non-working hours can be used as an example.
- the terminal control device sets two modes for each mobile office device, namely, the working mode and the leisure mode, and the time corresponding to the limited working mode is "8:00 ⁇ 17:00", and the leisure mode corresponds to The time is "after 17:00".
- the above application "mail” can be used during working hours and non-working hours. According to this, it is possible to set the device mode to which the application "mail" belongs. "Work mode” and “leisure mode” are available in both modes.
- the application "mail, time control information is” working mode (8:00 ⁇ 17:00), leisure mode (after 17:00)", the time limit of the application defined by the time control information is all time
- the time control information "operating mode (8:00 ⁇ 17:00), leisure mode (after 17:00),” may also be referred to as application usage time information.
- the terminal control device may also configure each application with a type to which it belongs, for example, an entertainment application or an office application, and combine the application type with the device mode to limit the application usage time.
- the policy may be set. "When the device mode is the working mode, only the office application can be used", the time control information of the application "mail" includes "office class, the above strategy, and working mode (8:00 ⁇ 17:00), , , From this information, it can be known that the application "mail" is set to be available from 8:00 to 17:00.
- the terminal control device sends the time control information of the application to the mobile office device.
- the terminal control device may, when receiving the terminal identifier, find that the terminal has the terminal identifier and the corresponding relationship between the application identifier and the terminal identifier.
- the application ie, the plurality of application identifiers corresponding to the terminal identifier
- the time control information of the application that is, the usage time information for defining the usage time of the application, is sent to the mobile office device.
- the terminal control device may be, for example, storing all the application identifiers reported by the mobile office device when the mobile office device logs in a certain time, and setting time control information of the application corresponding to the application identifier, etc.; The next time the user logs in, the terminal control device can send the time control information of the previously set application to the mobile office device according to the previously set information, for example, the correspondence between the application identifier and the terminal identifier.
- the mobile office device controls the usage time of the application according to the time control information. After the mobile office device receives the time control information sent by the terminal control device, The usage time of the application will be controlled accordingly.
- the specific control method is as follows: For example, as described in 403, the time control information of the application is time-based, such as the working mode (8:00 ⁇ 17:00), so it is necessary to control according to the time control information, firstly To ensure the time accuracy of the mobile office device itself, the time of the mobile office device itself can be referred to as local time.
- the mobile office device is set to disable the use of the time setting function, so that the mobile office device must acquire its local time by time synchronization with the time synchronization server.
- the address of the time synchronization server may be pre-configured on the mobile office device when the mobile office device is shipped, so that the mobile office device can periodically initiate a time synchronization process to the time synchronization server according to the address;
- the address of the time synchronization server may be Is the IP address or domain name, for example, 192.168.0.1 or ntp.xxx.com, ' ⁇ is the same address in the same day.
- the second address is used as the backup, which can improve the reliability of the system;
- the address of this time synchronization server cannot be changed manually.
- the mobile office device can be configured, for example, to be calibrated every time the device is turned on or periodically calibrated once a day, and actively initiate a time synchronization request to the time synchronization server, and the time synchronization server returns the current time of the current time zone in which the mobile office device is located; more accurately, the mobile office
- the device can take accurate time information by considering the transmission time factor, and the error is less than 1 second.
- the usage time of the application is jointly controlled according to the usage time information of the application acquired from the terminal control device and the local time.
- the mobile office device can periodically check for changes in time, for example, the check operation can be performed in the first second of each minute, and the state of the application is set according to the time, the state refers to available or disabled; if the current local time The application is set to an available state within an application available time range defined by the usage time information of the application, and otherwise the application is set to a disabled state. For example: Assume that the application "microblogging" is only used during non-working hours, and the non-working time is after 17:00.
- the mobile office equipment checking time is 15:01, the status of the application "weibo” is set to " Disable,,, At this time, the user can start the application regardless of the method, such as direct click, command line, etc.; if the mobile office check time is 17:00, the status of the application "weibo” is set. For "Available", the user can launch the app.
- the switching of the state of the application over time is also automatically performed by the mobile office device, and does not require manual triggering by the user.
- the above application “microblogging”, During the working hours 8:00 ⁇ 17:00, the status of the application is "disabled”; when the mobile office equipment performs the time check operation in the first second of every minute, when the current local time is 17:01, Depending on the usage time information of the application “Weibo”"belongs to casual mode (after 17:00)", the status of the application can be automatically changed from “disabled” to "available”.
- the mobile office device will set it to "disabled" by default, prohibiting startup.
- the application management sub-unit of the mobile office device sets the state of the application, it is executed according to the time control information of the application sent by the terminal control device, and the terminal control device also controls the time control information of all applications on the terminal. Both are sent to mobile office equipment. If the mobile office device finds that the time control information sent by the terminal control device does not have time control information of an application, for example, there is no application identifier of the application (may indicate that the application is not registered in the terminal control device), or has an application identifier.
- the mobile office device can set the status of the application to "disable” according to the application, so the application is always disabled. Even if the device is in casual mode, it cannot be started.
- the mobile office device may send an application start request for initiating the application to the terminal control device, carrying the application identifier of the application, and the terminal identifier of the mobile office device.
- the terminal control device returns a startup instruction for instructing to start the application to the mobile office device when it is determined that the application can be started according to the terminal identifier and the application identifier, and the mobile office device can apply the application according to the instruction.
- the status is set to "Available" and the application is ready to use.
- the start command returned by the terminal control device may be a dynamic password that changes over time, and the mobile office device inputs the dynamic password to change the state of the application.
- the mobile office device of the example can set different screen display states according to the state of the application. For example, when an application is available, the screen corresponding to the application can be set to a bright color during normal operation, and when an application is disabled, the corresponding screen of the application can be set to gray, so that the user Can be based on the application
- the screen display color is convenient for knowing if the current application is available.
- FIG. 5 is still another embodiment of the terminal control method according to the present invention.
- FIG. 6 is a schematic diagram of a screen setting of a mobile office device in another embodiment of the terminal control method according to the present invention.
- three types of screens are set on the mobile office device.
- the screen 1 the office application, including mail, schedule, fleet and other work applications
- the other is screen 2: entertainment applications, including Internet, games, chat, etc.
- screen 3 configuration management, including language, Operation, upgrade, etc.
- the screen classification of the above application may be, for example, set by the user of the mobile office device.
- Figure 5 shows the screen in the working mode, in which the screen 1 and the screen 3 are in the active mode, the various applications under these screens can be normally started and used, in the blue in Figure 5 Color indicates that it is in a normal state, and all applications in screen 2 cannot be started, because these applications are not within the specified usage time, and can be set to gray state in the specific implementation, or screen 2 can be directly set to Locked state.
- Figure 6 shows the screen in the casual mode, that is, in the non-working mode. All applications on each screen can be started normally, so each screen is displayed in blue, that is, both are in a normal state.
- FIG. 7 is a schematic diagram of a device relationship according to still another embodiment of a terminal control method according to the present invention, and some office applications on a mobile office device, such as an inventory, a "fleet,” and a "schedule" related to a logistics enterprise work. , such as applications, these applications need to access the enterprise's data server when used, the data server provides the enterprise data corresponding to the application, the enterprise data is confidential, and usually can only be accessed by the enterprise's own terminal.
- the access time information of the enterprise data is set, and the data can only be used within a specified time range, for example, can only be used during working hours, or can only be used during a certain period of working time.
- the enterprise usually monitors the usage of these data, and can process it in time when an abnormality occurs. Compared to accessing data at any time, it is inevitable. Improve data security and reduce the possibility of data leakage.
- the data is bound to the application, and the use of the data is synchronized with the use of the application; that is, the terminal control device sets the access time of the enterprise data when setting the time control information of the application on the mobile office device.
- the information is also included, and the access time information of the enterprise data and the usage time information of the application (for example, only used at 8:00-17:00) are combined as time control information of the application to determine whether the application is available.
- FIG. 8 is a schematic diagram of signaling of a terminal control method according to another embodiment of the present invention. As shown in FIG. 7 and FIG. 8 , the terminal control method in this embodiment may include:
- the mobile office device sends a login request to the terminal control device, where the login request carries the terminal identifier of the mobile office device.
- the terminal control device sends time control information of the application corresponding to the terminal identifier to the mobile office device.
- the time control information of the embodiment includes, in addition to the usage time information of the application, for example, "the application is used in the working mode (8:00 ⁇ 17:00)", and includes access time information of the data to be accessed by the application, for example Apply “inventory”, which is the data server of the intranet to be accessed when it is used.
- the data server stores enterprise data corresponding to the application "inventory”, and the access corresponding to the data is also recorded.
- the time information such as "this data can only be used at 8:00-10:00", the terminal identifier corresponding to the data and the application identifier (to indicate which application on the mobile office device the data is accessible to).
- the time control information of each application corresponding to the terminal identifier is sent to the mobile office device.
- the mobile office device controls usage time of the application according to usage time information of the application and access time information of the data.
- the mobile office device comprehensively controls the usage time of the application according to the usage time information of the application and the access time information of the data.
- ⁇ For the application “inventory”, its corresponding usage time information is "The application is used in working mode (8:00 ⁇ 17:00)", which means that only the time period is from 8:00 to 17:00.
- the internal application “inventory” is set to the available state, which can be started, and the usage time of the application is defined based on the working mode of the mobile office device; in this embodiment, the access time of the enterprise data corresponding to the application "inventory” The message is "This data can only be used from 8:00 to 10:00", ie Data can only be opened during the time period from 8:00 to 10:00, and cannot be accessed at other times.
- the mobile office device queries the time control information of the "inventory", and the time control information includes the above two aspects, that is, the usage time information of the application, and the access time information of the data, and the obtained query result is At this time, the application is in an available state, and the data can be accessed, and the mobile office device determines that the application is "inventory,” and can be started normally, and then the normal startup can be performed.
- the mobile office device queries the time control information of the "inventory”, and the obtained query result is that the application is in an available state at the time, but the data cannot be accessed, and in the non-opening period, The mobile office device determines that the application "inventory” cannot be activated. At this time, the mobile office device can prompt the user that "the current data service to be accessed is unavailable", indicating that the current application cannot be started because the data cannot be accessed.
- the mobile office device queries the time control information of the "inventory", and the obtained query result is that the application is in the "disabled, state, and the data is also in the non-open time period. Then, the mobile office device determines that the application "inventory” cannot be activated. At this time, the mobile office device can prompt the user to "do not have the right to start the application in the current mode", indicating that the current application cannot be started because it does not belong to the usage time period of the application.
- the mobile office device may further set whether the state of the application is available or disabled according to the usage time information of the application and the access time information of the data, and determine whether the application can be started according to the state directly at the corresponding time.
- the usage time information of the above application “inventory” is “the application is used in the working mode (8:00 ⁇ 17:00)", the application “inventory”, and the access time information of the corresponding enterprise data is " The data can only be used from 8:00 to 10:00.
- the data can only be used from 8:00 to 10:00.
- set the status of the application to "available” because both application and data are available
- “10:00 ⁇ 17:00” time period set the status of the application to "disabled” (because the data is not available)
- set the status of the application to "disabled” after the "17:00” time period because the application and data are both Not available
- the terminal control device performs strict auditing on the application on the terminal, and the application corresponding to the security threat of the access data is prohibited from being used. For example, after the terminal reports the installed application to the terminal control device, the terminal control device can pre-approve the application before setting the time control information for it. If the installed application is found to be a remote desktop application, or a cloud application such as an HTML4 or HTML5 type application, it is determined that such an application is a prohibited application, and the application's time control information will not be set. When transmitting the time control information of the application to the terminal, the terminal control device may only send the time control information of the available application to the terminal, and for the remote desktop application or the cloud application, it is not sent to the terminal.
- the terminal control device may only send the time control information of the available application to the terminal, and for the remote desktop application or the cloud application, it is not sent to the terminal.
- remote desktop applications or cloud applications
- cloud applications are application-specific applications, not proprietary client applications developed for specific implementations of a certain type of application, they are free to access various services, making it possible to access data for applications. This embodiment poses an audit and filtering of such applications.
- enterprises can also set the types of applications that need to be filtered according to their actual conditions.
- the general access mailbox needs a proprietary client like Outlook. It is a special tool and is a proprietary client application developed for specific mailbox-based applications. But sometimes users can also access it through a browser. The browser can not only Accessing emails, reading news or logging in to other websites is a common tool, so it may pose a security threat to corporate data. For enterprise applications, most of them are accessed based on dedicated tools. This example will be used for general-purpose tools. More rigorous auditing and restrictions, so that enterprise applications can only be accessed through dedicated tools to ensure enterprise data security.
- the terminal control device sets the address access restriction information corresponding to the terminal identifier, and prohibits the terminal user from editing the address access restriction information locally; the terminal control device may send the time control information corresponding to the terminal identifier to the terminal, The address access restriction information is also sent to the terminal, and the terminal controls the access address of the application according to the address access restriction information.
- the terminal control device can limit the destination IP address of the HTML4 ⁇ HTML5 application, and can usually be implemented by using a whitelist or a blacklist of the destination IP address, and prohibiting the terminal user from locally editing the destination IP address.
- List or blacklist the whitelist or blacklist of the destination IP address can be called "address access restriction information,".
- Whitelist A list of addresses that the application is allowed to access. The addresses in the list can be accessed normally. Addresses that are not in the list are not allowed to access. Usually, for an IP address, it is displayed as an address segment, such as: 202.129.1.1 ⁇ 201.129.10.254, then the IP address in this address segment is accessible, others are illegal.
- Blacklist A list of addresses that are prohibited from being accessed by the application. The address in the list cannot be accessed normally. The address that appears in the list is not allowed to access. Usually, for an IP address, it is displayed as an address segment, such as: 202.129.1.1 ⁇ 201.129.10.254, then the IP address in this address segment is not accessible, and the others are legal access addresses.
- the terminal access restriction information is also sent to the terminal; when the terminal starts the application, the terminal will perform the address resolution process in the HTML4 ⁇ HTML5 according to the The address access restriction information is used to check the destination IP address to be accessed by the application. If the address is in the whitelist address range, the access is allowed to continue, otherwise the access is denied, that is, the application is refused to be used; or, if the address is in the blacklist Access is denied within the address range, otherwise access is allowed.
- the terminal control method in this embodiment is applicable to a mobile office scenario and can be applied in a mobile office scenario to improve the security of enterprise data and prevent enterprise data leakage caused by unrestricted use of the mobile office device.
- This embodiment provides a structure of a terminal control apparatus that can execute the terminal control method of any of the embodiments of the present invention.
- the terminal control device can be, for example, in a mobile office Terminal control device, or home gateway in a home scenario.
- FIG. 9 is a schematic structural diagram of an embodiment of a terminal control apparatus according to the present invention.
- the apparatus may include: a terminal identifier receiving unit 91, an application time acquiring unit 92, and an application time sending unit 93;
- the terminal identifier receiving unit 91 is configured to receive time control information corresponding to the application identifier of the terminal identifier sent by the terminal;
- the application time sending unit 93 is configured to send the time control information to the terminal, so that the terminal controls the usage time of the application corresponding to the application identifier according to the time control information.
- FIG. 10 is a schematic structural diagram of another embodiment of a terminal control apparatus according to the present invention. As shown in FIG. 10, the apparatus is based on the structure shown in FIG. 9.
- the application time acquiring unit 92 is specifically configured to obtain according to the terminal identifier.
- the time control information includes usage time information of the application, so that the terminal controls the usage time of the application according to the usage time information.
- the time control information further includes access time information of the data accessed by the application, so that the terminal controls the usage time of the application according to the usage time information of the application and the access time information of the data.
- the terminal identifier receiving unit 91 is configured to receive an application registration request sent by the terminal, where the application registration request carries an application identifier and the terminal identifier applied by the terminal;
- the device may further include: a control information setting unit 94, configured to store a correspondence between the application identifier and the terminal identifier, and set the time control information corresponding to the application identifier, so that the application time acquiring unit is configured according to the Receiving, by the terminal identifier, the time control letter
- control information setting unit 94 is further configured to review an application corresponding to the application identifier received by the terminal identifier receiving unit, and if the application is a remote desktop application or a cloud application, the application is no longer set. Time control information.
- the device may further include: a special instruction processing unit 95, configured to receive an application start request sent by the terminal to initiate an application, where the application is an application that is currently in a disabled state; and is started according to the application And applying, to the terminal, a startup instruction for instructing to start the application, so that the terminal sets the application to an available state according to the startup instruction.
- the device may further include: an access address control unit 96, configured to acquire address access restriction information corresponding to the application identifier, and control an access address of the application according to the address access restriction information.
- an access address control unit 96 configured to acquire address access restriction information corresponding to the application identifier, and control an access address of the application according to the address access restriction information.
- the embodiment provides a structure of a terminal, and the terminal can execute the terminal control method of any embodiment of the present invention.
- the terminal can be, for example, a mobile office device in a mobile office.
- FIG. 1 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
- the terminal may include: a terminal identifier sending unit 1101, an application time receiving unit 11202, and an application time control unit 1103;
- the terminal identifier sending unit 1101 is configured to send, to the terminal control device, the terminal identifier of the terminal, so that the terminal control device acquires time control information corresponding to the application identifier of the application on the terminal according to the terminal identifier;
- the application time receiving unit 1102 is configured to receive the time control information sent by the terminal control device.
- the application time control unit 1103 is configured to control the usage time of the application corresponding to the application identifier according to the time control information and the local time.
- FIG. 12 is a schematic structural diagram of another embodiment of a terminal according to the present invention. As shown in FIG. 12, the terminal is applied to the time control unit 1103 based on the structure shown in FIG.
- the local time controlling the usage time of the application includes: setting the application to an available state if the local time is within an application available time range defined by the usage time information; otherwise, setting the application to a disabled state.
- the terminal may further include: a time synchronization unit 1104, configured to perform time synchronization with the time synchronization server to obtain the local time.
- a time synchronization unit 1104 configured to perform time synchronization with the time synchronization server to obtain the local time.
- the time control information further includes: access time information of the data accessed by the application; an application time control unit 1103, specifically configured to use the time information according to the application Information, the access time information of the data, and the local time control the usage time of the application, including: if the local time is within the application available time range defined by the usage time information of the application, and the access time of the data If the information-defined data is available within the time range, then the application is set to the available state; otherwise, the application is set to the disabled state.
- the terminal may further include: an access address control unit 1105, configured to receive address access restriction information corresponding to the application sent by the terminal control device, and access the device according to the address access restriction information when using the application The address is controlled.
- an access address control unit 1105 configured to receive address access restriction information corresponding to the application sent by the terminal control device, and access the device according to the address access restriction information when using the application The address is controlled.
- the terminal control device includes a memory 1301 and a processor 1302.
- the storage 1301 is configured to store an application identifier corresponding to the terminal identifier, and time control information corresponding to the application identifier;
- the processor 1302 is configured to receive a terminal identifier sent by the terminal, acquire time control information corresponding to the application identifier of the application on the terminal according to the terminal identifier, and send the time control information to the terminal, so that the The terminal controls the usage time of the application corresponding to the application identifier according to the time control information.
- FIG. 14 is a structural diagram of an entity of a terminal embodiment of the present invention. As shown in FIG. 14, the terminal includes a memory 1401 and a processor 1402.
- a memory 1401 configured to store time control information received from the terminal control device, where the processor 1402 is configured to send the terminal identifier of the terminal to the terminal control device, so that the terminal control device acquires the The time control information corresponding to the application identifier of the application on the terminal; receiving the time control information sent by the terminal control device, and controlling the application corresponding to the application identifier according to the time control information and the local time usage time.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明提供一种终端控制方法和装置、以及终端,其中,方法包括:接收终端发送的终端标识;根据所述终端标识获取所述终端上的应用的应用标识对应的时间控制信息;将所述时间控制信息发送至所述终端,以使得所述终端根据所述时间控制信,控制所述应用标识对应的应用的使用时间。本发明实现了根据该时间控制信息对终端上的应用的使用时间进行控制。
Description
终端控制方法和装置、 以及终端 技术领域 本发明涉及通信技术,尤其涉及一种终端控制方法和装置、以及终端。 背景技术
随着移动终端和无线网络的快速发展, 移动办公的进程加快推进, 很多 企业逐渐采用移动办公来使得工作更加方便和高效。 但是, 移动办公中存在 的问题是, 企业无法对移动办公的各移动终端进行有效的管理和控制, 有可 能出现的情况是:移动终端的使用者可能会在工作时间使用娱乐方面的应用, 例如, 聊天、 游戏和听歌等, 会影响办公效率。 目前存在着无法对终端的某 些应用的使用时间进行控制的问题, 会对工作造成影响。 发明内容 本发明实施例提供一种终端控制方法和装置、 以及终端, 以实现对终 端上应用的使用时间的控制。
本发明的第一个方面是提供一种终端控制方法, 包括:
接收终端发送的终端标识; 制信息;
将所述时间控制信息发送至所述终端, 以使得所述终端根据所述时间 控制信息控制所述应用标识对应的应用的使用时间。
在一种可能的实现方式中, 所述根据所述终端标识获取所述终端上的 应用的应用标识对应的时间控制信息, 包括: 根据所述终端标识, 获取与 所述终端标识对应的应用标识, 所述应用标识是所述终端上的应用的应用 标识; 根据所述应用标识, 获取与所述应用标识对应的时间控制信息。
在另一种可能的实现方式中, 所述时间控制信息包括所述应用的使用 时间信息, 以使得所述终端根据所述使用时间信息控制所述应用的使用时 间。
在又一种可能的实现方式中, 所述时间控制信息还包括所述应用要访 问的数据的访问时间信息, 以使得所述终端根据所述应用的使用时间信 息、 以及数据的访问时间信息控制所述应用的使用时间。
在又一种可能的实现方式中, 在将所述时间控制信息发送至所述终端 之前, 还包括: 接收所述终端发送的应用注册请求, 所述应用注册请求携 带所述终端上应用的应用标识和所述终端标识; 存储所述应用标识和终端 标识的对应关系, 并设置与所述应用标识对应的所述时间控制信息, 以使 得根据所述终端标识获取到所述时间控制信息。
在又一种可能的实现方式中, 在所述设置与所述应用标识对应的所述 时间控制信息之前, 还包括: 对所述应用标识对应的应用进行审核, 若所 述应用是远程桌面类应用或者云应用, 则不再设置所述应用的时间控制信 自
在又一种可能的实现方式中, 在所述接收终端发送的终端标识之后, 还包括: 接收所述终端发送的请求启动应用的应用启动申请, 所述应用是 当前在所述终端处于禁用状态的应用; 根据所述应用启动申请, 向所述终 端发送用于指示启动所述应用的启动指令, 以使得所述终端根据所述启动 指令将所述应用设置为可用状态。
在又一种可能的实现方式中, 在所述获取与所述终端标识对应的应用 的应用标识、 以及与所述应用标识对应的时间控制信息之后, 还包括: 获 取与所述应用标识对应的地址访问限制信息, 并根据所述地址访问限制信 息对所述应用的访问地址进行控制。
本发明的另一个方面是提供一种终端控制方法, 包括:
终端向终端控制装置发送所述终端的终端标识;
所述终端接收所述终端控制装置发送的与所述终端上的应用的应用 标识对应的时间控制信息, 所述时间控制信息是所述终端控制装置根据所 述终端标识获取;
所述终端根据所述时间控制信息及本地时间, 控制所述应用标识对应 的应用的使用时间。
在一种可能的实现方式中, 所述终端接收所述终端控制装置发送的与 所述终端上的应用的应用标识对应的时间控制信息, 包括: 所述终端接收
所述终端控制装置发送的所述时间控制信息, 所述时间控制信息包括所述 终端上的应用的使用时间信息; 所述终端根据所述应用的使用时间信息及 本地时间控制所述应用的使用时间, 包括: 若本地时间在所述使用时间信 息限定的应用可用时间范围内, 则设置所述应用为可用状态, 否则, 设置 所述应用为禁用状态。
在另一种可能的实现方式中, 在所述根据所述应用的使用时间信息及 本地时间控制所述应用的使用时间之前, 还包括: 向时间同步服务器进行 时间同步, 以获取所述本地时间。
在又一种可能的实现方式中, 接收的所述时间控制信息还包括: 所述 应用所访问的数据的访问时间信息; 在所述接收所述终端控制装置发送的 时间控制信息之后, 还包括: 根据所述应用的使用时间信息、 所述数据的 访问时间信息以及本地时间控制所述应用的使用时间, 包括: 若本地时间 既在所述应用的使用时间信息限定的应用可用时间范围内, 又在所述数据 的访问时间信息限定的数据可用时间范围内, 则设置所述应用为可用状 态, 否则, 设置所述应用为禁用状态。
在又一种可能的实现方式中, 在向终端控制装置发送本地的终端标识 之后, 还包括: 向所述终端控制装置发送请求启动应用的应用启动申请, 所述应用是当前在本地处于禁用状态的应用; 接收所述终端控制装置返回 的用于指示启动所述应用的启动指令, 并根据所述启动指令将所述应用设 置为可用状态。
在又一种可能的实现方式中, 在接收所述终端控制装置发送的时间控 制信息之后, 还包括: 接收所述终端控制装置发送的与应用对应的地址访 问限制信息, 并根据所述地址访问限制信息在使用应用时对访问地址进行 控制。
本发明的又一个方面是提供一种终端控制装置, 包括:
终端标识接收单元, 用于接收终端发送的终端标识; 应用标识对应的时间控制信息;
应用时间发送单元, 用于将所述时间控制信息发送至所述终端, 以使 得所述终端根据所述时间控制信息控制所述应用标识对应的应用的使用
时间。
在一种可能的实现方式中, 所述应用时间获取单元, 具体用于根据所 述终端标识, 获取与所述终端标识对应的应用标识, 所述应用标识是所述 终端上的应用的应用标识; 根据所述应用标识, 获取与所述应用标识对应 的时间控制信息。
在另一种可能的实现方式中, 所述时间控制信息包括所述应用的使用 时间信息, 以使得所述终端根据所述使用时间信息控制所述应用的使用时 间。
在又一种可能的实现方式中, 所述时间控制信息还包括所述应用所访 问的数据的访问时间信息, 以使得所述终端根据所述应用的使用时间信 息、 以及数据的访问时间信息控制所述应用的使用时间。
在又一种可能的实现方式中, 所述终端标识接收单元, 具体用于接收 所述终端发送的应用注册请求, 所述应用注册请求携带所述终端上应用的 应用标识和所述终端标识; 还包括: 控制信息设置单元, 用于存储所述应 用标识和终端标识的对应关系, 并设置与所述应用标识对应的所述时间控 制信息, 以使得所述终端时间控制单元根据所述终端标识获取到所述时间 控制信息。
在又一种可能的实现方式中, 所述控制信息设置单元, 还用于对所述 终端标识接收单元接收到的应用标识对应的应用进行审核, 若所述应用是 远程桌面类应用或者云应用, 则不再设置所述应用的时间控制信息。
在又一种可能的实现方式中, 还包括: 特殊指令处理单元, 用于接收 所述终端发送的请求启动应用的应用启动申请, 所述应用是当前在所述终 端处于禁用状态的应用; 并根据所述应用启动申请, 向所述终端发送用于 指示启动所述应用的启动指令, 以使得所述终端根据所述启动指令将所述 应用设置为可用状态。
在又一种可能的实现方式中, 还包括: 访问地址控制单元, 用于获取 与所述应用标识对应的地址访问限制信息, 并根据所述地址访问限制信息 对所述应用的访问地址进行控制。
本发明的又一个方面是提供一种终端, 包括:
终端标识发送单元, 用于向终端控制装置发送所述终端的终端标识,
应用标识对应的时间控制信息;
应用时间接收单元, 用于接收所述终端控制装置发送的所述时间控制 信息;
应用时间控制单元, 用于根据所述时间控制信息及本地时间, 控制所 述应用标识 ^应的应用的使用时间。
在一种可能的实现方式中, 所述时间控制信息包括所述终端上的应用 的使用时间信息; 所述应用时间控制单元, 具体用于根据所述应用的使用 时间信息及本地时间控制所述应用的使用时间, 包括: 若本地时间在所述 使用时间信息限定的应用可用时间范围内, 则设置所述应用为可用状态, 否则, 设置所述应用为禁用状态。
在另一种可能的实现方式中, 还包括: 时间同步单元, 用于向时间同 步服务器进行时间同步, 以获取所述本地时间。
在又一种可能的实现方式中, 所述信息接收子单元接收的所述时间控 制信息还包括: 所述应用所访问的数据的访问时间信息; 所述应用管理子 单元, 具体用于根据所述应用的使用时间信息、 所述数据的访问时间信息 以及本地时间控制所述应用的使用时间, 包括: 若本地时间既在所述应用 的使用时间信息限定的应用可用时间范围内, 又在所述数据的访问时间信 息限定的数据可用时间范围内, 则设置所述应用为可用状态, 否则, 设置 所述应用为禁用状态。
在又一种可能的实现方式中, 还包括: 访问地址控制单元, 用于接收 所述终端控制装置发送的与应用对应的地址访问限制信息, 并根据所述地 址访问限制信息在使用所述应用时对访问地址进行控制。
本发明实施例提供的终端控制方法和装置、 以及终端的技术效果是: 通过由终端控制装置根据终端标识获取时间控制信息, 该时间控制信息是 与终端上的应用的应用标识对应的时间控制信息, 可以实现根据该时间控 制信息对终端上的应用的使用时间进行控制。 附图说明 图 1为本发明终端控制方法实施例应用的系统架构图;
图 2为本发明终端控制方法一实施例的流程示意图;
图 3为本发明终端控制方法另一实施例的流程示意图;
图 4为本发明终端控制方法又一实施例的信令示意图;
图 5为本发明为终端控制方法又一实施例中的移动办公设备屏幕设置 示意图一;
图 6为本发明为终端控制方法又一实施例中的移动办公设备屏幕设置 示意图二;
图 7为本发明终端控制方法又一实施例的设备关系示意图;
图 8为本发明终端控制方法又一实施例的信令示意图;
图 9为本发明终端控制装置一实施例的结构示意图;
图 10为本发明终端控制装置另一实施例的结构示意图;
图 1 1为本发明终端一实施例的结构示意图;
图 12为本发明终端另一实施例的结构示意图;
图 13为本发明终端控制装置实施例的实体构造图;
图 14为本发明终端实施例的实体构造图。 具体实施方式 本发明实施例的终端控制方法, 使用于终端控制装置与终端之间; 图 1为本发明终端控制方法实施例应用的系统架构图, 如图 1所示, 本发明 实施例中的终端控制装置对终端的控制, 实际上是对终端上的应用的使用 时间进行控制。 终端控制装置 11可以获取与终端上的应用对应的时间控 制信息, 并根据该时间控制信息对终端 12上的应用的使用时间进行控制。 具体的应用场景例如可以是, 企业中的终端控制装置 11对移动办公中的 各终端 12进行控制, 控制终端 12上的各应用例如办公类型应用、 娱乐类 型应用的使用时间, 以防止员工在工作时间娱乐, 进行工作监督; 或者, 也可以是家庭中的终端控制装置 11 (例如家庭网关)对终端 12上的特定 应用的使用时间进行控制, 例如是将平板电脑上的应用 "游戏" 的使用时 间限制在 7:00〜9:00, 以防止小孩子过度娱乐而影响学习等。
其中, 需要特别说明的是, 上述的与终端上的应用对应的时间控制信 息中, 所述的应用是由应用标识 (即 APP ID ) 来区别不同的应用的, 比
如 APP ID 1对应时间控制信息 1 , APP ID2对应时间控制信息 2等。 这里 的 APP ID是能够唯一标识某个应用的信息, 与应用所在的终端无关; 举 例如下: 比如, 某个应用, 在手机和 PAD中均装有该应用, 只是手机和 PAD中的版本号有所不同, 或者, 由于需要与终端上的某些特定的功能相 适配而对应用进行特定的更改, 导致手机和 PAD上的该应用在功能上也 有所不同; 但是, 尽管手机和 PAD中的该应用存在上述的不同之处, 其 仍然属于同一种应用, 是具有相同的 APP ID的。 4叚设手机上的该应用称 为第一应用, PAD上的该应用称为第二应用, 则该第一应用和第二应用的 APP ID是相同的。
在下面的各实施例中, 所述的与应用对应的时间控制信息、 或者与应 用对应的某些信息, 均是以 APP ID来标识应用。 下面将对本发明实施例 的终端控制方法进行详细说明。
实施例一
图 2为本发明终端控制方法一实施例的流程示意图, 本实施例的方法 是终端控制装置执行, 如图 2所示, 该方法可以包括:
201、 接收终端发送的终端标识;
其中, 终端控制装置接收终端的终端标识, 例如, 可以是在终端初次 连接该终端控制装置时, 终端将自己的终端标识发送至终端控制装置; 或 者, 也可以是在终端与终端控制装置连接之后的某个时间, 想要对终端的 使用时间进行控制时, 由终端再将自己的终端标识发送至终端控制装置 等。
所述的终端标识是能够唯一标识该终端的信息, 例如, 对于平板电脑 来说, 可以采用其中的中央处理器(Central Processing Unit, 简称: CPU ) 的序列号作为该平板电脑的终端标识。
202、 根据所述终端标识获取时间控制信息, 该时间控制信息是所述 终端上的应用的应用标识对应的时间控制信息;
例如, 终端控制装置根据接收到终端标识, 可以获取与该终端标识对 应的应用标识, 该应用标识是该终端上的应用的应用标识。 比如, 终端上 装载有应用 A、 应用 B, 并且该终端已经将这两个应用在终端控制装置注 册过, 则终端控制装置上其实是可以存储该终端与其装载的应用的对应关
系的, 例如可以记录 "终端 a——应用 A、 应用 B" , 当然, 上述记录的 对应关系中, 是终端标识和应用标识的对应关系。 此时, 在该步骤中, 终 端控制装置在接收到终端标识后, 就可以获取与该终端标识对应的应用标 识。
接着, 终端控制装置可以获取到应用标识对应的时间控制信息, 该时 间控制信息是用于限定应用标识对应的应用的使用时间的, 例如, 限定应 用 A在 8:00-12:00的时间段使用。该时间控制信息可以是终端控制装置在 之前终端注册应用时就设定好的, 或者, 终端控制装置也可以根据实际需 求, 对应用的时间控制信息进行随时更新。
例如, 在移动办公中, 就需要对终端上的应用的使用时间进行控制; 比如, 该时间控制信息可以是应用的使用时间信息, 这里所述的使用时间 是指的应用处于可用状态即允许启动的时间。 例如, 对于办公类型的应用
"Email" , 可以通过该 "Email" 的时间控制信息限定其在工作时间 8: 00〜17:00处于可用状态, 员工是可以启动的; 而对于娱乐类型的应用 "游 戏" , 可以通过该 "游戏" 的时间控制信息限定其在非工作时间 17:00以 后处于可用状态; 终端控制装置就可以据此控制终端上的各个应用的使用 时间了。
203、 终端控制装置将所述时间控制信息发送至所述终端, 以使得所 述终端根据所述时间控制信息控制所述应用标识对应的应用的使用时间。
其中, 终端控制装置将所述时间控制信息发送至终端, 终端就可以根 据该时间控制信息对终端的使用时间进行控制了。
如上只是举例, 具体的终端控制方法的执行过程将在后续的实施例中 结合具体的应用场景进行详细说明; 通过设定应用的时间控制信息, 并通 过终端控制装置根据该时间控制信息对终端的应用的使用时间进行控制, 加强了对终端的控制和管理能力, 并且, 实现了对终端的精细化管理, 实 现了业务级(即应用级) 的控制和管理能力。
实施例二
图 3为本发明终端控制方法另一实施例的流程示意图, 本实施例的方 法是终端执行, 如图 3所示, 该方法可以包括:
301、 终端向终端控制装置发送本地的终端标识;
例如, 终端可以在向终端控制装置进行连接时, 将自己的终端标识发 送至终端控制装置; 例如, 对于平板电脑来说, 可以上报其 CPU的序列 号作为其终端标识。
302、 终端接收所述终端控制装置发送的时间控制信息, 该时间控制 信息是终端上的应用的应用标识对应的时间控制信息, 所述时间控制信息 是所述终端控制装置根据所述终端标识获取;
其中, 终端控制装置在接收到终端标识后, 会获取与该终端标识对应 的应用标识的时间控制信息, 并将其发送至终端。
303、 终端根据所述时间控制信息及本地时间, 控制所述应用标识对 应的应用的使用时间。
其中, 终端在接收到终端控制装置发送的时间控制信息后, 将根据该 时间控制信息和终端侧的本地时间, 对终端上的应用的使用时间进行控 制。 例如, 应用的时间控制信息指示该应用的使用时间是 8:00-12:00, 贝' J 终端将确定本地时间即终端的当前时间是几点, 例如是 9:00, 再结合上述 的时间控制信息 8:00-12:00, 确定是否设置应用处于可正常使用的状态。
下面将结合具体的应用场景, 对本发明实施例的终端控制方法进行详 细说明, 主要是以移动办公场景为例,但是,在具体实施中并不局限于此, 在其他类似的需要对终端上的应用的使用时间进行控制的场景都可以适 用。
实施例三
本实施例是以移动办公场景为例, 本场景中的终端可以是企业中的移 动办公设备, 例如智能手机、 平板电脑等, 企业可以通过终端控制装置对 各移动办公设备的使用时间进行控制; 并且, 在这种移动办公场景下, 企 业主要是对移动办公设备中的应用的使用时间进行限定。
图 4为本发明终端控制方法又一实施例的信令示意图, 如图 4所示, 该方法可以包括:
401、 移动办公设备向终端控制装置发送登录请求, 所述登录请求中 携带该移动办公设备的终端标识;
其中, 企业的各移动办公设备在打开开始工作时, 都需要向企业的终 端控制装置进行登录, 并携带该移动办公设备的终端标识, 例如可以是设
备的 CPU的序列号。
企业会预先在终端控制装置中登记该企业中的各个移动办公设备的 终端标识, 并在移动办公设备登录时, 根据其上报的终端标识查询在终端 控制装置中是否有存储, 如果有存储, 则表明该移动办公设备是属于企业 的合法用户, 否则可以拒绝该设备登录; 移动办公设备无法登录终端控制 装置, 就不能使用终端控制装置提供的各个应用所需要访问的企业网络中 的服务器信息, 就不能进入企业网络, 从而保证企业网络的安全。
402、 移动办公设备向终端控制装置发送应用注册请求, 携带移动办 公设备中应用的应用标识、 以及终端标识;
其中, 移动办公设备上所安装的应用都需要向终端控制装置进行注 册, 具体实施中, 移动办公设备可以在其自身设置一个应用管理子单元, 可以记录各个应用是否上报的状态,如果应用已经上报,则记录"已上报"; 如果应用还未上 4艮, 则记录 "未上 4艮,, , 移动办公设备可以据此向终端控 制装置发送应用注册请求, 将该未上报的应用通知给终端控制装置。 移动 办公设备可以设定在安装应用之后, 就将该应用向终端控制装置进行注 册。
所述的应用标识是能够唯一标识该应用的信息; 这里在应用注册请求 时将应用标识和终端标识都进行上报, 是为了使得终端控制装置得知该上 报的应用是属于哪个移动办公设备的, 从而存储该应用标识和终端标识的 对应关系, 例如移动办公设备 A上的某个应用 "偷菜" 。
403、 终端控制装置设置应用的时间控制信息;
其中, 终端控制装置在接收到移动办公设备注册的应用后, 会设置该 应用的时间控制信息, 该时间控制信息是用于限定应用的使用时间的。
举例如下: 假设移动办公设备上的应用 "邮件" , 这种应用属于办公 类应用, 可以限定其在工作时间和非工作时间均可使用、 或者限定仅在工 作时间使用等, 本实施例以在工作时间和非工作时间均可使用为例。
可以采用如下设定方式: 终端控制装置为每台移动办公设备设定两种 模式,即工作模式、休闲模式,并限定工作模式对应的时间是" 8:00〜17:00" , 休闲模式对应的时间是 " 17:00之后" 。 上述的应用 "邮件" 在工作时间 和非工作时间均可使用, 据此可以设定该应用 "邮件" 所属的设备模式是
"工作模式"和 "休闲模式" , 即在这两种模式下均可用。 综上, 应用 "邮 件,,的时间控制信息是"工作模式( 8:00〜17:00 )、休闲模式( 17:00之后 ) " , 该时间控制信息所限定的应用的使用时间是所有时间。 所述的时间控制信 息 "工作模式(8:00〜17:00 ) 、 休闲模式( 17:00之后),, 也可以称为应用 的使用时间信息。
再举例如下: 假设移动办公设备上的应用 "微博,, , 这种应用属于娱 乐类应用, 可以限定其仅在非工作时间使用。 根据上述的移动办公设备的 两种模式, 可以得到应用 "微博" 所属的设备模式是 "休闲模式" , 则应 用 "微博" 的时间控制信息是 "休闲模式 ( 17:00之后) " , 也即应用的 使用时间信息, 其限定了应用的使用时间是 17:00之后。
进一步的, 终端控制装置设定应用的时间控制信息的方式可以有多 种, 上述的举例也只是一种可选的信息表达方式。 比如, 终端控制装置还 可以为每个应用配置其所属的类型, 例如属于娱乐类应用、 或者办公类应 用等, 并将应用类型与设备模式结合起来限定应用的使用时间, 例如, 可 以设定策略 "在设备模式为工作模式时, 只能使用办公类应用" , 则应用 "邮件" 的时间控制信息包括 "办公类、 上述的策略、 以及工作模式 ( 8:00〜17:00 ) ,, , 通过该信息就可以知道, 在 8:00〜17:00的时间段内设 置该应用 "邮件" 为可用状态。
404、 终端控制装置将应用的时间控制信息发送至移动办公设备; 其中, 终端控制装置可以在接收到终端标识时, 根据终端标识、 以及 应用标识和终端标识的对应关系, 查找到该终端上具有的应用 (即与终端 标识对应的例如多个应用标识) , 并将该应用的时间控制信息即用于限定 应用的使用时间的使用时间信息发送至移动办公设备。
需要说明的是, 终端控制装置例如可以是在移动办公设备某次登录 时, 存储该移动办公设备上报的所有应用标识, 并设置该应用标识对应的 应用的时间控制信息等; 在该移动办公设备下一次登录时, 终端控制装置 就可以将根据之前设置好的信息例如应用标识和终端标识的对应关系, 将 之前已经设置好的应用的时间控制信息发送至该移动办公设备。
405、 移动办公设备根据时间控制信息, 控制应用的使用时间; 其中, 移动办公设备在接收到终端控制装置下发的时间控制信息后,
将据此控制应用的使用时间。具体的控制方式如下: 比如在 403中所述的, 应用的时间控制信息都是基于时间的, 例如工作模式 (8:00〜17:00 ) 等, 所以要根据时间控制信息进行控制, 首先要保证移动办公设备本身的时间 准确性, 可以将移动办公设备本身的时间称为本地时间。
首先, 将移动办公设备设置为禁止使用时间设定功能, 使得该移动办 公设备必须通过与时间同步服务器进行时间同步的方式获取其本地时间。
时间同步服务器的地址可以是在移动办公设备出厂时就预先配置在 该移动办公设备上, 以使得移动办公设备可以根据该地址定期向时间同步 服务器主动发起时间同步流程; 该时间同步服务器的地址可以是 IP地址 或者域名等, 例如, 192.168.0.1或 ntp .xxx.com, '^ΙδΐΤ以同日于酉己 两 地址, 当一个不可用时, 用第二个地址作为备份, 可以提高系统的可靠性; 该时间同步服务器的地址不可手工更改。 移动办公设备例如可以配置为每 次开机时校准或者每天定时校准一次, 向时间同步服务器主动发起时间同 步请求, 时间同步服务器返回移动办公设备所处的当前时区的当前时间; 更准确的, 移动办公设备可以考虑传输时间的因素得到准确时间信息, 误 差小于 1秒钟。
接着, 在保证移动办公设备的本地时间准确的基础上, 根据从终端控 制装置获取的应用的使用时间信息以及该本地时间, 共同控制应用的使用 时间。
例如, 移动办公设备可以定期检查时间的变化, 例如可以是在每分钟 的第一秒钟执行检查操作, 并根据时间设定应用的状态, 该状态指的是可 用或者禁用; 若当前的本地时间在应用的使用时间信息限定的应用可用时 间范围内, 则设置所述应用为可用状态, 否则,设置所述应用为禁用状态。 举例如下: 假设应用 "微博" 仅在非工作时间使用, 非工作时间是 17:00 之后, 则如果移动办公设备检查时间为 15:01 , 则将该应用 "微博" 的状 态设置为 "禁用,, , 此时, 用户不论使用哪种方式例如直接点击、 命令行 等启动该应用, 均不能启动; 如果移动办公设备检查时间为 17:00, 则将 该应用 "微博" 的状态设置为 "可用" , 用户就可以启动该应用了。
需要说明的是, 应用的状态随着时间的变化发生的切换, 也是由移动 办公设备自动执行的, 不需要用户手动触发。 例如, 上述的应用 "微博" ,
在工作时间 8:00〜17:00 , 该应用的状态为 "禁用" ; 当移动办公设备每分 钟的第一秒钟执行时间检查操作, 在检查得到当前的本地时间是 17:01分 时, 根据应用 "微博" 的使用时间信息 "属于休闲模式( 17:00之后) " , 就可以自动将应用的状态由 "禁用" 更改为 "可用" 。
此外, 对于未在终端控制装置进行注册的应用, 移动办公设备会默认 将其设置为 "禁用" , 禁止启动的。 例如, 移动办公设备的应用管理子单 元在对应用的状态进行设置时, 是根据终端控制装置发送的应用的时间控 制信息来执行的, 终端控制装置也是会将该终端上所有应用的时间控制信 息都发送至移动办公设备的。 如果移动办公设备发现在终端控制装置下发 的时间控制信息中没有某个应用的时间控制信息, 比如, 没有该应用的应 用标识(可能表示该应用未在终端控制装置注册) 、 或者有应用标识但是 没有该应用的时间控制信息(可能表示终端控制装置认为该应用永远都是 禁用的) , 则移动办公设备都可以据此将该应用的状态设置为 "禁用" , 这样该应用就总是禁用, 即使设备处于休闲模式也是不能启动的。
在某些特殊情况下, 需要临时启动在移动办公设备本地处于禁用状态 的应用, 例如是未在终端控制装置注册的应用、 或者还未到达可用时间段 的应用等; 此时, 为保证正常的工作需求, 移动办公设备可以向终端控制 装置发送请求启动该应用的应用启动申请, 携带该应用的应用标识、 该移 动办公设备的终端标识。 终端控制装置根据该申请, 在根据终端标识和应 用标识判断能够允许启动该应用时, 将向移动办公设备返回用于指示启动 所述应用的启动指令, 移动办公设备就可以根据该指令将应用的状态设置 为 "可用" , 就可以使用该应用了。 例如, 终端控制装置返回的启动指令 可以是一个随时间变化的动态口令, 移动办公设备输入该动态口令, 就可 以更改应用的状态。
进一步的, 为了方便移动办公设备的用户在自己的移动办公设备上清 楚的看到各应用所处的状态, 比如, 可以很方便的直观的识别出各应用是 处于可用状态还是禁用状态, 本实施例的移动办公设备可以根据应用所处 的状态设置不同的屏幕显示状态。 例如, 当某个应用处于可用状态时, 可 以将该应用对应的屏幕设置为正常工作时的亮色, 而当某个应用处于禁用 状态时, 可以将该应用对应的屏幕设置为灰色, 这样用户就可以根据应用
的屏幕显示颜色很方便的得知当前应用是否可用。
进一步的, 还可以根据应用所处的状态, 将不同类别的应用设置在移 动办公设备的不同屏幕上; 比如, 参见图 5和图 6所示, 图 5为本发明为 终端控制方法又一实施例中的移动办公设备屏幕设置示意图一, 图 6为本 发明为终端控制方法又一实施例中的移动办公设备屏幕设置示意图二, 本 实施例在移动办公设备设置了三种类型的屏幕, 一种是屏幕 1 : 办公应用, 包括邮件、 日程、 车队等工作类应用, 另一种是屏幕 2: 娱乐应用, 包括 上网、 游戏、 聊天等, 再一种是屏幕 3 : 配置管理, 包括语言、 操作、 升 级等, 上述应用的屏幕分类例如可以是由移动办公设备用户自己设定的。
图 5所示的是处于工作模式下的屏幕, 其中的屏幕 1和屏幕 3在该工 作模式下是处于激活状态, 这些屏幕下的各种应用均可以正常启动和使 用, 在图 5中以蓝色表示其处于正常状态, 而屏幕 2中的所有应用是不能 启动的, 因为这些应用都不在规定的使用时间内, 具体实施中可以将其设 置为灰色状态, 或者也可以直接将屏幕 2设置为锁死状态。 图 6所示的是 处于休闲模式即非工作模式下的屏幕, 各屏幕上的所有应用均可以正常启 动, 所以此时各屏幕均以蓝色表示, 即均处于正常状态。 通过将应用分布 在不同的屏幕上, 可以很好的区分企业应用和个人应用等, 对应用的管理 将更加明确。
实施例四
本发明仍然是以移动办公为例, 主要是在实施例三的基础上, 进一步 加强了对企业的数据服务的安全性的管理。 图 7为本发明终端控制方法又 一实施例的设备关系示意图, 移动办公设备上的某些办公类的应用, 例如 与某物流企业工作相关的 "库存,, 、 "车队,, 、 "日程,, 等应用, 这些应 用在使用时需要访问企业的数据服务器, 由该数据服务器提供该应用对应 的企业数据, 这些企业数据都是需要保密的, 通常只能由企业自己的终端 才能访问。
本实施例设定了企业数据的访问时间信息, 限定这些数据只能在规定 的时间范围才能使用, 例如只能在工作时间使用, 或者只能在工作时间的 某个时间段使用, 在这些时间内, 企业通常会监控这些数据的使用情况, 发生使用异常时能够及时处理, 相比于在任何时间都能够访问数据, 必然
提高了数据的安全性, 减少了数据泄密的可能。 本实施例主要是将数据与 应用进行绑定, 将数据的使用与应用的使用进行同步; 即终端控制装置会 在设定移动办公设备上的应用的时间控制信息时, 将企业数据的访问时间 信息也包括进去,由企业数据的访问时间信息、及应用的使用时间信息(例 如仅在 8: 00-17: 00使用) 综合起来作为应用的时间控制信息, 一起决 定应用是否可用。
图 8为本发明终端控制方法又一实施例的信令示意图, 结合图 7和图 8所示, 本实施例的终端控制方法可以包括:
601、 移动办公设备向终端控制装置发送登录请求, 所述登录请求中 携带该移动办公设备的终端标识;
602、 终端控制装置将与终端标识对应的应用的时间控制信息发送至 移动办公设备;
其中, 本实施例的时间控制信息在包括应用的使用时间信息例如 "该 应用在工作模式 (8:00〜17:00 )使用" 之外, 还包括应用要访问的数据的 访问时间信息, 例如, 应用 "库存,, 在使用时是要访问的企业内部网络的 数据服务器的, 该数据服务器上存储有与应用 "库存" 对应的企业数据, 并且与该数据对应的还记载有该数据的访问时间信息例如 "该数据只能在 8:00-10:00使用 " 、 该数据对应的终端标识和应用标识(以表明该数据是 哪个移动办公设备上的哪个应用能够访问的) 。
本实施例在接收到终端标识时, 会将该终端标识对应的各应用的时间 控制信息下发至移动办公设备。
603、 移动办公设备根据应用的使用时间信息、 以及数据的访问时间 信息控制所述应用的使用时间;
其中, 移动办公设备会根据应用的使用时间信息、 以及数据的访问时 间信息综合控制所述应用的使用时间。
举例如下: 個殳对于应用 "库存" , 其对应的使用时间信息是 "该应 用在工作模式 ( 8:00〜17:00 )使用" , 即表明只有在 8:00〜17:00这个时间 段内应用 "库存" 才被设置为可用状态, 是可以启动的, 是基于移动办公 设备的工作模式限定了应用的使用时间; 本实施例中, 该应用 "库存" 所 对应的企业数据的访问时间信息是 "该数据只能在 8:00〜10:00使用" , 即
数据只能在 8:00〜10:00的时间段内才是开放的, 其他时间不能够被访问。 例如, 假设当前是 9:00, 移动办公设备查询 "库存" 的时间控制信息, 该时间控制信息包括上述的两个方面即应用的使用时间信息、 和数据的访 问时间信息, 得到的查询结果是, 在该时间应用是处于可用状态, 并且数 据能够被访问, 则移动办公设备判定应用 "库存,, 是能够正常启动的, 则 正常启动即可。
又例如, 假设当前是 11 :00, 移动办公设备查询 "库存" 的时间控制 信息, 得到的查询结果是, 在该时间应用是处于可用状态, 但是数据不能 访问, 在非开放时间段内, 则移动办公设备判定应用 "库存" 是不能启动 的, 此时, 移动办公设备可以提示用户 "当前要访问的数据服务不可用" , 表明当前应用不能启动是因为数据不能访问。
再例如, 假设当前是 18:00, 移动办公设备查询 "库存" 的时间控制 信息, 得到的查询结果是, 在该时间应用是处于 "禁用,, 状态, 并且, 数 据也是处于非开放时间段内, 则移动办公设备判定应用 "库存 " 是不能启 动的, 此时, 移动办公设备可以提示用户 "当前模式下, 无权启动应用" , 表明当前应用不能启动是因为不属于应用的使用时间段。
以上只是列举可行的实施方式, 在具体实施中并不局限于此, 只要能 够根据应用的使用时间信息和数据的访问时间信息综合确定应用是否可 用即可。 例如, 移动办公设备还可以综合根据应用的使用时间信息和数据 的访问时间信息设置应用的状态为可用或者禁用, 在相应的时间直接根据 该状态判定应用是否能够启动即可。
举例如下: 仍然以上述的应用 "库存" 的使用时间信息是 "该应用在 工作模式 (8:00〜17:00 )使用" 、 应用 "库存,, 所对应的企业数据的访问 时间信息是 "该数据只能在 8:00〜10:00使用" 为例, 则在 "8:00〜10:00" 这个时间段, 设置应用的状态为 "可用" (因为应用和数据均可用) ; 在 " 10:00〜17:00" 时间段, 设置应用的状态为 "禁用" (因为数据不可用); 在 " 17:00之后" 时间段设置应用的状态为 "禁用" (因为应用和数据均 不可用) , 后续就可以直接根据该状态判断应用是否可以启动即可。
在上面的实施例中, 对如何采用本发明的终端控制方法进行终端上的 应用的使用时间的控制进行了说明, 在此基础上, 将进一步的考虑如何保
证应用所访问的数据的安全性。 比如, 在移动办公场景下, 企业不仅需要 能够控制移动办公设备的使用时间, 保证办公效率; 并且, 企业也越来越 重视对企业内部数据访问的安全性的保证, 因为移动办公设备的使用者如 果可以不受任何限制的安全应用, 不受限制使用应用, 将会企业的数据安 全造成威胁。 因此, 下面的实施例六和实施例七, 将列举两种可行的对应 用的使用进行安全方面限制的方案。
实施例五
本实施例中, 终端控制装置对终端上的应用要进行严格的审核, 对应 用访问数据有安全威胁的应用, 将禁止使用。 比如, 终端在将安装的应用 上报至终端控制装置后, 终端控制装置可以在为其设置时间控制信息之 前, 先对应用进行预先审核。 如果发现所安装的应用是远程桌面类应用、 或者云应用例如 HTML4、 HTML5类的应用, 则确定此类应用是禁止使用 的应用, 将不再设置应用的时间控制信息。 终端控制装置在向终端发送应 用的时间控制信息时, 可以只将可用应用的时间控制信息发送至终端, 而 对于远程桌面类应用、 或者云应用, 则不再发送至终端。
因为远程桌面类应用、 或者云应用, 属于工具类的应用, 不是为特定 实现某一类应用而开发的专有客户端应用, 他们可以自由的访问各种业 务, 从而有可能对应用访问的数据造成安全威胁, 所以本实施例对这类应 用进行审核和过滤; 在具体实施中, 企业也可以根据自己的实际情况设定 需要过滤的应用类型。
举例如下: 一般访问邮箱需要类似 Outlook这种专有客户端, 是专用 工具, 是为特定实现邮箱类应用而开发的专有客户端应用; 但有时用户也 可以通过浏览器访问, 浏览器不仅可以访问邮箱, 也可以看新闻或者登录 其他网站, 是个通用工具, 所以可能会对企业数据造成安全威胁; 对于企 业应用, 大多数是基于专用工具访问的, 本实施例将对通用工具类的应用 进行更严格的审核和限制, 以使得企业应用只能通过专用工具访问, 保证 企业数据安全。
实施例六
本实施例中, 对于能够无限制的访问互联网的某些应用, 例如, HTML4、 HTML5类的应用, 也可以不采取完全禁止此类应用的措施, 而
是限制此类应用的访问地址, 只要能保证应用的访问地址是安全的即可。 并且, 是由终端控制装置设置与终端标识对应的地址访问限制信息, 而禁 止终端用户自己在本地编辑地址访问限制信息; 终端控制装置可以在向终 端发送与终端标识对应的时间控制信息时, 将该地址访问限制信息也一并 发送至终端, 由终端根据该地址访问限制信息对应用的访问地址进行控 制。
举例如下: 终端控制装置可以对 HTML4\HTML5类应用访问的目的 IP地址进行限制, 通常可以用目的 IP地址的白名单或黑名单两种方式来 实现, 并禁止终端用户本地编辑目的 IP地址的白名单或黑名单。 这里的 目的 IP地址的白名单或黑名单就可以称为 "地址访问限制信息,, 。
白名单: 即允许应用访问的地址清单,在清单中的地址可以正常访问, 非出现在清单中的地址, 不允许访问; 通常对于 IP地址来说, 展现为一 个地址段, 如: 202.129.1.1〜 201.129.10.254, 那么在这个地址段的 IP地 址是可以访问的, 其它则非法。
黑名单: 即禁止应用访问的地址清单, 在清单中的地址不可以正常访 问, 出现在清单中的地址, 不允许访问; 通常对于 IP地址来说, 展现为 一个地址段, 如: 202.129.1.1〜 201.129.10.254, 那么在这个地址段的 IP 地址是不可以访问的, 其它则为合法的访问地址。
终端控制装置可以在向终端发送与终端标识对应的时间控制信息时, 将该地址访问限制信息也一并发送至终端; 终端在启动上述应用时, 将在 HTML4\HTML5的地址解析过程中,根据所述的地址访问限制信息对应用 所要访问的目的 IP地址进行检查, 若地址在白名单的地址范围内, 则允 许继续访问, 否则拒绝访问, 即拒绝使用该应用; 或者, 若地址在黑名单 的地址范围内, 则拒绝访问, 否则允许继续访问。
本实施例的终端控制方法, 对于移动办公场景适用, 在移动办公场景 中应用, 可以提高企业数据的安全性, 防止由于移动办公设备的无限制使 用应用而造成的企业数据泄露等风险。
实施例七
本实施例提供了终端控制装置的结构, 该终端控制装置可以执行本发 明任意实施例的终端控制方法。 该终端控制装置例如可以是移动办公中的
终端控制装置、 或者家庭场景中的家庭网关等。
图 9为本发明终端控制装置一实施例的结构示意图, 如图 9所示, 该 装置可以包括: 终端标识接收单元 91、 应用时间获取单元 92和应用时间 发送单元 93 ; 其中,
终端标识接收单元 91 , 用于接收终端发送的终端标识; 的应用标识对应的时间控制信息;
应用时间发送单元 93 , 用于将所述时间控制信息发送至所述终端, 以 使得所述终端根据所述时间控制信息控制应用标识对应的应用的使用时 间。
图 10为本发明终端控制装置另一实施例的结构示意图,如图 10所示, 该装置在图 9所示结构的基础上,应用时间获取单元 92 , 具体用于根据所 述终端标识, 获取与所述终端标识对应的应用标识, 所述应用标识是所述 终端上的应用的应用标识; 根据所述应用标识, 获取与所述应用标识对应 的时间控制信息。
进一步的, 所述时间控制信息包括所述应用的使用时间信息, 以使得 所述终端根据所述使用时间信息控制所述应用的使用时间。
进一步的, 所述时间控制信息还包括所述应用所访问的数据的访问时 间信息, 以使得所述终端根据所述应用的使用时间信息、 以及数据的访问 时间信息控制所述应用的使用时间。
进一步的, 终端标识接收单元 91 , 具体用于接收所述终端发送的应用 注册请求, 所述应用注册请求携带所述终端上应用的应用标识和所述终端 标识;
该装置还可以包括: 控制信息设置单元 94 , 用于存储所述应用标识和 终端标识的对应关系, 并设置与所述应用标识对应的所述时间控制信息, 以使得所述应用时间获取单元根据所述终端标识获取到所述时间控制信 自
进一步的,控制信息设置单元 94 , 还用于对所述终端标识接收单元接 收到的应用标识对应的应用进行审核, 若所述应用是远程桌面类应用或者 云应用, 则不再设置所述应用的时间控制信息。
进一步的, 该装置还可以包括: 特殊指令处理单元 95 , 用于接收所述 终端发送的请求启动应用的应用启动申请, 所述应用是当前在终端处于禁 用状态的应用; 并根据所述应用启动申请, 向终端发送用于指示启动所述 应用的启动指令, 以使得所述终端根据所述启动指令将所述应用设置为可 用状态。
进一步的, 该装置还可以包括: 访问地址控制单元 96, 用于获取与所 述应用标识对应的地址访问限制信息, 并根据所述地址访问限制信息对所 述应用的访问地址进行控制。
实施例八
本实施例提供了终端的结构, 该终端可以执行本发明任意实施例的终 端控制方法。 该终端例如可以是移动办公中的移动办公设备。
图 1 1为本发明终端一实施例的结构示意图, 如图 11所示, 该终端可 以包括: 终端标识发送单元 1101、应用时间接收单元 11202和应用时间控 制单元 1 103 ; 其中,
终端标识发送单元 1101 ,用于向终端控制装置发送所述终端的终端标 识, 以使得所述终端控制装置根据所述终端标识获取与所述终端上的应用 的应用标识对应的时间控制信息;
应用时间接收单元 1102,用于接收所述终端控制装置发送的所述时间 控制信息;
应用时间控制单元 1103 , 用于根据所述时间控制信息及本地时间,控 制所述应用标识对应的应用的使用时间。
图 12为本发明终端另一实施例的结构示意图, 如图 12所示, 该终端 在图 11所示结构的基础上, 应用时间控制单元 1103 , 具体用于根据所述 应用的使用时间信息及本地时间控制所述应用的使用时间, 包括: 若本地 时间在所述使用时间信息限定的应用可用时间范围内, 则设置所述应用为 可用状态, 否则, 设置所述应用为禁用状态。
进一步的, 该终端还可以包括: 时间同步单元 1104 , 用于向时间同步 服务器进行时间同步, 以获取所述本地时间。
进一步的, 所述时间控制信息还包括: 所述应用所访问的数据的访问 时间信息; 应用时间控制单元 1103 , 具体用于根据所述应用的使用时间信
息、 所述数据的访问时间信息以及本地时间控制所述应用的使用时间 , 包 括: 若本地时间既在所述应用的使用时间信息限定的应用可用时间范围 内, 又在所述数据的访问时间信息限定的数据可用时间范围内, 则设置所 述应用为可用状态, 否则, 设置所述应用为禁用状态。
进一步的, 该终端还可以包括: 访问地址控制单元 1105 , 用于接收所 述终端控制装置发送的与应用对应的地址访问限制信息, 并根据所述地址 访问限制信息在使用所述应用时对访问地址进行控制。
实施例九
图 13为本发明终端控制装置实施例的实体构造图, 如图 13所示, 该 终端控制装置包括存储器 1301和处理器 1302; 其中,
存储器 1301 , 用于存储与终端标识对应的应用标识, 以及所述应用标 识对应的时间控制信息;
处理器 1302, 用于接收终端发送的终端标识; 根据所述终端标识获取 所述终端上的应用的应用标识对应的时间控制信息; 以及将所述时间控制 信息发送至所述终端, 以使得所述终端根据所述时间控制信息控制所述应 用标识对应的应用的使用时间。
图 14为本发明终端实施例的实体构造图, 如图 14所示, 该终端包括 存储器 1401和处理器 1402; 其中,
存储器 1401 , 用于存储从终端控制装置接收的时间控制信息; 处理器 1402, 用于向终端控制装置发送所述终端的终端标识, 以使得 所述终端控制装置根据所述终端标识获取与所述终端上的应用的应用标 识对应的所述时间控制信息; 接收所述终端控制装置发送的所述时间控制 信息, 以及, 根据所述时间控制信息及本地时间, 控制所述应用标识对应 的应用的使用时间。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步骤 可以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计算机可读 取存储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前述 的存储介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存储程序代码的介 质。
最后应说明的是: 以上各实施例仅用以说明本发明的技术方案, 而非对
其限制; 尽管参照前述各实施例对本发明进行了详细的说明, 本领域的普通 技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改, 或者对其中部分或者全部技术特征进行等同替换; 而这些修改或者替换, 并 不使相应技术方案的本质脱离本发明各实施例技术方案的范围。
Claims
1、 一种终端控制方法, 其特征在于, 包括:
接收终端发送的终端标识;
根:
制信息;
将所述时间控制信息发送至所述终端, 以使得所述终端根据所述时间 控制信息控制所述应用标识对应的应用的使用时间。
2、 根据权利要求 1所述的终端控制方法, 其特征在于, 所述根据所 括:
根据所述终端标识, 获取与所述终端标识对应的应用标识, 所述应用 标识是所述终端上的应用的应用标识;
根据所述应用标识, 获取与所述应用标识对应的时间控制信息。
3、 根据权利要求 1所述的终端控制方法, 其特征在于, 所述时间控 制信息包括所述应用的使用时间信息, 以使得所述终端根据所述使用时间 信息控制所述应用的使用时间。
4、 根据权利要求 3所述的终端控制方法, 其特征在于, 所述时间控 制信息还包括所述应用要访问的数据的访问时间信息, 以使得所述终端根 据所述应用的使用时间信息、 以及数据的访问时间信息控制所述应用的使 用时间。
5、 根据权利要求 3所述的终端控制方法, 其特征在于, 在将所述时 间控制信息发送至所述终端之前, 还包括:
接收所述终端发送的应用注册请求, 所述应用注册请求携带所述终端 上应用的应用标识和所述终端标识;
存储所述应用标识和终端标识的对应关系, 并设置与所述应用标识对 应的所述时间控制信息, 以使得根据所述终端标识获取到所述时间控制信 自
6、 根据权利要求 5所述的终端控制方法, 其特征在于, 在所述设置 与所述应用标识对应的所述时间控制信息之前, 还包括:
对所述应用标识对应的应用进行审核, 若所述应用是远程桌面类应用
或者云应用, 则不再设置所述应用的时间控制信息。
7、 根据权利要求 1所述的终端控制方法, 其特征在于, 在所述接收 终端发送的终端标识之后, 还包括:
接收所述终端发送的请求启动应用的应用启动申请, 所述应用是当前 在所述终端处于禁用状态的应用;
根据所述应用启动申请, 向所述终端发送用于指示启动所述应用的启 动指令, 以使得所述终端根据所述启动指令将所述应用设置为可用状态。
8、 根据权利要求 1所述的终端控制方法, 其特征在于, 在所述获取 与所述终端标识对应的应用的应用标识、 以及与所述应用标识对应的时间 控制信息之后, 还包括:
获取与所述应用标识对应的地址访问限制信息, 并根据所述地址访问 限制信息对所述应用的访问地址进行控制。
9、 一种终端控制方法, 其特征在于, 包括:
终端向终端控制装置发送所述终端的终端标识;
所述终端接收所述终端控制装置发送的与所述终端上的应用的应用 标识对应的时间控制信息, 所述时间控制信息是所述终端控制装置根据所 述终端标识获取;
所述终端根据所述时间控制信息及本地时间, 控制所述应用标识对应 的应用的使用时间。
10、 根据权利要求 9所述的终端控制方法, 其特征在于, 所述终端接 控制信息, 包括:
所述终端接收所述终端控制装置发送的所述时间控制信息, 所述时间 控制信息包括所述终端上的应用的使用时间信息;
所述终端根据所述应用的使用时间信息及本地时间控制所述应用的 使用时间, 包括: 若本地时间在所述使用时间信息限定的应用可用时间范 围内, 则设置所述应用为可用状态, 否则, 设置所述应用为禁用状态。
1 1、 根据权利要求 10所述的终端控制方法, 其特征在于, 在所述终 端根据所述应用的使用时间信息及本地时间控制所述应用的使用时间之 前, 还包括:
所述终端向时间同步服务器进行时间同步, 以获取所述本地时间。
12、 根据权利要求 10所述的终端控制方法, 其特征在于, 所述终端 接收的所述时间控制信息还包括: 所述应用所访问的数据的访问时间信 自 ·
在所述终端接收所述终端控制装置发送的时间控制信息之后, 还包 括:
所述终端根据所述应用的使用时间信息、 所述数据的访问时间信息以 及本地时间控制所述应用的使用时间, 包括: 若本地时间既在所述应用的 使用时间信息限定的应用可用时间范围内, 又在所述数据的访问时间信息 限定的数据可用时间范围内, 则设置所述应用为可用状态, 否则, 设置所 述应用为禁用状态。
13、 根据权利要求 10所述的终端控制方法, 其特征在于, 所述终端 在向终端控制装置发送所述终端的终端标识之后, 还包括:
所述终端向所述终端控制装置发送请求启动应用的应用启动申请, 所 述应用是当前在本地处于禁用状态的应用;
所述终端接收所述终端控制装置返回的用于指示启动所述应用的启 动指令, 并根据所述启动指令将所述应用设置为可用状态。
14、 根据权利要求 10所述的终端控制方法, 其特征在于, 在所述终 端接收所述终端控制装置发送的时间控制信息之后, 还包括:
所述终端接收所述终端控制装置发送的与应用对应的地址访问限制 信息, 并根据所述地址访问限制信息在使用所述应用时对访问地址进行控 制。
15、 一种终端控制装置, 其特征在于, 包括:
终端标识接收单元, 用于接收终端发送的终端标识; 应用标识对应的时间控制信息;
应用时间发送单元, 用于将所述时间控制信息发送至所述终端, 以使 得所述终端根据所述时间控制信息控制所述应用标识对应的应用的使用 时间。
16、 根据权利要求 15所述的终端控制装置, 其特征在于,
所述应用时间获取单元, 具体用于根据所述终端标识, 获取与所述终 端标识对应的应用标识, 所述应用标识是所述终端上的应用的应用标识; 根据所述应用标识, 获取与所述应用标识对应的时间控制信息。
17、 根据权利要求 15所述的终端控制装置, 其特征在于, 所述时间 控制信息包括所述应用的使用时间信息, 以使得所述终端根据所述使用时 间信息控制所述应用的使用时间。
18、 根据权利要求 17所述的终端控制装置, 其特征在于, 所述时间 控制信息还包括所述应用所访问的数据的访问时间信息, 以使得所述终端 根据所述应用的使用时间信息、 以及数据的访问时间信息控制所述应用的 使用时间。
19、 根据权利要求 17所述的终端控制装置, 其特征在于,
所述终端标识接收单元, 具体用于接收所述终端发送的应用注册请 求, 所述应用注册请求携带所述终端上应用的应用标识和所述终端标识; 还包括: 控制信息设置单元, 用于存储所述应用标识和终端标识的对 应关系, 并设置与所述应用标识对应的所述时间控制信息, 以使得所述应 用时间获取单元根据所述终端标识获取到所述时间控制信息。
20、 根据权利要求 19所述的终端控制装置, 其特征在于,
所述控制信息设置单元, 还用于对所述终端标识接收单元接收到的应 用标识对应的应用进行审核, 若所述应用是远程桌面类应用或者云应用, 则不再设置所述应用的时间控制信息。
21、 根据权利要求 17所述的终端控制装置, 其特征在于, 还包括: 特殊指令处理单元, 用于接收所述终端发送的请求启动应用的应用启 动申请, 所述应用是当前在所述终端处于禁用状态的应用; 并根据所述应 用启动申请, 向所述终端发送用于指示启动所述应用的启动指令, 以使得 所述终端根据所述启动指令将所述应用设置为可用状态。
22、 根据权利要求 15所述的终端控制装置, 其特征在于, 还包括: 息, 并根据所述地址访问限制信息对所述应用的访问地址进行控制。
23、 一种终端, 其特征在于, 包括:
终端标识发送单元, 用于向终端控制装置发送所述终端的终端标识,
应用标识对应的时间控制信息;
应用时间接收单元, 用于接收所述终端控制装置发送的所述时间控制 信息;
应用时间控制单元, 用于根据所述时间控制信息及本地时间, 控制所 述应用标识 ^应的应用的使用时间。
24、 根据权利要求 23所述的终端, 其特征在于, 所述时间控制信息 包括所述终端上的应用的使用时间信息;
所述应用时间控制单元, 具体用于根据所述应用的使用时间信息及本 地时间控制所述应用的使用时间, 包括: 若本地时间在所述使用时间信息 限定的应用可用时间范围内, 则设置所述应用为可用状态, 否则, 设置所 述应用为禁用状态。
25、 根据权利要求 24所述的终端, 其特征在于, 还包括: 时间同步 单元, 用于向时间同步服务器进行时间同步, 以获取所述本地时间。
26、 根据权利要求 24所述的终端, 其特征在于, 所述时间控制信息 还包括: 所述应用所访问的数据的访问时间信息;
所述应用时间控制单元, 具体用于根据所述应用的使用时间信息、 所 述数据的访问时间信息以及本地时间控制所述应用的使用时间, 包括: 若 本地时间既在所述应用的使用时间信息限定的应用可用时间范围内, 又在 所述数据的访问时间信息限定的数据可用时间范围内, 则设置所述应用为 可用状态, 否则, 设置所述应用为禁用状态。
27、 根据权利要求 23所述的终端, 其特征在于, 还包括:
访问地址控制单元, 用于接收所述终端控制装置发送的与应用对应的 地址访问限制信息, 并根据所述地址访问限制信息在使用所述应用时对访 问地址进行控制。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP12878650.6A EP2733909B8 (en) | 2012-08-29 | 2012-08-29 | Terminal control method and device, and terminal |
CN201280002877.3A CN103416040B (zh) | 2012-08-29 | 2012-08-29 | 终端控制方法和装置、以及终端 |
PCT/CN2012/080723 WO2014032241A1 (zh) | 2012-08-29 | 2012-08-29 | 终端控制方法和装置、以及终端 |
US14/137,701 US20140108491A1 (en) | 2012-08-29 | 2013-12-20 | Method and Apparatus for Controlling Terminal, and Terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2012/080723 WO2014032241A1 (zh) | 2012-08-29 | 2012-08-29 | 终端控制方法和装置、以及终端 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/137,701 Continuation US20140108491A1 (en) | 2012-08-29 | 2013-12-20 | Method and Apparatus for Controlling Terminal, and Terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014032241A1 true WO2014032241A1 (zh) | 2014-03-06 |
Family
ID=49608193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/080723 WO2014032241A1 (zh) | 2012-08-29 | 2012-08-29 | 终端控制方法和装置、以及终端 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20140108491A1 (zh) |
EP (1) | EP2733909B8 (zh) |
CN (1) | CN103416040B (zh) |
WO (1) | WO2014032241A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105307015A (zh) * | 2015-10-30 | 2016-02-03 | 四川长虹电器股份有限公司 | 智能电视儿童锁的处理方法 |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103841192B (zh) * | 2014-03-05 | 2018-01-16 | 天闻数媒科技(北京)有限公司 | 一种远程控制移动终端应用软件的方法和系统 |
CN104092748A (zh) * | 2014-06-30 | 2014-10-08 | 广州金山网络科技有限公司 | 一种应用app运行控制的方法及装置 |
CN104469746A (zh) * | 2014-12-10 | 2015-03-25 | 承玉琴 | 目标移动终端及其监管方法、系统和监管移动终端 |
CN104618138A (zh) * | 2014-12-26 | 2015-05-13 | 深圳市金立通信设备有限公司 | 一种服务器及终端 |
CN105160224A (zh) * | 2015-06-30 | 2015-12-16 | 广东欧珀移动通信有限公司 | 一种终端设备的启动方法及终端设备 |
CN105141699B (zh) * | 2015-09-18 | 2018-12-28 | 北京恒华伟业科技股份有限公司 | 应用程序的控制方法及装置 |
CN105260269A (zh) * | 2015-11-02 | 2016-01-20 | 广东欧珀移动通信有限公司 | 聊天记录的备份方法、装置和终端 |
KR102408649B1 (ko) * | 2016-02-19 | 2022-06-15 | 삼성전자주식회사 | 환경 설정 방법 및 장치 |
CN107194241B (zh) * | 2016-03-15 | 2021-06-11 | 腾讯科技(深圳)有限公司 | 终端设备的控制方法、服务器、终端设备和控制系统 |
JP6862669B2 (ja) * | 2016-03-31 | 2021-04-21 | 日本電気株式会社 | 業務支援システム、業務支援方法、情報処理装置、通信端末およびそれらの制御方法と制御プログラム |
CN108604265B (zh) | 2016-09-24 | 2020-12-25 | 华为技术有限公司 | 离线管理应用程序使用时间的方法、及终端设备 |
CN106357455B (zh) * | 2016-10-11 | 2019-10-25 | 北京元心科技有限公司 | 一种控制应用访问网络的方法和系统 |
CN106789746B (zh) * | 2016-12-16 | 2020-06-19 | 广州杰赛科技股份有限公司 | 一种管理软件数据流量的方法及装置 |
CN109804610B (zh) * | 2017-03-23 | 2022-05-13 | 柏思科技有限公司 | 限制具有网络功能的设备的数据流量传输的方法和系统 |
CN107015834A (zh) * | 2017-04-14 | 2017-08-04 | 深信服科技股份有限公司 | 一种虚拟移动终端的应用程序配置方法及装置 |
CN107463419B (zh) * | 2017-09-21 | 2021-01-26 | 青岛海信移动通信技术股份有限公司 | 应用重启方法、装置及计算机可读存储介质 |
CN108174036B (zh) * | 2017-12-28 | 2020-10-16 | 广东小天才科技有限公司 | 一种管控应用程序的方法及系统 |
CN108595947A (zh) * | 2018-03-29 | 2018-09-28 | 努比亚技术有限公司 | 移动终端中应用程序的管理方法、移动终端及存储介质 |
CN110839105A (zh) | 2018-08-17 | 2020-02-25 | 中兴通讯股份有限公司 | 终端管理方法、装置、终端及计算机存储介质 |
CN110011871A (zh) * | 2019-03-28 | 2019-07-12 | 杭州迪普科技股份有限公司 | 一种访问测试方法、装置、设备及存储介质 |
CN112989310B (zh) * | 2021-04-02 | 2024-04-19 | 深圳市腾讯信息技术有限公司 | 一种信息处理方法、计算机设备及可读存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080316983A1 (en) * | 2007-06-22 | 2008-12-25 | At&T Intellectual Property, Inc. | Service information in a LAN access point that regulates network service levels provided to communication terminals |
CN101340449A (zh) * | 2008-08-15 | 2009-01-07 | 宇龙计算机通信科技(深圳)有限公司 | 移动终端及获得上网信息的方法 |
CN101873640A (zh) * | 2010-05-27 | 2010-10-27 | 华为终端有限公司 | 流量处理方法、装置和移动终端 |
CN102204210A (zh) * | 2011-05-18 | 2011-09-28 | 华为技术有限公司 | 启动应用的方法、服务器和系统 |
CN102404821A (zh) * | 2010-09-15 | 2012-04-04 | 电信科学技术研究院 | 一种mtc终端接入控制方法及装置 |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6948183B1 (en) * | 1998-06-18 | 2005-09-20 | General Instrument Corporation | Dynamic security for digital television receivers |
US20020010768A1 (en) * | 1998-12-17 | 2002-01-24 | Joshua K. Marks | An entity model that enables privilege tracking across multiple treminals |
US6658415B1 (en) * | 2000-04-28 | 2003-12-02 | International Business Machines Corporation | Monitoring and managing user access to content via a universally accessible database |
US6722984B1 (en) * | 2000-11-22 | 2004-04-20 | Universal Electronics Inc. | Game controller with parental control functionality |
US7590684B2 (en) * | 2001-07-06 | 2009-09-15 | Check Point Software Technologies, Inc. | System providing methodology for access control with cooperative enforcement |
GB0226651D0 (en) * | 2002-11-15 | 2002-12-24 | Koninkl Philips Electronics Nv | Accessing on-line services |
SG157223A1 (en) * | 2003-02-25 | 2009-12-29 | Boston Communications Group Inc | Method and system for providing supervisory control over wireless phone usage |
US20050060566A1 (en) * | 2003-09-16 | 2005-03-17 | Chebolu Anil Kumar | Online user-access reports with authorization features |
BRPI0414482B1 (pt) * | 2003-09-26 | 2017-11-21 | Disney Enterprises, Inc. | Parental control of cell phone access |
US20050080898A1 (en) * | 2003-10-08 | 2005-04-14 | Block Jerald J. | System and method for managing computer usage |
US20050130633A1 (en) * | 2003-12-15 | 2005-06-16 | Lee Hill | Methods, systems and computer program products for controlling usage of a mobile terminal |
KR20060063348A (ko) * | 2004-12-07 | 2006-06-12 | 한국전자통신연구원 | 인터넷에서 인증 assertion을 이용한 접속시간제어 방법 |
US8397287B2 (en) * | 2006-08-21 | 2013-03-12 | Citrix Systems, Inc. | Method and system for authorizing a level of access of a client to a virtual private network connection, based on a client-side attribute |
US7836192B2 (en) * | 2005-07-15 | 2010-11-16 | Microsoft Corporation | Parental controls for a media console |
US8150816B2 (en) * | 2005-12-29 | 2012-04-03 | Nextlabs, Inc. | Techniques of optimizing policies in an information management system |
US20080095097A1 (en) * | 2006-10-18 | 2008-04-24 | Mehta Pratik M | Method to control radio devices based on user environment policy requirements |
WO2008094941A1 (en) * | 2007-01-29 | 2008-08-07 | Skippy & Sparky Productions Llc | System, program product, and related methods for managing child activities |
US8046839B2 (en) * | 2007-04-13 | 2011-10-25 | Qualcomm Incorporated | Mobile unit parental control |
US20100121954A1 (en) * | 2008-11-13 | 2010-05-13 | Zheng Yang | Communication Method and System Using User ID-Based Domain Name |
JP5267211B2 (ja) * | 2009-02-26 | 2013-08-21 | 富士通株式会社 | 無線端末装置 |
US8111154B1 (en) * | 2009-09-14 | 2012-02-07 | Symantec Corporation | Systems and methods for monitoring a mobile-computing device using geo-location information |
US8443436B1 (en) * | 2009-10-21 | 2013-05-14 | Symantec Corporation | Systems and methods for diverting children from restricted computing activities |
CN102098756A (zh) * | 2009-12-15 | 2011-06-15 | 华为技术有限公司 | 一种业务控制的方法,装置和系统 |
CN101841602A (zh) * | 2010-05-10 | 2010-09-22 | 袁程 | 一种手机的分时段策略控制方法和手机 |
US20120011561A1 (en) * | 2010-07-12 | 2012-01-12 | Research In Motion Limited | Temporary policies in a mobile computing device |
US8949720B1 (en) * | 2011-05-09 | 2015-02-03 | Symantec Corporation | Systems and methods for managing access-control settings |
US9076020B2 (en) * | 2011-05-13 | 2015-07-07 | Microsoft Technology Licensing, Llc | Protected mode for mobile communication and other devices |
US8578443B2 (en) * | 2011-06-01 | 2013-11-05 | Mobileasap, Inc. | Real-time mobile application management |
US20120331532A1 (en) * | 2011-06-22 | 2012-12-27 | TerraWi, Inc. | Device-agnostic mobile device thin client computing methods and apparatus |
US9137389B2 (en) * | 2011-11-08 | 2015-09-15 | Kajeet, Inc. | Master limits and filters for electronic devices |
US8839354B2 (en) * | 2012-12-31 | 2014-09-16 | Verizon Patent And Licensing Inc. | Mobile enterprise server and client device interaction |
-
2012
- 2012-08-29 EP EP12878650.6A patent/EP2733909B8/en active Active
- 2012-08-29 CN CN201280002877.3A patent/CN103416040B/zh active Active
- 2012-08-29 WO PCT/CN2012/080723 patent/WO2014032241A1/zh active Application Filing
-
2013
- 2013-12-20 US US14/137,701 patent/US20140108491A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080316983A1 (en) * | 2007-06-22 | 2008-12-25 | At&T Intellectual Property, Inc. | Service information in a LAN access point that regulates network service levels provided to communication terminals |
CN101340449A (zh) * | 2008-08-15 | 2009-01-07 | 宇龙计算机通信科技(深圳)有限公司 | 移动终端及获得上网信息的方法 |
CN101873640A (zh) * | 2010-05-27 | 2010-10-27 | 华为终端有限公司 | 流量处理方法、装置和移动终端 |
CN102404821A (zh) * | 2010-09-15 | 2012-04-04 | 电信科学技术研究院 | 一种mtc终端接入控制方法及装置 |
CN102204210A (zh) * | 2011-05-18 | 2011-09-28 | 华为技术有限公司 | 启动应用的方法、服务器和系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2733909A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105307015A (zh) * | 2015-10-30 | 2016-02-03 | 四川长虹电器股份有限公司 | 智能电视儿童锁的处理方法 |
Also Published As
Publication number | Publication date |
---|---|
CN103416040A (zh) | 2013-11-27 |
CN103416040B (zh) | 2016-11-16 |
US20140108491A1 (en) | 2014-04-17 |
EP2733909B8 (en) | 2019-03-13 |
EP2733909A1 (en) | 2014-05-21 |
EP2733909A4 (en) | 2014-10-29 |
EP2733909B1 (en) | 2018-12-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014032241A1 (zh) | 终端控制方法和装置、以及终端 | |
TWI745473B (zh) | 網路驗證方法及裝置 | |
JP6599341B2 (ja) | 動的ネットワークアクセス管理のための方法、デバイスおよびシステム | |
JP6386069B2 (ja) | 接続管理方法、装置、電子設備、プログラム、及び記録媒体 | |
JP6140177B2 (ja) | モバイルデバイス上でリモートポリシーを適用し、共有する技法 | |
US9350725B2 (en) | Enabling access to a secured wireless local network without user input of a network password | |
US10187425B2 (en) | Issuing security commands to a client device | |
US20100306827A1 (en) | Opaque Quarantine and Device Discovery | |
US10187386B2 (en) | Native enrollment of mobile devices | |
US9413778B1 (en) | Security policy creation in a computing environment | |
US11108628B2 (en) | Linking multiple enrollments on a client device | |
US12101305B2 (en) | Co-existence of management applications and multiple user device management | |
US10911299B2 (en) | Multiuser device staging | |
CN108289074B (zh) | 用户账号登录方法及装置 | |
US20170026420A1 (en) | Device-type based content management | |
US11443029B2 (en) | Password hint policies on a user provided device | |
US11411813B2 (en) | Single user device staging | |
US12132702B2 (en) | IP address control system | |
JP2011019125A (ja) | 通信制御装置、通信制御方法および通信制御プログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2012878650 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12878650 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |